iLab 2: Office Network Expansion, Computer Networking

#queiLab 2: Office Network Expansion

Connect to the iLab here.


Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See "Due Dates for Assignments & Exams" in the Syllabus for due dates.)

i L A B O V E R V I E W
Scenario/Summary

In this lab, we will be simulating an office network that evaluates the effects of a proposed expansion.


Deliverables
Item Points
Step 1: Small Internet Works - Analysis of Simulation 15
Step 2: Screenshot 15
Total Points 30
i L A B S T E P S
STEP 1: Small Internet Works

The following tutorials will lead you through creating a network simulation. You will first be creating the existing office network. Next, you will run the simulation of the current office network to get a baseline to compare the effects of the expansion. Then, you will create a second scenario that includes the expansion. You will run this simulation and compare the results of the expansion on the network with the current office network.
• Open the IT Guru 15 tutorials
• Expand the tutorials link
• Expand the basic tutorials link
• Expand the small internetworks link and complete the Introduction, Getting Started, Creating the Network, Collecting Statistics, Viewing the Results, Expanding the Network, and the Comparing Results sections.

STEP 2: Screenshot

After completing the IT Guru Small Internetworks tutorial, take a screenshot using Ctrl + prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen must contain the following:
• Final network configuration
• Graph of overlaid results of the server statistics
• Graph of the overlaid results of the global statistics
Click on image to enlarge.

Screenshot Example 1

Click on image to enlarge.

Screenshot Example 2


Paste the screenshot into a Word document.
Include in the Word document containing your screenshot of the final results your written analysis on the proposed expansion. Address the following in your analysis:
• Effect on server load
• Effect on network load
• What would be your recommendation on the expansion?
STEP 3: Submit to the Dropbox

Submit the completed word document to the weekly iLab Dropboxstion..
Posted Date: 9/28/2013 11:13:00 AM | Location : United States







Related Discussions:- iLab 2: Office Network Expansion, Assignment Help, Ask Question on iLab 2: Office Network Expansion, Get Answer, Expert's Help, iLab 2: Office Network Expansion Discussions

Write discussion on iLab 2: Office Network Expansion
Your posts are moderated
Related Questions
How do I draw a flowchart and psuedocode that allows the user to input two different values and complete the sum and display the results?

i want a program of hierarchical programming in c language with its output. please help me .

What is Applets Little programs that can make the Web pages more aesthetically beautiful by means of animations, text, and graphics moving across the screen.

ADVANTAGE AND DISADVANTAGE OF WIRING SCHEMES:  Each of three wiring procedure has disadvantages and advantages, which are illustrate as follows: RELIABILITY ISSUES:  W

Which NetWare protocol provides link-state routing? Ans) NetWare Link Services Protocol (NLSP) gives link-state routing. SAP (Service Advertisement Protocol) advertises network

Go Back ( GBN) Go back  N ARQ is specific  instance of the  automatic  repeat request protocols  in which  the sending  process continues to send  a number of frames specific

What are the basic LAN topologies? The three simple LAN topologies that are combined to shape any practical topology are called as basic LAN topologies. They are, Bus Topology

Multiplexing  and De multiplexing Another  critical set of services that are provided by the transport layer is that of application multiplexing and de multiplexing. This featu

Explain the term - global corporate-wide network It would be highly interesting to note that more than 70 per cent of all security related problems start from within the organi

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t