Internetworking, Basic Computer Science

You have been approached by Company XYZ to design and deploy a new network that will span three cities in Queensland: Brisbane (12 users), Gold Coast (8 users), and Cairns (6 users).
The company already uses and would like to maintain the same subnetting structure across these new cities. Note that the zero subnet is used. Adhering to their subnetting scheme, the three cities have been assigned their subnet numbers: Brisbane (4th), Gold Coast (6th), and Cairns (7th).
Access to the Internet is crucial for each office, as well as, inter-branch-office networking. Due to their larger business operations in NSW, routing protocols such as, EIGRP, OSPF, and RIP are used. For their QLD operation, you can choose any routing protocol, but you need explain the reason of your choice.
Your goal is to design, deploy and successfully implement their business requirements using all or any of the following:
• Switches
• Routers
• Workstations
• Operating systems
• Routing protocols
• IP addressing: hosts, subnet addresses, broadcast addresses
• Router-based DHCP server

You are required to design topologies for the three sub-networks for approval. You can use Cisco Packet Tracer or any other program to develop your topology diagrams. You must document each step you have taken, including your research sources. Any information that you recommend must be supported by references, such as Internet links, printed documents, etc.
You can earn extra credit for this assessment by providing more than the minimum requirements (inform your lecturer if you wish to earn extra credits):
• Wireless networks
• Data traffic filtering (firewall)
• ACLs & wildcard masks
• Static routes
• Default routes
• Alternate path determination

Posted Date: 5/27/2012 6:02:25 AM | Location : United States

Related Discussions:- Internetworking, Assignment Help, Ask Question on Internetworking, Get Answer, Expert's Help, Internetworking Discussions

Write discussion on Internetworking
Your posts are moderated
Related Questions
Question 1: a) A distinction is often made between computer architecture and computer organisation. Describe, using examples, the meaning of computer architecture. b) Name

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

Write a method called Grade that takes a numeric score and returns a letter grade. Use the rule that 90 to100 is an A, 80 to 89 a B, 60 to 79 is a C, 45 to 59 is a D, and less th

StatefulServer, maintains some information between requests. Requires smaller messages, since some information is kept between contacts, example: FTP, telnet. Stateless Server req

To satisfy client needs through proxy server and not through main server, as some other user have already accessed that file and its copied to the proxy server, so next time a user

Backup Storage: Back up (backing) storage, also termed external storage, is used to hold programs and data which are read into internal storage when required. The most common

A Patient Registry Name, Surname and Address  Sex  Caste  Contact Numbers  Area (Rural/Urban/Suburban)  City/District  State  General Examination deta

Hi are you doing an interactive powerpoint porject

whats the out put of int main(){ int n=310; funcone(n); functwo(&n); cout return 0; } void funcone(intn) n=240; } void func two(intn*) { n=120; }