Networking concepts and applications, Computer Networking

iLab 2: Office Network Expansion

Connect to the iLab here.

Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See "Due Dates for Assignments & Exams" in the Syllabus for due dates.)

i L A B O V E R V I E W

In this lab, we will be simulating an office network that evaluates the effects of a proposed expansion.

Item Points
Step 1: Small Internet Works - Analysis of Simulation 15
Step 2: Screenshot 15
Total Points 30
i L A B S T E P S
STEP 1: Small Internet Works

The following tutorials will lead you through creating a network simulation. You will first be creating the existing office network. Next, you will run the simulation of the current office network to get a baseline to compare the effects of the expansion. Then, you will create a second scenario that includes the expansion. You will run this simulation and compare the results of the expansion on the network with the current office network.
• Open the IT Guru 15 tutorials
• Expand the tutorials link
• Expand the basic tutorials link
• Expand the small internetworks link and complete the Introduction, Getting Started, Creating the Network, Collecting Statistics, Viewing the Results, Expanding the Network, and the Comparing Results sections.

STEP 2: Screenshot

After completing the IT Guru Small Internetworks tutorial, take a screenshot using Ctrl + prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen must contain the following:
• Final network configuration
• Graph of overlaid results of the server statistics
• Graph of the overlaid results of the global statistics
Click on image to enlarge.

Screenshot Example 1

Click on image to enlarge.

Screenshot Example 2

Paste the screenshot into a Word document.
Include in the Word document containing your screenshot of the final results your written analysis on the proposed expansion. Address the following in your analysis:
• Effect on server load
• Effect on network load
• What would be your recommendation on the expansion?
STEP 3: Submit to the Dropbox

Submit the completed word document to the weekly iLab Dropbox.
Posted Date: 11/21/2012 7:03:31 PM | Location : United States

Related Discussions:- Networking concepts and applications, Assignment Help, Ask Question on Networking concepts and applications, Get Answer, Expert's Help, Networking concepts and applications Discussions

Write discussion on Networking concepts and applications
Your posts are moderated
Related Questions
Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

What is LTE ?

Internet  Mail Access Protocol Another  mail access  protocols  is internet  mail access  protocols  version 4 (  IMAP4). IMAP4 is  similar to POP3 but it  has more  feature

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

The bitonic sorting network needed log n number of stages for performing the task of sorting the list. The first n-1 stages of the circuit are able to sort two n/2 numbers and the

State the term - Lot of care required while programming It is a common and well-known saying that many developers of "secure systems" leave a "back door" way for themselves so

Can you describe in a generic manner the packet of IPSec

What is the Gateway A Gateway is a device like a mini or microcomputer capable of operating on a standalone basis but which also gives connection for communication with the oth

Question: (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, r

The IP class procedure does not split the 32-bit address space into same size class and the classes do not have the same value of networks. A prefix of n bits gives 2n unique ne