Configuring network services

Assignment Help Computer Networking
Reference no: EM132369435

Network Design (Research) Discussion

Task

In this assessment, you are required to read Assessment 4 (Research Network Design) and research a range of options/methods that can be used for network designing in Assessment 4. Based on your research you are required to post your views on pros and cons of each available option for the completion of Assessment 4 and select an option that you will use to complete that assessment.

In your post you must also justify the reasons behind your selection. Your post will be marked on:
• Expressing your professional viewpoint on the topic.
• Justifying your viewpoint with valid and credible evidence.

You are also required to provide constructive comments on at least one other student's post. The final marks for this assessment will be provided along with Assessment 4.

Network Design

Task

This is a practical assessment and will enhance and test your practical skills related to the subject topic.

Students are required to set up a network consisting of PCs, routers, switches and servers. You will need to configure routing between routers, use any dynamic routing protocol. The PCs (clients) will be connected to switches and switches to the router's interfaces. Clients and Servers are connected on different networks (don't attach clients and servers on same network).

Client(s) <--> Switch <--> Router <--> Router <--> Switch <--> Server(s)

To complete this assessment you are expected to refer to information beyond the text book. This assignment is open; in that you are free to choose the devices or software you use to complete the specified tasks. Students are expected to accomplish this task by utilising the necessary commands discussed in lectures and also described in the prescribed text book.

There are numerous web sites available that discuss networking , however you MUST list your sources of information for the different tasks. When completing this project, you may encounter errors or experience difficulties getting your setup to work. If this occurs, your challenge is to analyse why they happen and report on how you solved the problems you encountered.

Task 1 - Setting up a Network
Perform the following activities and support your workings with screenshots:
1. Configure the PCs, Server and Router interfaces with appropriate network addressing;
2. Configure any classless dynamic routing protocol on the routers;
3. On any client, ping the client's own network interfaces, then the local router gateway interface, then the remote router interface, then the servers. Check full network conductivity;
4. Use the traceroute command from the client to the server. Include results of the traceroute in your submission, explaining meaning of traceroute output.

Task 2 - Configuring Network Services:
Using the same network topology that you have setup in Task 1, perform the following additional activities
1. DHCP: Configure DHCP servers and show that the client PC has successfully received IP Addresses and other network parameters (default gateway, subnet mask and DNS IP address) using DHCP
2. WEB Server: Configure WEBs server on the dedicated machines in their specified networks
3. DNS: Configure DNS Servers on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing yourname.csu.org from client PC, DNS must resolve this URL to IP address of WEB Server
4. Firewall: Configure traffic filtering on the web servers to block ONLY HTTP TCP traffic between one of the client PCs and WEB Servers and allowing all other IP traffic, provide evidence of such traffic filtering. You should verify firewall by using PING and HTTPS TCP traffic which should not be blocked.

A series of screenshots with commentary on each of the required tasks is to be submitted. The submission must include a comprehensive explanation of each task in your own words and all the commands used along with the output (or final result) in report format. No description or lack of comprehensive description will result in deduction of marks.

Task 3
Task 3 has been designed to detect and prevent unauthorized assistance with your work. This task is a question and answer session with your lecturer. You must contact your lecturer after submitting your assessment to book an individual appointment. Your lecturer will advise on how to book individual one-on-one sessions, for online students these may be over the phone or Skype sessions. Failure to contact your lecturer may result in loss of marks associated with this task.

Reference no: EM132369435

Questions Cloud

Data science and big data analysis : Discuss what you have learned in this course about Data Science and Data Analytics and how you will apply it to your current job or future job.
Disrupting the fast food industry with wearable technology : Disrupting the FAST FOOD INDUSTRY with WEARABLE TECHNOLOGY - create a written proposal and video about the impact of a particular technology on an industry
Consider the acas code of ethics and how these impact : You will consider the ACA's Code of Ethics and how these practices impact assessment. This professional code identifies your responsibilities and the practices
Moving into international markets : Quebecor Printing is a commercial printing company that is expanding, acquiring ailing printing companies, and moving into international markets.
Configuring network services : Configuring Network Services - detect and prevent unauthorized assistance with your work. This task is a question and answer session with your lecturer
Cash and cash flow are considered lifeblood of business : Generating cash is the ultimate responsibility for managers today. Cash and cash flow are considered the "lifeblood" of a business.
Live memory images and images of various forms off media : Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media.
Stakeholder engagement in policy development : Stakeholder Engagement in Policy Development: Observations and Lessons from International Experience
Prepare journal entries for Lincoln County Tax Agency Fund : Assume that you are the county's primary accountant and part of your assigned duties is to prepare the journal entries for the Lincoln County Tax Agency Fund

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining registration department becoming decentralized

A consulting firm has narrowed the choice of programming language to Java and C#. Which language do you think would be more appropriate for this application and why?

  What is one of major risks of downloading unauthorized copy

Suppose you started working as a network manager at a medium-sized firm with an Internet presence, and discovered that the previous network manager had done a terrible job of network security. Which four security controls would be your first prior..

  Analyse cyber security threats and attacks

MN623 Ethical Hacking and Analytics - Implement and evaluate security testing tools in a realistic computing environment - Analyse cyber security threats

  Which name server was used to obtain the ip address

Use nslookup to obtain the IP address of your university's website. Show the output. Which name server was used to obtain the IP address?

  Determine interface addresses

ITNE2003 Install, configure, operate, and troubleshoot medium-size networks - Create an efficient VLSM design given requirements

  Recognize the possible causes of the problem how you would

a company has offices in eight locations. each location has twenty to twenty-five servers. there are sixty to seventy

  Explain the need for miniaturizing computer technology

Assume a classical computer that performs 109 instructions per second (1GHz). Knowing that the light speed is approximately 3 × 108m/s.

  Amultiply x by x7 x5 x3 1 in gf28mod x8 x4x3x1b i verify

a.multiply x by x7 x5 x3 1 in gf28mod x8 x4x3x1.b. i verify that x6 x is the inverse of x5 x4x2 x 1in gf 28 mod x8

  Define the topology that will be used

Define the topology that will be used. Select the appropriate network media. Select the appropriate network connecting devices, including network security devices.

  Developing information systems

Many options exist for developing information systems, but the most popular alternatives are structured analysis, which is a traditional method

  Company in manhattan still keeps to the traditional mailing

A company in Manhattan still keeps to the traditional mailing approaches even though the nature of their business strictly involves confidential documents that need to be sent to clients. Tell this Manhattan company why you think their messages can b..

  How many users can be supported if circuit switching is used

Suppose users share a 1Mbps link. Also suppose each user requires 100Kbps when transmitting, but each user transmits only 20% of the time. When circuit switching is used, how many users can be supported?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd