Analysis of the current network

Assignment Help Computer Networking
Reference no: EM131652387

Purpose of the assessment

Main purpose of this assignment is to enable student to configure networking devices for a given business case study and understand limitations of a network design. After successful completion of this assignment, students should be able to:
a. Investigate and resolve appropriate design and solutions for medium sized organisations.
b. Analyse and report on the current and future state of the management of internetworking infrastructure and its applications.
c. Discuss a roadmap process to use internetworking architecture to support long- term business goals.
d. Implement a process to support the administration and management of internetworking.

Assignment Specification

Description

Report should include commands used to configure network devices, an analysis of the current network configurations as per requirements given below, and a demonstration of working of your designed network. You must Discuss step by step process to build the network for the chosen business case study from your assignment 1.

Write a report with the following contents

Design a detailed Network in Netsim (You must not use packet tracer) which includes
- Minimum of 4 switches (include series, model from your suggested first assignment report details)
- Minimum of 3 routers (include series, model from your suggested first assignment report details)
- 4 PCs

Network device configurations
a. Switch configuration:
- set hostname as your name
- set system clock to May 2017 10:00 am
- display the name of the file and version of IOS
- display the name of the interfaces
- display 6 IOS modes

b. Router configuration
- set hostname as your family name
- set system clock to Jun 2017 1:00pm
- display the name of the file and version of IOS
- display the name of the interfaces
- display 6 IOS modes

Network device configurations
a. Switch configuration:
- Set IP addresses on PC and switch
- Create VLAN
- Ping each other
- Set VTP domain with your first name
- Set VTP password with your family name
- Demonstrate VTP packets

b. Router configuration
- set descriptions on interfaces, one with your name, second with your family name, third with your middle name
- display information about directly connected devices to router
- Setup IP addresses for each interfaces
- What is the subnet mask did you use?
- Ping all 3 routers.

Analysis of the current network: Analyse the current network configurations and suggest two application scenarios (other than your chosen case study) where you can implement your current network design. Provide justifications for each of your suggested scenario.

Reference no: EM131652387

Questions Cloud

Transport layer provides two service protocols : The Transport layer provides two service protocols: UDP and TCP. Explain the differences between the two protocols in terms of guaranteed.
What will be the amount of depreciation expense : On Jan 1st, 2006, a company purchased a fixed asset for $40,034, with a residual value of $4,338, What will be the amount of depreciation expense for 2009
What is the goal of medicine : What if Adam doesn't take well to the transplant and dies anyway. What will they tell their new child one day if the questions asked about the circumstances
Overcome each of the project constraints : What is the reason (for each constraint) that it is so hard to overcome each of the project constraints (scope, time, cost, and quality) in information systems/
Analysis of the current network : MN503 - Network design with configuration - Investigate and resolve appropriate design and solutions for medium sized organisations
Calculate sampling error associated with mean of sample : Calculate the sampling error associated with the mean of this random sample. What would you tell this advisor regarding the sample he has selected?
Implemented and function differently : What are the differences between NTFS disk quotas and FSRM quotas? How do each actually determine usage?
Write a term paper about security administrator handbook : Write a term paper about Security Administrator Handbook. Develop the policies section of the handbook and include two to three pages for each policy.
Define clinical significance are essentially the same : Study results that aren't statistically significant can't be clinically significant

Reviews

inf1652387

12/19/2017 5:03:10 AM

i attached the file.Have a look thank you 25158113_1MN503 T2 Assessment-2 MEL-SYD V20172.pdf payment done i want my first name on switches as a hostnames nd family name on routers hostname. Already mention in file. in the diagram routers and switches names are on my name then it should b same in console screen. I am sending you screenshot pla have a look . 25158161_104488ABD-8455-4A8D-9E40-690A4469BDF5.png

len1652387

9/21/2017 6:38:40 AM

Week 11, demonstrate during laboratory class and submit report on Moodle ? All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len1652387

9/21/2017 6:38:29 AM

Analysis of the current network -Analyse the current network configurations and suggest two application scenarios (other than your chosen case study) where you can implement your current network design. -Provide justifications for each of your suggested scenario. 5 5 Total 60

len1652387

9/21/2017 6:38:23 AM

Router configuration - set descriptions on interfaces, one with your name, second with your family name, third with your middle name - display information about directly connected devices to router - Setup IP addresses for each interfaces - What is the subnet mask did you use? - Ping all 3 routers. 5 Demonstration Demonstrate switch and router configuration in week 11 laboratory class 20 Troubleshooting steps Write details of problems faced during configurations, and how you solved it (troubleshooting). 5

len1652387

9/21/2017 6:38:15 AM

Network device configurations - Router configuration - set hostname as your family - set system clock to 3:30pm - display the name of the file and version of IOS - display the name of the interfaces - display 6 IOS modes 5 Switch configuration - Set IP addresses on PC and switch - Create VLAN - Ping each other - Set VTP domain with your first name - Set VTP password with your family name - Demonstrate VTP packets 6

len1652387

9/21/2017 6:38:09 AM

Marking criteria Section to be included in the report Description of the section Marks Detailed Network Design in Netsim - Minimum of 4 switches - Minimum of 3 routers - 4 PCs 4 Network device configurations - Switch configuration - set hostname as your name - set system clock to Feb 2017 11am - display the name of the file and version of IOS - display the name of the interfaces - display 6 IOS modes 5

Write a Review

Computer Networking Questions & Answers

  What is the full address of the abbreviated ipv6

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation.

  1 fredericton development inc purchased land that will be

1. fredericton development inc. purchased land that will be the site of a new condominium complex. the company has

  Divide network in two vlans for clients and server

In your network, you could use layer 3 switch, divide the network in two VLANs, one for clients, another one for  server and route between them using routing capabilities.

  Describe the methodology behind constructing one

Define a work breakdown structure and describe the methodology behind constructing one. Summarize the project requirements and other assumptions (e.g., budget, human resources, workload, environmental dependencies, etc.)

  Explain why asynchronous io activity is a problem with many

explain why asynchronous io activity is a problem with many memory protection schemes including basebounds and paging.

  How effective is the firewall in the current network

How effective is the firewall in the current network? Identify the network applications that are a part of the current network.

  Explain how many dns servers are enough by using the

how many dns servers are enough? using the internet and any other sources of information come up with some guidelines

  Write a three-page summary a successful penetration test

Using MS Word, write a three-page summary describing a successful penetration test. What penetration tools and techniques do you feel would be needed in a successful penetration test?

  Explain why most telephone company circuits are now digital

Explain why most telephone company circuits are now digital. What is coding? Briefly describe three important coding schemes.

  Do you think cert should continue to post security holes

Some experts argue that CERT's posting of security holes on its Web site causes more security break-ins than it prevents and should be stopped. - What are the pros and cons on both sides of this argument?

  I outlinethis case study will require you to1 build a small

i. outlinethis case study will require you to1 build a small network using three switches and one router2 one switch

  Set up a network consisting of pcs-routers and servers

You are required to set up a simple network using minimum three PCs and minimum two routers, or use simulation software to set up the same network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd