Explanation of the planning and designing of the network
Course:- Computer Networking
Reference No.:- EM132138201

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

Assignment Description

Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed.

1162_Network layout of a firm.jpg

Figure. Network layout of a firm

Service requirements

1. 5 departments with 5 subnets. Only admin, HR and the finance department will have all the access to the services available. Engineering and sales have access to the print server and file server but not to the finance department.
2. IP network design
3. Hardware requirements with costs specification
4. Configuration details on the hardware (Routers and Switches)

Report requirements: The report should have a detail explanation of the planning and designing of the network. It is recommended that bullet points are only included whenever necessary.

1. Project Scope

2. Project requirements

3. Network design - Consider the human factor design concepts

4. IP addressing in a tabular form (include justification whenever necessary)

5. Network topology diagram (Netsim preferred)
- Switch configuration
- Router configuration
- DHCP configuration

- The access point and server configuration guidelines
- Security configuration

Note: Student should show the demo of the network design in Week 11 lab. Demonstration marks will be awarded in regards to the stage of the completion of the design.

Note: Programme should run on cisco and need two different answers for this assignment.

Note: Need to do Only Netsim Part


Verified Expert

The paper is designed for the network system of Federation school (Asumed) with two departments East District and West District. The network architecutr diagram is prepare din NEstsim. The pape ris prepared for 1000 words. Cover page, Table of content, Requirmeent, referencing are prpovided. references and intext citationa r ein IEEE format. The router, switches and DHCP configuartion are provided along with Ip address in tabular format.

Put your comment
View Conversion
  1. user image

    Amazing job dear experts and thanks a lot to expertsmind to avail me such expert who followed every units instruction perfectly. I really amazed with the grades I received with your help. I am really thankful. I have passed the class with A grade. You are true lifesaver.

  2. user image

    i want two assignments with this topic. Hi there it has to be 2 different copies. nothing should be same at all. how much more time for the second one? Hello. I'm very much pleased with the work. Looks like expert has read the assignment requirements before doing it. It was a perfect solution, have a glance at perfect sentence formation it has perfect meaning and especially screenshots were pasted accordingly from exact sources which are relevant. Just because of this work you have given me I submitted my assignment on time. I'm expecting perfect marks for this. Its enough for now. I have given you time and got the perfect solution within the deadline. It is so clear in the screenshots. u gave my work 2 days prior . My assignment has become perfect. look at that topology diagram, the connections are perfect. its fine.

Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
ICTNWK506: Topic learning guide: NAT What are two advantages of using NAT? Security - hides private addresses; address conservation - private addresses need only be unique a
Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disad
You are provided with some continuous signals for the number of sensors on a sensor array. The signals detect various categories of signals.
Break into small groups with classmates, and explain privacy issues related with Acxiom's business. Do you believe they are doinganything wrong?
Which of the security enhancements do you think is the most important, and why and dDiscuss your thoughts on what would be the utilized the best in today's industry. Do you
The node in Denver crashes completely. How do the other nodes in the country find out about the crash if RIP is used? If OSPF is used?
Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.
Provide a detailed network design proposal. Your task is to design the network for this new building. The network has been assigned the network address for all c