iLab 2: Office Network Expansion, Computer Networking

#queiLab 2: Office Network Expansion

Connect to the iLab here.

Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See "Due Dates for Assignments & Exams" in the Syllabus for due dates.)

i L A B O V E R V I E W

In this lab, we will be simulating an office network that evaluates the effects of a proposed expansion.

Item Points
Step 1: Small Internet Works - Analysis of Simulation 15
Step 2: Screenshot 15
Total Points 30
i L A B S T E P S
STEP 1: Small Internet Works

The following tutorials will lead you through creating a network simulation. You will first be creating the existing office network. Next, you will run the simulation of the current office network to get a baseline to compare the effects of the expansion. Then, you will create a second scenario that includes the expansion. You will run this simulation and compare the results of the expansion on the network with the current office network.
• Open the IT Guru 15 tutorials
• Expand the tutorials link
• Expand the basic tutorials link
• Expand the small internetworks link and complete the Introduction, Getting Started, Creating the Network, Collecting Statistics, Viewing the Results, Expanding the Network, and the Comparing Results sections.

STEP 2: Screenshot

After completing the IT Guru Small Internetworks tutorial, take a screenshot using Ctrl + prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen must contain the following:
• Final network configuration
• Graph of overlaid results of the server statistics
• Graph of the overlaid results of the global statistics
Click on image to enlarge.

Screenshot Example 1

Click on image to enlarge.

Screenshot Example 2

Paste the screenshot into a Word document.
Include in the Word document containing your screenshot of the final results your written analysis on the proposed expansion. Address the following in your analysis:
• Effect on server load
• Effect on network load
• What would be your recommendation on the expansion?
STEP 3: Submit to the Dropbox

Submit the completed word document to the weekly iLab Dropboxstion..
Posted Date: 9/28/2013 11:13:00 AM | Location : United States

Related Discussions:- iLab 2: Office Network Expansion, Assignment Help, Ask Question on iLab 2: Office Network Expansion, Get Answer, Expert's Help, iLab 2: Office Network Expansion Discussions

Write discussion on iLab 2: Office Network Expansion
Your posts are moderated
Related Questions
Customer Premise Equipment (CPE) are devices physically located at the subscriber's premises. Includes both owned and leased equipment.

what role would you assign for Pentium iii, 500 MHz processor, 256 MB memory, 1o GB hard drive

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Question: (a) What do you meant by the term ‘LAN'? How is a LAN different from a WAN? (b) Explain three types of cables which are commonly used with LANs. (c) Three com

Name the protocol which is networking middleware SOCKS is a networking middleware: a circuit-level gateway, acting as a proxy and is placed at the session layer to mediate clie

It treats all processors as equivalent. Any processor can do the work of any other processor. Applications are separated into threads that can run simultaneously on any available p

What is Explicit congestion signalling In general way, for explicit congestion avoidance, the network alerts end systems to growing congestion within the network and the end sy

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

When it comes to networking, what are rights? Rights refer to the authorized permission to perform exact actions on the network. Every user on the network can be assigned indiv

PING - Packet Internet Gopher A utility that shows connections to one or more remote hosts. The ping command uses the ICMP echo request and echo reply packets to verify whether