Provide the main steps that you would use to troubleshoot

Assignment Help Computer Networking
Reference no: EM131149930

Assignment: VLAN Troubleshooting

XYZ Company is a very large retail chain in the Midwest United States. This company operates with a single corporate campus location and 25 regional distribution centers that support 3,000 retail locations. XYZ Company recently deployed a new switching environment using Virtual Local Area Network (VLAN) and Spanning Tree technology. The new switching environment includes redundant connections between each switch and includes the HR and Finance VLANs as shown below. Devices plugged into the HR VLAN on any switch require access to the HR VLANs across all switches. Devices plugged into the Finance VLAN require access to the Finance VLANs across all switches.


There have been multiple problems reported with the VLAN and Spanning Tree switching environment.

The new switching environment has exhibited the following problems:

• Switch 1 HR VLAN communication cannot take place with Switch 2 HR VLAN
• Switch 2 Finance VLAN cannot communicate with Switch 4 Finance VLAN
• Switch 4 has both trunk ports to switch 3 continuously going from blocking to forwarding
• Root bridge election is occurring every minute

You were brought in based on your troubleshooting knowledge to address the issues.

Write a two to four page paper in which you:

1. Decide the troubleshooting methodology that you would use for each issue. Provide a rationale to support your response.

2. Provide the main steps that you would use to troubleshoot each of these issues and determine the tools that you would require to complete your troubleshooting. Provide a rationale to support your response.

3. Speculate on the main cause(s) of each of the four problems. Provide a rationale to support your response.

4. Use at least two quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe and develop maintenance methods and processes and procedures through the use of networking tools, resources, and techniques.

• Summarize and develop troubleshooting processes for enterprise networks.

• Use technology and information resources to research issues in internetworking troubleshooting.

• Write clearly and concisely about internetworking troubleshooting using proper writing mechanics.

Reference no: EM131149930

How you would propose protecting your chosen cloud solution

How you would propose protecting your chosen cloud solution from cyber-attack using current password and data protection protocol. Why and how the use of social media

What is a lan subnet

What is a LAN subnet? What are some of the strategies for a network administrator to consider use subnetting (why do it)? What, if any, equipment is needed? Are there oth

Circuit packet switching and vpns

Circuit Packet Switching and VPNs-From the e-Activity, analyze at least one major advantage of private networks and the impact it creates for a communication technology orga

Explain what network operating system you would suggest

Explain what network operating system you would suggest. Describe how you would incorporate the new servers into the environment proposed in Assignment 1 and how you would add

What are the pros and cons of employing

Based on the Takahashi et al. (2007) article, what characteristic of a mesh network is important to the experiment? What are the pros and cons of employing this emergency co

Prepare a list of threat categories and associated business

Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major di

Benefits of hyper v discussion

Imagine you are a network administrator and you are proposing the implementation of Windows Server 2012 with Hyper-V to replace the existing VMware vSphere infrastructure ut

Implementing filter in the firewall

Consider yourself as the network security technician. Your internetwork connects six buildings through fiber links. You have experienced the numerous attacks on your corpora


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd