Internetworking, Basic Computer Science

You have been approached by Company XYZ to design and deploy a new network that will span three cities in Queensland: Brisbane (12 users), Gold Coast (8 users), and Cairns (6 users).
The company already uses 192.168.3.0/27 and would like to maintain the same subnetting structure across these new cities. Note that the zero subnet is used. Adhering to their subnetting scheme, the three cities have been assigned their subnet numbers: Brisbane (4th), Gold Coast (6th), and Cairns (7th).
Access to the Internet is crucial for each office, as well as, inter-branch-office networking. Due to their larger business operations in NSW, routing protocols such as, EIGRP, OSPF, and RIP are used. For their QLD operation, you can choose any routing protocol, but you need explain the reason of your choice.
Your goal is to design, deploy and successfully implement their business requirements using all or any of the following:
• Switches
• Routers
• Workstations
• Operating systems
• Routing protocols
• IP addressing: hosts, subnet addresses, broadcast addresses
• Router-based DHCP server
• NAT/PAT

Solution
You are required to design topologies for the three sub-networks for approval. You can use Cisco Packet Tracer or any other program to develop your topology diagrams. You must document each step you have taken, including your research sources. Any information that you recommend must be supported by references, such as Internet links, printed documents, etc.
You can earn extra credit for this assessment by providing more than the minimum requirements (inform your lecturer if you wish to earn extra credits):
• Wireless networks
• VLSM
• Data traffic filtering (firewall)
• ACLs & wildcard masks
• Static routes
• Default routes
• Alternate path determination


Posted Date: 5/27/2012 6:02:25 AM | Location : United States







Related Discussions:- Internetworking, Assignment Help, Ask Question on Internetworking, Get Answer, Expert's Help, Internetworking Discussions

Write discussion on Internetworking
Your posts are moderated
Related Questions
QUESTION (a) Distinguish between S-HTTP and SSL (b) What are the three basic security provided by SSL? (c) Discuss the limitations of SSL (d) State the port number us


Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that


Characteristics of Artificial Intelligence: Artificial Intelligence is not an easy science to describe, as it has fuzzy borders with simulation mathematics, computer science t

They are used to act upon logic operations on the operators. AND OR, NEG NOT TEST XOR AND INSTRUCTION Function: It acts upon the conjunction of the operators bit by bit. Syntax: A

Python Strings: Strings in Python are recognized as an adjacent set of characters in among quotation marks. Python permits for either pairs of single or double quotes. Subsets of s

Question 1 Explain the structure of Mathematical Model in your own words Question 2 Describe Erlang family of distributions of service times Question 3 Describe the algo

Simulated Annealing One way to answer the problem of local maxima and related problems like ridges and plateaux in hill climbing is to permit the agent to go downhill to some e

There are many other techniques in which companies who manufacture microprocessors have attempted to get better the performance of their CPUs. Cache memory this is a small quantit