Compare and contrast the selection of switching protocols

Assignment Help Computer Networking
Reference no: EM13784876

A scientific research project at a large university that plans to sequence the genomes of 100,000 volunteers. The project will also create a set of publicly accessible databases with genomic trait, and medical data associated with the volunteers. Genome4U's fund raising is going well, and the project is building a multistory lab for about 500 researchers. The project network engineers will be implementing a new internetwork for the lab using Cisco switches and routers. The network engineers plan to use EIGRP on the new routers. However, network designs are never that easy. The new internetwork also needs to communicate with many business partners, including a nearby biology lab that uses RIP and a fund-raising office that uses OSPF. The lab also needs Internet access, which it hopes can be achieved by simply connection the network to the university' campus network which has Internet access

Write a two to four (2-4) page paper in which you:

1. Design a plan to integrate the different routing protocols into a new network design for Genome4U's lab.

2. What information will you redistribute between routing protocols?

3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute..

4. Explain how you will overcome the problems..

5. Explain how you will provide Internet access..

The format of the paper is to be as follows:

• Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format..

• Type the question followed by your answer to the question..

• In addition to the two to four (2-4) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the instructor's name, the course title, and the date.

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

Outcomes Assessed

• Compare and contrast the selection of switching and routing protocols to include interior versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP..

• Use technology and information resources to research issues in network architecture and analysis..

• Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics.

Reference no: EM13784876

Questions Cloud

Explaining cyber crime : Explaining cyber crime, Conduct Internet searches on different crimes that could be considered cyber crimes or that could be committed using computers as the primary method
Important for a researcher to document and report procedures : Why is it important for a researcher to document and report the procedures he or she used to collect and analyze data?
How training objectives align with course outcomes : how training objectives align with course outcomes.
Maintain the security in a virtual infrastructure : Describe at least 3 things which can be done to secure/protect or maintain the security in a virtual infrastructure? Please explain, what is the write cache and how does it improve the disk performance in a virtual environment?
Compare and contrast the selection of switching protocols : Compare and contrast the selection of switching and routing protocols to include interior versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP.
Identify the four basic financial statements : Identify the four basic financial statements. Describe the purpose of each of the four financial statements.
What is ability to fast migrate virtual guest machines : Describe at least 3 physical components of virtual infrastructure and what role each of them component servers? what is the ability to fast migrate virtual guest machines from one data center to another for high availability and disaster recovery.
Which should be the province of criminal law : Which of the crimes against morals would you leave to religion and conscience, and which should be the province of criminal law? Why
About individual versus group-level performance recognition : individual versus group-level performance recognition.

Reviews

Write a Review

Computer Networking Questions & Answers

  Clusters can be implemented by leveraging most of the

clusters can be implemented by leveraging many operating systems and applications. in a report of 1-2 pages complete

  What are the pitfalls of networking

By now, we should all know the "benefits" of networking from a technological sense (being more efficient, productive, etc.). However, based on your experience, what are the pitfalls of networking?

  Kind of security drill typical in organization

Which kind of security drill do you believe is the most typical in an organization? Which type of security drill do you believe is the most effective? Why?

  Difference between wats and leased lines

Discuss the differences between Wide Area Telecommunications Service and leased lines?

  Determine prefixes for four subnets

Assume it wishes to create four subnets from this block, with each block having same number of IP addresses. Determine the prefixes (of form a.b.c.d/x) for four subnets?

  Has this network been sub-netted

Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network?

  Previous to the present network set-up your friends shop

your friend has a small design shop with windows nt 4.0 windows 2000 and windows xp workstations. he has one older

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Find features and capacities for web server computer

Find out the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will require for her site.

  Create a final network diagram

Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following: VPN sessions (from laptop) are only allowed to access the desktops in the IT d..

  Soa exposes business services to the wide range of service

service oriented architecture soa is an architectural style for building software applications that use services

  Technical means to guarantee data confidentiality

Assess illustrate why technical means to guarantee data confidentiality depend upon trust.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd