Case study - networks and switching

Assignment Help Computer Networking
Reference no: EM1374356


This Case Study will require you to
1) Build a small network using three switches and one router
2) One switch will run as a distribution layer switch, the other two will run as access layer switches
3) A router will be connected to the distribution layer switch using 802.1Q trunking to route between subnets
4) The switches will be connected with two Ethernet links using Ether-channel bonding
5) The distribution layer switch will be con?gured as the STP root bridge


Your Lab Supervisor will provide your group with your:

  •  Company/orgnaisation name
  •  Allocated network address information
  •  Subnetting requirements for four LANs to operate within your organisation
  •  VLAN numbers and VLAN names for each of the four LANs
  •  Network Management VLAN to use in your network

These details will be provided once you have registered your group within ESP and provided those details to your supervisor.


The logical topology for the organisations network is depicted in the ?gure below. Your organisation consists of four LANs which will each be connected to a single router to route traf?c between subnets.

688_Build a small network using three switches and one router1.png


Your Lab Supervisor has provided you with a network address (and subnet mask) and subnetting requirements for each of your four LANs. When subnetting your network to accomodate the required hosts for each of your four LANs, you must:

  •  Ensure that you have enough subnets to address the entire network
  •  Allocate a subnet for the management network (switches and routers) large enough to cover network growth of double the current ammount of infrastructure
  •  Subnet optimally such that the largest number of IP addresses within your allocated network remain for future expansion

In your ?nal report, you must explain your subnetting process and show your calculations.


You have been provided with ?ve VLAN identi?ers for your network, one for each of your four LANs and one for your management VLAN. You have been provided with appropriate names for the VLANs covering the subnets. The physical topology of your network must match the network diagram below.

1427_Build a small network using three switches and one router.png

For each port on the four network devices, you must nominate:

  •  Whether it will operate in access or trunking mode
  •  Which VLANs are allocated to which ports, and on which switches
  •  Which ports will be disabled

In your ?nal report, you must explain your decision process for switch port allocation.


You are required to con?gure all switches and routers with the following information:

  •  Device names
  •  Message of the Day
  •  Interface descriptions
  •  Console and Enable passwords
  •  ssh Access
  •  All router interfaces are to have the lowest usable IP address of their allocated subnet

Further, all switches should be con?gured such that:

  •  Unallocated ports are disabled
  •  Appropriate switch-port security is con?gured

In your report you will need to justify your switchport security decisions and con?gurations.


You will be required to con?gure 802.1Q trunking connections between the switches. Each switch will be connected to another switch via two trunking connections where the second connection is used for redundancy purposes.

You will be required to con?gure your network Spanning Tree Protocol to PVST+ and to ensure that the distribution layer switch is the Root Bridge.


Network traf?c has grown since you ?rst built your network. The Ethernet trunking channels are no longer capable of carrying the offered load on their own. A decision has been made to change the redundant trunking connections between each switch into a bundled EtherChannel to double the maximumum throughput.

You must recon?gure your network such that the two links connecting the switches now form an EtherChannel. You must ensure that the distribution layer switch remains the Root Bridge for the Spanning Tree Protocol.

A. Testing

As part of the Case Study, you need to devise and document an appropriate testing regime to ensure that all the following conditions are met:
1) The nominate level of switchport security is functional
2) Full interconnectivity exists between all hosts in all LANs and the management VLAN
3) The redundant trunking links are functional in the event of failure of the primary links
4) The correct switch is con?gured as the PVST+ Root Bridge
5) EtherChannel bundling is correctly con?gured, the channel bandwidth is indeed doubled, and that the root bridge remains properly con?gured
6) ssh access to all network devices is functional


The Case Study submission will consist of two components:

1) Prepare a report

2) A video presentation

A. Report Contents

You are required to produce a report that contains the following information.

Subnetting Discussion

A discussion of your subnetting approach, your calculations for each subnet, why particular subnet masks were chosen and how you allocated the subnets to individual networks

Network Drawing

A complete network drawing detailing allocation of addressing information for all relevant hosts and devices. This documentation must include port and VLAN allocation for all devices

Device Con?guration Summary

Tables containing the device information that is not included within the network drawing, including:

  •  Hostname information
  •  Console, enable and ssh passwords
  •  Assigned interface descriptions and the MOTD
  •  Port security summary

Design Discussion

Discussion of your design and decision making processes and reasoning. These discussions must include:

  •  Swithport allocation reasoning
  •  Port security reasoning and design
  •  Spanning Tree implementation details to de?ne the root bridge
  •  Planning for redundancy and EtherChannel considerations and deployment

Device Output

A copy of the output of the following commands on all devices:
show version
show run
sh ip int brief
sh ip route (routers only)
sh vlan brief (switches only)
sh interface trunk (switches only)

Testing Procedure

An outline of how you built your network and an overview of your testing to verify the complete functionality of your network

Verified Expert

Reference no: EM1374356

Previous Q& A

  Aggregate demand and supply

For each of the following state whether you would make an aggregate demand or aggregate supply diagram and forecast what shift each condition would cause in the AS or AD curve and why so.

  Objective questions based on microeconomics

According to scientific nutritional studies in most nations, income of $1 a day does not provide sufficient food, shelter and clothing to live. Under these situations the medical risk of death is high.

  Important question related to supply

Microeconomics is the study of economics at the individual or micro level. One of the most well known microeconomic models is the production possibilities frontier,

  Estimate expected demand

If we believe that the laws of supply and demand always hold, explainc why is it that the 'popular' gifts for the holidays always sell out early?

  World real gdp and the price level

Assume the recent volcanic events in Iceland, which disrupted European air travel significantly, represented just starting. In other words, assume that experts forecast a world-wide series of big eruptions from active volcanoes.

  Determine factors that influence price elasticity of demand

Select a product you have purchased in the past month from a clothing or shoe store. Explain how each of the four factors contributed to the elasticity of the good.

  Computing the full economic price

Assume the market for natural gas can be explained by, Where P is the price of natural gas per million BTU, Q(D) is the quantity demanded and Q(S) is the quantity supplied of million BTUs of natural gas a day.

  Various forms of market structure

The president of your corporation, Mr. daily, has asked you to make a report describing the many forms of market structure. He describe to you that the report will be handed out to staff prior to the staff meeting next week

  Stabilizing financial systems

This briefing is particularly important because of the global financial crisis that began in 2007. The briefing is required to provide more foundation for the finance team because they are not well versed in international aspects of finance.

  Develop a graphical user interface based java program

Develop a Java program that can communicate with a real SMTP email server for sending emails. TNE 60003 - introduction to network programming, You program should provide a GUI and can successfully send the SMTP commands to the mail server


Write a Review


Similar Q& A

  Explain ethics of developing type of system

Number of citizens and their actions. Clearly this has privacy, implications. Explain the ethics of developing this type of system.

  How many registers available for use by input parameters

Each register window has 32 registers, of which 10 are global variables and 10 are local variables. How many registers would be available for use by input parameters?

  Determine maximum size of set l-tcp sequence number

Determine the maximum size of set L such that TCP sequence number doesn't run out? Remember TCP sequence number field size is 4 bytes.

  Find out rtcp bandwidth will sender be allocated

Let RTP session comprising of four users, all of which are sending and receiving packets to same multicast address. Find out RTCP bandwidth will each sender be allocated?

  Explain public-key cryptography standard

Explain in detail how PKCS (Public-Key Cryptography Standard), when combined with the RSA algorithm, can thwart Eve's attempt at discovering the encrypted figure.

  Find features and capacities for web server computer

Find out the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will require for her site.

  Diagram of simplest connection between two computers

Using Ethernet Network Interface Cards or NICs, diagram simplest connection between two computers which will allow for communications and resource sharing.

  Attacks on servers on one of company-s departments

After reading about attacks on servers like to ones used in one of company's departments, the CIO has asked you to come up with a report as to what.

  Maximum value of l-tcp sequence number are not exhausted

Consider transferring an enormous file of L bytes. What is the maximum value of L such that TCP sequence numbers are not exhausted? Give proper justification?

  Professional nursing organizations in networking

Explain the value that professional nursing organizations in networking and in the legislative process.

  Locate two disaster recovery services used by small business

Use the Web to locate two disaster recovery services that could be used by a small business such as Dirt Bikes. Compare them in terms of the services they offer.

  Find maximum value of l if tcp sequence number not exhausted

Determine the maximum value of L such that TCP sequence numbers are not exhausted? Recall that TCP sequence number field has 4 bytes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd