What is the minimum number of access point do you need

Assignment Help Computer Engineering
Reference no: EM131183972

Assignment

Part A

Question 1

USQCollege uses OSPF as the dynamic routing protocol for its campus network. The network is not connected to any ISP and is isolated from the Internet.

The in-house network administrator insisted that the existing authentication process for OSPF is not efficient. So he assigned you to re-programmed OSPF such that the authentication process will apply MD5 to a message and the output will be sent to destination as cipher text. The receiver will apply MD5 and get back the original message.

The network administrator knows that AES is one of the best encryption algorithms we can use. As the next phase of improving the security, he planned to switch from MD5 to AES for OSPF authentication. You are assigned to be in charge of this switching over as your next task.

a) Will you accept the first task or reject it? Explain your reasons for accepting or rejecting the task.
b) Will you accept the second task or reject it? Explain your reasons for accepting or rejecting the task.
c) The network administrator is planning ahead to connect the campus network to an ISP. Assume that the OSPF to be used is the standard version, not the modified version. List and explain the routes to be installed in the boundary router and the ISP router.
d) Assuming the ISP router has an IPv4 address of 200.200.200.1 and the LAN gateway router has an IPv4 address of 201.201.201.1. List the required Cisco commands to install the routes.
e) How can the route to the ISP be transferred to other routers within the campus LAN?

Question 2

Floor plan of the Wolfgang Concern Hall:

541_Floor plan of the Wolfgang Concern Hall.jpg

You are going to implement a wireless network to the Wolfgang Concern Hall using access points with an effective range of 14 meters.

a) What is the minimum number of access point do you need?
b) Show

• In a diagram, show how the concern hall was covered by the wireless range of access points. The diagram should also show the coverage of individual access points.

• Your calculation,
• The data you use for the calculation, and
• Any assumptions you made.

c) Which type of access point (independent, controller based, cluster, cloud) will you use? Explain the reason for your choice.

Question 3

2077_Switched Network of ANZCollege.jpg

Download Q3.pkt.

Q3.pkt simulates the switched network of ANZCollege. Assume all links are of the same cost.
The top two switches are S1 and S5.

a) Why STP allows links L1 and L2 both to be active?
b) Which switch is the root switch?
c) What is the path assigned by STP:

1. From S4 to root switch?

• Explain why other paths are blocked.
• List the root port(s), designated ports and non-designated ports along the path from S4 to root switch.

2. From S5 to root switch?

• Explain why other paths are blocked.
• List the root port(s), designated ports and non-designated ports along the path from S4 to root switch.

d) Explain the port status for the ports of link L7 and link L8.

Question 4

AUssieCollege uses EIGRP as the dynamic routing protocol for its campus network. The network is connected to an ISP using a single router R1.

a) The in-house network administrator is not happy when R1 fails, all users will be disconnected from the Internet. What would you suggest to improve the situation? Justify your suggestion.

b) The AussieCollege LAN uses Cisco switches and is running STP. What would suggest to improve the convergence speed of the LAN network? Justify your suggestion.

c) The network administrator assigns you to implement redundancy for the network. Provide an implementation plan with supporting reasons to the network administrator.

Attachment:- Q3.pkt

Reference no: EM131183972

Questions Cloud

Describe babbage''s contribution to the history of computers : Describe Babbage's contribution to the history of computers. Who was considered the first programmer? Describe her contributions to the history of computers
What is the ph after the addition : What is the pH after the addition of 180.00 mL of NaOH?
Are their constitutional rights being violated : How do these issues apply to the current defendants in the scenario above? Explain in detail. Does this change your thoughts on granting the offender's bond? Why or why not?
Identify potential quality concerns in the traditional areas : Identify potential quality concerns in the traditional areas of machinery, employees, measurements, and materials.- Organize these quality concerns using a cause-and-effect diagram.
What is the minimum number of access point do you need : You are going to implement a wireless network to the Wolfgang Concern Hall using access points with an effective range of 14 meters. What is the minimum number of access point do you need?
Distinguish between the various courtroom participants : Discuss the real-life case that you have selected, in which the defendant accepted a plea bargain as an alternative to trial. Give your opinion on whether or not justice was served in the case in question. Provide a rationale for the response.
Original level of the anesthetic : After 55.59 minutes of surgery the drug began to lose its effect, but more surgery was required. How many moles of the anesthetic must be re-administered to restore the original level of the anesthetic?
Develop new commercial products and services : This financing program spans 11 government agencies and is designed to encourage small companies to expand their research and development efforts in science and engineering and to develop new commercial products and services from those efforts
Draw a graph that models the swimmer''s depth : Draw a graph that models the swimmer's depth below the water's surface over time.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd