Networking concepts and applications, Computer Networking

iLab 2: Office Network Expansion

Connect to the iLab here.


Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See "Due Dates for Assignments & Exams" in the Syllabus for due dates.)

i L A B O V E R V I E W
Scenario/Summary

In this lab, we will be simulating an office network that evaluates the effects of a proposed expansion.


Deliverables
Item Points
Step 1: Small Internet Works - Analysis of Simulation 15
Step 2: Screenshot 15
Total Points 30
i L A B S T E P S
STEP 1: Small Internet Works

The following tutorials will lead you through creating a network simulation. You will first be creating the existing office network. Next, you will run the simulation of the current office network to get a baseline to compare the effects of the expansion. Then, you will create a second scenario that includes the expansion. You will run this simulation and compare the results of the expansion on the network with the current office network.
• Open the IT Guru 15 tutorials
• Expand the tutorials link
• Expand the basic tutorials link
• Expand the small internetworks link and complete the Introduction, Getting Started, Creating the Network, Collecting Statistics, Viewing the Results, Expanding the Network, and the Comparing Results sections.

STEP 2: Screenshot

After completing the IT Guru Small Internetworks tutorial, take a screenshot using Ctrl + prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen must contain the following:
• Final network configuration
• Graph of overlaid results of the server statistics
• Graph of the overlaid results of the global statistics
Click on image to enlarge.

Screenshot Example 1

Click on image to enlarge.

Screenshot Example 2


Paste the screenshot into a Word document.
Include in the Word document containing your screenshot of the final results your written analysis on the proposed expansion. Address the following in your analysis:
• Effect on server load
• Effect on network load
• What would be your recommendation on the expansion?
STEP 3: Submit to the Dropbox

Submit the completed word document to the weekly iLab Dropbox.
Posted Date: 11/21/2012 7:03:31 PM | Location : United States







Related Discussions:- Networking concepts and applications, Assignment Help, Ask Question on Networking concepts and applications, Get Answer, Expert's Help, Networking concepts and applications Discussions

Write discussion on Networking concepts and applications
Your posts are moderated
Related Questions
Thus now you know how packets travel from one computer to another computer over the Internet. however what's in-between? What in fact makes up the Internet infrastructure or backbo

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

Distance vector-based routing algorithms (also called as Bellman-Ford algorithms) pass periodic copies of a routing table from router to router. Regular updates among routers commu

Short for Internet Message Access Protocol. This is another most prevalent protocol of internet standard for email usage apart from POP. Usually all the modern email server and cli

Dynamic Process Groups To generate and manage dynamic groups, a separate library libgpvm3.a must be connected with the user programs that make use of any of the set functions.

What is point to point link? It refers to a direct connection among two computers on a network. A point to point connection does not require any other network devices other tha

Used in IP Networks to break up larger networks into slighter subnetworks. It is used to decrease network traffic, Optimized network performance, and make simpler management i.e. t

These two command show the cisco IOS filename a) show ver b) show flash

What is Internet? Internet is a collection of networks or network of networks. Various networks like LAN and WAN connected by suitable hardware and software to work in a seamle

Explain the term- Encryption Because all of the user traffic, as well as control traffic, is digitized in second generation systems, it is a relatively simple matter to encrypt