Implement design in packet tracer

Assignment Help Basic Computer Science
Reference no: EM131984896

Background

Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actually need to have a network. WMS consists of four close buildings, each with multiple floors. Each floor is dedicated to a business function as defined in the following network design topology.

446_figure.jpg

Figure

Task Details

You have been given the final design approved by the tender process and hired to implement that design. In this submission you should take the design given and implement it in Packet Tracer. → Where there is ambiguity, you are encouraged to use your best judgement. ← The design includes several VLANs, a Routing Layer 3 switch and 2 routers to external networks. There is a Wireless VLAN that all wireless access points and the VPN server connect to.

NOTE on using your best judgement:

There ARE ERRORS in this physical topology! Correcting these errors in some fashion demonstrates that you
- understand the concepts in enough detail to see the error and
- know what options exist in correcting these errors.

NOTE on needing to do research:

You WILL need to do some additional research to complete this assignment! Part of University assessments is about encouraging you to research topics. In other units you may be given a topic to research and then write a report or academic paper on the subject. In this unit you are still required to do some research (into Layer 3 switches) but you will instead be required to APPLY the result of that research directly.

Remember, this is an implementation. Transferring logical concepts into practical application needs to be displayed, physical implementation of logical processes such as subnetting are important. You have been given the Network range of 10.0.0.0/21 to work with.

Reference no: EM131984896

Questions Cloud

What is the after-tax salvage value of the equipment : What is the after-tax salvage value of the equipment at the end of the project's life?
Write a program that lets the user enter the total rainfall : You've been asked to write a program that lets the user enter the total rainfall for an unknown (ahead of time) number of months into a linked list.
Guidelines for a future in which we have peace : Reagan legacy and President Reagan's leadership can provide the guidelines for a future in which we have peace
Particularly for the congressional leadership today : We look back at the legacy and the leadership of Ronald Reagan and use them to provide lessons not only for our national government
Implement design in packet tracer : CSG5130 – Network Implementation - You have been given the final design approved by the tender process and hired to implement that design.
What is linear cryptoanalysis and how is it applied : What is linear cryptoanalysis and how is it applied to a problem in general (ie. Not mathematic formulas, but how you would apply approach to some new crypto).
What is the sensitivity of your plans market value to change : What is the sensitivity of your plan's market value to changes in the market interest rate?
What is reynoldss current debt ratio : Reynolds Construction needs a piece of equipment that costs $200. Reynolds can either lease the equipment or borrow $200 from a local bank.
Write a script called activity that checks you can execute : Write a script called activity that checks whether you can execute a file whose pathname is provided by the user.

Reviews

len1984896

5/16/2018 7:05:37 AM

Routing / DHCP 0 1-2 3-4 Routes and DHCP successfully configured. 5 Neither of these components has been successfully configured Either routes or DHCP successfully configured or both are partially configured. DHCP successfully configured and a Routing Protocol (such as RIP or OSPF) implemented Secret Department 0 1 2 Router fully and correctly configured. The secret department has not been configured. Router partially configured. Ie: Interfaces and / or routes partially configured. General comments

len1984896

5/16/2018 7:05:28 AM

VLANs / VSIs / VTP 0 1-2 3-4 5-6 None of these components have been successfully configured One of these has been fully configured or two of these have been partially configured. Two of these has been fully configured or three of these have been partially configured. All three services have been mostly or fully configured. Subnetting 0 Subnetting has not been done or is incorrect. 1-3 4-6 7-8 Subnets are correct but are simplistic. Eg: all subnets are of the same size. Subnets are correct and of different sizes but there is room for improvement or some error. Subnets are within range, big enough for their VLAN, of different sizes and allow for expansion.

len1984896

5/16/2018 7:05:23 AM

Concept Absent Basic Proficient Excellent Topology 0 1-2 3 4 Absent or a significant number of oversights such as a good portion of the topology missing. Devices generally present but: • Some devices are absent • Some devices are added or incorrect • Physical layer is not configured Mostly correct but there is a minor mistake such as the physical layer configured incorrectly All devices present, appropriate substitution of devices and physical layer correctly configured.

len1984896

5/16/2018 7:05:13 AM

CSG5130 Assignment 2 Marks Allocation Topology Implemented Correctly 4 VLANs / VSIs / VTP correctly implemented 6 Subnetting done appropriately 8 Routing works correctly / DHCP Configured 5 Secret Department handled appropriately 2

len1984896

5/16/2018 7:04:56 AM

Marks Worth 25% of the total marks of the unit Due Date Week 11 (exact date listed on Blackboard) Submission Instructions Submit the Packet Tracer file only through Blackboard. Include an MD5 hash in the comments section; this is for your benefit if there are problems with Blackboard. All submissions must be viewable in the latest version of Packet Tracer. If you need to test this, you can get a copy of Packet Tracer If I cannot open your assignment in the latest version of Packet Tracer then you shall receive 0! The marking allocation for this assignment is at the end of this document. If any point is unclear send an e-mail, ask your lecturer on discord, phone or make an appointment well before the assignment is due with your lecturer

Write a Review

Basic Computer Science Questions & Answers

  Distribution of income and well-being

In your answer discuss the intergenerational effects of deficits and the impact of deficits on saving, investment, interest rates, and economic growth.

  Find the maximum pcm bit rate that can be supported

An analog signal is to be converted into a PCM signal that is a binary polar NRZ line code. The signal is transmitted over a channel that is absolutely bandlimited to 4 kHz. Assume that the PCM quantizer has 16 steps and that the overall equivalen..

  Problem regarding the fibonacci numbers

The Fibonacci sequence is given by : 0, 1, 1, 2, 3, 5, 8, 13, 21, ..... By definition the Fibonacci sequence starts at 0 and 1 and each subsequent number is the sum of the previous two. In mathematical terms, the sequence Fn of Fibonacci number is..

  Plan to target expansion on a global level

The global strategies are the plan to target expansion on a global level that will expand the business on a very large scale. These types of strategies require that the company set their products that they offer across the international market and..

  Questions on a word document

Please answer the following questions on a word document. Please provide any references/sources 1. What is the 127.0.0.1 IP address and the most static route used in a host computer?

  Brand of low-calorie microwavable food estimated

Questions 1 through 5 are based on the following scenario (adapted from Chapter 5 demand estimation question number 3, p.163) The maker of a leading brand of low-calorie microwavable food estimated the following demand equation for its product usi..

  Bob''s encryption company

Suppose Bob's encryption company produces two machines, A and B, both of this are supposed to be implemen- tations of RSA using the same modulus n = pq for some unknown primes p and q

  Design a synchronous johnson counter

Design a synchronous Johnson counter that visits eight distinct states in sequence. How would this counter be modified such that any unused states lead eventually to the normal counting sequence?

  Disaster-recovery processes and business-continuity planning

The management at Gem needs you to formulate an incident-response policy to reduce network down time if future incidents occur. Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes..

  Show fetch-execute cycle for instruction that clears

Using the register operation's, show the fetch-execute cycle. Show the fetch-execute cycle for an instruction that clears A (i.e., sets A to 0).

  Do you have any specific criticisms of it

Modify the Command Words and Address Book Text Inter face classes of the address-book-v1t project to provide interactive access to the get Details and remove Details methods of Address Book.

  What is a plausible explanation of what may have happened

Prepare a short research paper of approximately 1300-1500 words, double-spaced, exclusive of cover, title page, and table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be ins..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd