Design the prototype of the network using packet tracer

Assignment Help Management Information Sys
Reference no: EM131516840

Data Communication and Networks Assignment

Purpose of the assignment:

The purpose of this assignment is to exercise and develop skills required to analyse and design networks to address the need of clients. In this assessment, students will be able to

  • Understand the basic concepts and principles of technology relating to electronic data communications and computer networking
  • Demonstrate a basic understanding of terminology of network communications technology, network operating systems and network applications
  • Articulate the difference between different types of network configurations and indicate the situations in which various options are best/most appropriate
  • Understand and explain different role of networking and network operating systems for information systems
  • Appreciate the need for different types of networks

Assignment requirements:

All three scenarios should be addressed. Use the instructions within each scenario to prepare a report. Each scenario has a discussion component and a network prototype component. Please present the discussion components in a Word document and screenshots of the network prototypes. Network prototypes should be submitted as .pkt files.

Scenario 1:

You must install a network with 20 computers for a new business that wants to run TCP/IP and have access to the Internet. The ISP in town will assign you only two public IP addresses, so you decide to assign the computers addresses in the range of 172.16.1.1/16 to 172.16.1.125/16. You also need to install a network monitoring tool on the central server to monitor network activities which shows status of each computer in the network. You need to report the following to your supervising boss before you are assigned with the project.

Part II:

  • Produce a report that states all the required hardware and software to implement this network.
  • Design the prototype of the network using Packet Tracer and describe it in the report.

You need to submit the .pkt file of your prototype created in Packet Tracer.

Scenario 2:

You are hired as a consultant to place a WiFi network (for 50-60 customers) for which you need to carry out WiFi scanning, to notify you of all the nearest and closest Access points (APs), as well as to identify if the networks are 802.11/a, 802.11/b, 802.11/g.

Also, its main features should include AP information (SSID, MAC Address) and signal quality chart. Your wireless network should be supported by 2 servers (Web and email servers) that are connected to LAB of 20 users. You need to report the following to your supervising boss before you are assigned to the project.

Part II:

Produce a report that states all the required hardware and software to implement this network.

Design the prototype of the network using Packet Tracer and describe it in the report.

You need to submit the .pkt file of your prototype created in Packet Tracer.

Scenario 3:

You have been called in to consult on a new network design for CNT Books. The requirements of this design are summarized as follows:

The building has three floors.

There are 300 user workstations and 10 servers.

Users must be grouped according to the projects they're working on, but the users for each project are located on all three floors.

There must be fault tolerance for communicating between the floors.

Performance analyzing tool to evaluate performance and QoS of the network.

Part II:

Produce a report that states all the required hardware and software to implement this network.

Design the prototype of the network using Packet Tracer and describe it in the report.

You need to submit the .pkt file of your prototype created in Packet Tracer.

Reference no: EM131516840

Questions Cloud

Discuss mcgregors theory of work motivation : Discuss Maslow's theory and detail the criticisms that have been levelled against it. Discuss McGregor's theory of work motivation
Research and secure the sec 10-k annual report : Research and secure the SEC 10-K Annual Report - include a brief introduction of your company as well as a conclusion/summary at the end.
What are the strengths and key resources : Company - what are the strengths and key resources, what are some of the weaknesses? What are the opportunities and threats
Why is virus an exception of cell theory : why is virus an exception of cell theory
Design the prototype of the network using packet tracer : HS1011 Data Communication and Networks Assignment. Design the prototype of the network using Packet Tracer and describe it in the report
Difference between an abstract class and a interface : Describe the difference between object oriented programming and procedural programming? Start by discussing what each model attempts to do
Explain in detail the security controls : Explain in detail the security controls that could be implemented to protect from the five (5) selected logical threats
Research issues in business and society : Evaluate the influences of changing economic, political, social, cultural, and technological forces on business and society.
Explain the benefit that the sap solutions you selected : Do you agree with them? Discuss and analyze. Explain why you agree or disagree. Explain the benefit that the SAP solutions you selected bring to an organization

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create a query that will select customers

Create the database, including loading the data from the spreadsheet into Access and establishing the Relationships. Label the database with your last name and HW#6 - Create a query that will select records for customers who had their first pickup..

  Prepare a recommendation for the port authority

The Port Authority uses a 10 percent discount rate for capital improvement projects. - assume a 10-year planning horizon, and prepare a recommendation for the Port Authority.

  How information systems is related to the self driving car

You need to write 4-5 pages. The group paper is focused on how Information Systems is related to the self driving car. Wriye about how your articles tie into this, if needed you can use more articles.

  Explain how health care organizations use secondary data

Write a paper comparing and contrasting the collection of secondary data and their uses versus the analysis of current health care records and internal data such as incident reports and patient surveys. Explain how health care organizations use se..

  Explain the best security practices in patch management

Explain the best security practices in patch management, configuration management to avoid and software security issues.

  Business data networks and security

Write a 2- to 3-page paper that is a narrative describing how these exercises went for you, what your learned, and how you plan to use this information moving forward

  Analyze at least three such vulnerabilities

Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate.

  Security trends countermeasures and threatsresearch current

security trends countermeasures and threatsresearch current security trends countermeasures and threats. what will be

  Provide a link to the article or attach a copy of article

Locate a current article about Technology that has been published within the last 6 months. Good online sources can be found by looking at the Internet references at the end of each selection in Annual Editions.Provide a Link to the article or atta..

  Explain the role of us-cert in protecting nations industry

Explain the high-level planning needed for an industrial systems organization that utilizes ICS technologies to prepare for attacks from cyber threats.

  Analyze the characteristics of elastic traffic

Provide five examples of inelastic traffic not discussed in the text and validate their inclusion as inelastic.Analyze the characteristics of elastic traffic to determine why this is used on the Internet.

  Business process management

In this writing assignment, you will explore how organizations use business process management (BPM). Write a one-page (250-word) paper explaining how organizations use business process management (BPM). Be sure to use at least one specific example f..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd