Formulate and analyse a network design

Assignment Help Computer Network Security
Reference no: EM132961562

Networking Technologies Assignment

Objectives
The objective of this assignment is to assess your understanding of fundamental networking structure and network design concepts, and your ability to apply them to practical exercises using a tool (Packet Tracer).

Learning Outcome 1: Analyse and evaluate network technologies and services using a layered approach and network standards.
Learning Outcome 2: Formulate and analyse a network design for small medium enterprise networks.

Preparation
1) This assignment requires students to produce a Panopto video based on task instructions below. This assignment requires video recording equipment such as a notebook equipped with a camera, as well as the software Panopto (in Blackboard). If required, you can borrow a laptop from the library.
2) You should be familiar with Panopto in Blackboard and Packet Tracer for this assignment. It is recommended that you carefully follow the Panopto instructions when submitting your work. It is your responsibility to submit a video and a Packet Tracer (pkt) file correctly according to the instructions. Make sure you select the ‘Panopto Student Video Submission' option as shown below. Otherwise, it will not be successfully submitted.

IMPORTANT: If you submit your video via the wrong option it may delay the marking of your assessment and/or lead to late penalties. It is the responsibility of students to watch these video instructions and to follow them closely. You can edit your submission multiple times prior to the due date.
3) Practice recording a few times to keep within the time limit, and use the rubric as a guide, as it will be used for grading. Check here to learn how merge videos if necessary. Visit the Panopto for Students intranet site for more resources, and watch the video in the submission folder paying particular attention to the right Mashup tool for submission.

Requirements:
Watch this video before submitting your assignment
You will need to show footage of yourself completing each task, as well as footage of yourself speaking to the camera about each task.

1025_figure.jpg

Figure 1 Network topology.

Task 1 Network Design and Plan
Design and configure routers and hosts (but switches) in the network by allocating each IP addresses in an appropriate and minimal range (to maximise the spare ranges for future use) as shown in Figure 1 using Packet Tracer, and verify the connectivity fully works across the network including inter and intra networks.
Notes:
1. Use ‘ping' to verify connectivity ‘successful' status
2. Display names and IP addresses of devices and interfaces on the Packet Tracer screen
3. Use/design smallest subnet mask for each network where possible
4. Show the subnetting scheme in a single page in your presentation
5. Check ‘no auto-summary' command, which will be required to configure routing protocol such as RIP
and EIGRP

Task 2 Layer 2 Implementation and Analysis
In Subnet A, redesign and configure the network to allocate VLAN10 and VLAN 20 for 2 hosts by allocating each IP addresses in an appropriate range. Check connectivity within the same and different VLANs.
Demonstrate how Layer 2 and Layer 3 work differently by enabling and disabling the R1 interface, and analyse the results and explain why it was a ‘success' or ‘failure'.

Task 3 Layer 3 Evaluation
In Subnet B, clear the ARP table of devices, and ping from a host in Subnet B to a host in Subnet C. Evaluate and analyse how Layer 2 and Layer 3 addresses (source and destination) are allocated in each network's ingress and egress interfaces. For example, what address is and is not changed at the router interfaces with Subnet A and C? Explain why and justify your answers.

Attachment:- Networking Technologies.rar

Reference no: EM132961562

Questions Cloud

How much will you pay for the property : You are considering the purchase of real estate that will provide perpetual income that should average $72,000 per year. How much will you pay for the property
Prepare a statement of cost of goods manufactured : Prepare a statement of cost of goods manufactured and an income statement for Fair Wind Yachts for the year ended December 31
Estimate the expected long-run dividend growth rate : Estimate the expected long-run dividend growth rate if an investor expects to earn the average historic return of 8.2%
Analyse and evaluate network technologies and services : Analyse and evaluate network technologies and services using a layered approach and network standards - Generate and capture your own TCP/IP traffic and packets
Formulate and analyse a network design : Formulate and analyse a network design for small medium enterprise networks - understanding of fundamental networking structure and network design concepts
Estimate purchases for June and July : Parts are purchased at a wholesale price of $20. Lakeside purchased 16,000 parts in May. Estimate purchases (in units) for June and July
Design for small medium enterprise networks : Analyse and evaluate network technologies and services using a layered approach and network standards - design for small medium enterprise networks
Identify the sequence of actions you need to take : Identify the sequence of actions you need to take to start this decision process. Propose a risk profile for each choice
Calculate the reduction percentage for the missy : Calculate the reduction percentage for the Missy top department for Fall if gross sales are $5,750,000 and the reduction dollars are $3,160,000

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd