Describe in detail all issues associated with layer 2 loops

Assignment Help Computer Networking
Reference no: EM13463675

After evaluating and completing support for high-definition IP cameras to enhance security for DeVry University, you have completed a design of the network switching infrastructure that fully supports both the existing data traffic and the additional HD camera traffic, according to requirements. Last week, you discussed your template of configurations with the network manager.

Over the past couple of months, the university has experienced a number of issues with Layer 2 loops and the loss of VLANs. We discovered that a student connected a switch that was purchased at a local garage sale to the network and inadvertently bridged the network, causing a Layer 2 loop. The switch also wiped out the VLANs on the upstream switches. Be sure to describe how your implementation will prevent this type of problem in the future.

Your manager is concerned with the network's inability to self-heal when experiencing these types of network issues. As the network engineer, he has asked you to do a network assessment on the network's health and how to prepare the network for any future STP and VTP issues.

Design Requirements

Your configuration template should address each of the following requirements.

1. Layer 2 spanning-tree loop avoidance

a. Spanning-tree mode (RSTP, MST or STP)

b. STP loop avoidance features

2. VTP mode standardization

a. Server and Client

a. VTP version

b. VTP authentication scheme

c. VTP pruning

b. Transparent

c. VTP trunking protocol

a. 802.1dq(dot1q)

b. ISL

3. Deliverables

You are required to prepare a detailed network report for your manager at the next scheduled meeting.

Your report should follow these guidelines.

1. Describe in detail all issues associated with Layer 2 loops and VTP. Which switches in your recommended design should be STP roots for which VLANs? Which STP mode do you recommend? Justify your selection.

2. Present best design practices to minimize Layer 2 loops and VTP.

3. Note: Now that you have gained more knowledge about the construction and operation of a switch-based network, you may realize that your original design needs to be modified. This is not unusual. If you discover that you need to modify your original design or standardized configuration, resubmit your topology or configuration, identify any changes that you made, and explain in your report what you learned that prompted you to make the modification and describe how it will improve the operation of the network.

IMPORTANT: A report template is provided beginning on the next page, and you must use it to submit your assignment. Before submitting your assignment, delete the first pages of this document containing the instructions.

Your submitted assignment should begin with the title page and only contain your report.

Reference no: EM13463675

Questions Cloud

Conduct an internet search to locate an example of a : discussion question 1. conduct an internet search to locate an example of a private network and a public network. how
Discuss the possibility of using fiber optic cable instead : assignment 1 the benefits of twisted pair cable due week and worth 100 points you are a recently hired consultant for a
Design a grade average program by using raptor which will : design a grade average program using raptor that will produce the numerical grade average of test scores input by a
Forgiveness can be integral part in conflict resolution and : forgiveness can be an integral part in conflict resolution and even a strong factor in psychological and physical
Describe in detail all issues associated with layer 2 loops : after evaluating and completing support for high-definition ip cameras to enhance security for devry university you
Supporting an autonomous and positive face can be : supporting an autonomous and positive face can be challenging. there are times when an autonomous and positive face
Oracle provides erp solutions for mid-size business : oracle provides erp solutions for mid-size business organizations. for this assignment you are to write a research
Supposing that budgetary factors affect mass communication : assuming that budgetary factors affect mass communication what media might providers incorporate that have the lowest
Recognize the features of the internet that you require to : identify the features of the internet that you need to use in your mobile or home office including the followingwhich

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd