Networking concepts and applications, Computer Networking

Assignment Help:
iLab 2: Office Network Expansion

Connect to the iLab here.


Submit your assignment to the Dropbox located on the silver tab at the top of this page.
(See "Due Dates for Assignments & Exams" in the Syllabus for due dates.)

i L A B O V E R V I E W
Scenario/Summary

In this lab, we will be simulating an office network that evaluates the effects of a proposed expansion.


Deliverables
Item Points
Step 1: Small Internet Works - Analysis of Simulation 15
Step 2: Screenshot 15
Total Points 30
i L A B S T E P S
STEP 1: Small Internet Works

The following tutorials will lead you through creating a network simulation. You will first be creating the existing office network. Next, you will run the simulation of the current office network to get a baseline to compare the effects of the expansion. Then, you will create a second scenario that includes the expansion. You will run this simulation and compare the results of the expansion on the network with the current office network.
• Open the IT Guru 15 tutorials
• Expand the tutorials link
• Expand the basic tutorials link
• Expand the small internetworks link and complete the Introduction, Getting Started, Creating the Network, Collecting Statistics, Viewing the Results, Expanding the Network, and the Comparing Results sections.

STEP 2: Screenshot

After completing the IT Guru Small Internetworks tutorial, take a screenshot using Ctrl + prtsc or another screen capture utility. Arrange the screen so that all items can be seen. The screen must contain the following:
• Final network configuration
• Graph of overlaid results of the server statistics
• Graph of the overlaid results of the global statistics
Click on image to enlarge.

Screenshot Example 1

Click on image to enlarge.

Screenshot Example 2


Paste the screenshot into a Word document.
Include in the Word document containing your screenshot of the final results your written analysis on the proposed expansion. Address the following in your analysis:
• Effect on server load
• Effect on network load
• What would be your recommendation on the expansion?
STEP 3: Submit to the Dropbox

Submit the completed word document to the weekly iLab Dropbox.

Related Discussions:- Networking concepts and applications

List some most useful advantages of token ring, List some most useful advan...

List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It depends excellent throughput under high-load conditions. b. Token Ring

How an ethernet worked, How an Ethernet Worked? The operation of Ethern...

How an Ethernet Worked? The operation of Ethernet can be explained in simple terms as follows: Each computer on the Ethernet Network, also called as a node, operates indepen

How does it optimise handovers in cellular networks, Question: (a) In r...

Question: (a) In relation with a cellular network architecture, describe the following terms: (i) Clusters (ii) Pico cells (iii) Nano cells (iii) Cell breathing (b)

Dns cache poisoning, DNS cache poisoning The DNA cache poisoning gener...

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

What do you mean by protocol, What do you mean by Protocol? In the cont...

What do you mean by Protocol? In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a netw

Illustrate network layer in osi layers model, Q. Illustrate Network Layer i...

Q. Illustrate Network Layer in osi layers model? Network Layer :  This is responsible for addressing messages and data so they are sent to the required destination, and for tr

Describe any good security technology, Describe any good security technolog...

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i

Describe the different steps in distributed problem solving, QUESTION (...

QUESTION (a) Four important benefits of Multi-Agent Systems are modularity, efficiency, reliability and flexibility. Briefly explain these benefits (b) Agents work together

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

Show the tcp connections, Q. Show the TCP connections? Connection estab...

Q. Show the TCP connections? Connection establishment Three-way handshake Why is two-way handshake not enough? Connection termination Four steps

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd