Customer Service Chat
Get quote & make Payment
Networking concepts and applications, Computer Networking
iLab 2: Office Network Expansion
Connect to the iLab here.
Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See "Due Dates for Assignments & Exams" in the Syllabus for due dates.)
i L A B O V E R V I E W
In this lab, we will be simulating an office network that evaluates the effects of a proposed expansion.
Step 1: Small Internet Works - Analysis of Simulation 15
Step 2: Screenshot 15
Total Points 30
i L A B S T E P S
STEP 1: Small Internet Works
The following tutorials will lead you through creating a network simulation. You will first be creating the existing office network. Next, you will run the simulation of the current office network to get a baseline to compare the effects of the expansion. Then, you will create a second scenario that includes the expansion. You will run this simulation and compare the results of the expansion on the network with the current office network.
• Open the IT Guru 15 tutorials
• Expand the tutorials link
• Expand the basic tutorials link
• Expand the small internetworks link and complete the Introduction, Getting Started, Creating the Network, Collecting Statistics, Viewing the Results, Expanding the Network, and the Comparing Results sections.
STEP 2: Screenshot
After completing the IT Guru Small Internetworks tutorial, take a screenshot using Ctrl + prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen must contain the following:
• Final network configuration
• Graph of overlaid results of the server statistics
• Graph of the overlaid results of the global statistics
Click on image to enlarge.
Screenshot Example 1
Click on image to enlarge.
Screenshot Example 2
Paste the screenshot into a Word document.
Include in the Word document containing your screenshot of the final results your written analysis on the proposed expansion. Address the following in your analysis:
• Effect on server load
• Effect on network load
• What would be your recommendation on the expansion?
STEP 3: Submit to the Dropbox
Submit the completed word document to the weekly iLab Dropbox.
Posted Date: 11/21/2012 7:05:18 PM | Location : United States
Ask an Expert
Networking concepts and applications, Assignment Help, Ask Question on Networking concepts and applications, Get Answer, Expert's Help, Networking concepts and applications Discussions
Write discussion on Networking concepts and applications
Your posts are moderated
Write your message here..
Connection, how to connect two pc in lan?
how to connect two pc in lan?
Error detection-general, Q. Error Detection-General? Sender transmi...
Q. Error Detection-General? Sender transmits every data unit twice Receiver performs bit-by-bit comparison between those two versions of data. Any mismatch would
Difference between the communication and transmission, Communication is the...
Communication is the process of sending and receiving data by means of a data cable that is associated externally. Transmission means the transmitting of data from the source to
Name the ip addresses which come in ipv4, How many IP addresses can come in...
How many IP addresses can come in IPV4?
What is stop-and-wait protocol, What is Stop-and-Wait Protocol? In Stop...
What is Stop-and-Wait Protocol? In Stop and wait protocol, sender sends single frame, waits unless it receives confirmation from the receiver (okay to go ahead), and then sends
Message passing programme development environment, Message Passing Programm...
Message Passing Programme Development Environment In a multicomputer system, the computational load among various processors must be balanced. To pass information among variou
Tools that an attacker can use to crack wep, Question: Consider that yo...
Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f
Layer of security, Other than performance issues, there could be security ...
Other than performance issues, there could be security reasons for using something like xinetd. Make simple design in which a new version of xinetd gives a layer of security.
Modern computer , modern technology in world of 21 century
modern technology in world of 21 century
What is message oriented middleware, What is Message Oriented Middleware (M...
What is Message Oriented Middleware (MOM)? MOM permits general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over n
Accounting Assignment Help
Economics Assignment Help
Finance Assignment Help
Statistics Assignment Help
Physics Assignment Help
Chemistry Assignment Help
Math Assignment Help
Biology Assignment Help
English Assignment Help
Management Assignment Help
Engineering Assignment Help
Programming Assignment Help
Computer Science Assignment Help
Why Us ?
~24x7 hrs Support
~Quality of Work
~Time on Delivery
~Privacy of Work
Human Resource Management
Literature Review Writing Help
Follow Us |
T & C
Copyright by ExpertsMind IT Educational Pvt. Ltd.