Build a small network using three switches

Assignment Help Computer Networking
Reference no: EM13115212

I. OUTLINE

This Case Study will require you to

1) Build a small network using three switches and one router
2) One switch will run as a distribution layer switch, the other two will run as access layer switches
3) A router will be connected to the distribution layer switch using 802.1Q trunking to route between subnets
4) The switches will be connected with two Ethernet links using Ether-channel bonding
5) The distribution layer switch will be configured as the STP root bridge

II. CASE STUDY DETAILS

Your Lab Supervisor will provide your group with your:
 Company/orgnaisation name
 Allocated network address information
 Subnetting requirements for four LANs to operate within your organisation
 VLAN numbers and VLAN names for each of the four LANs
 Network Management VLAN to use in your network
These details will be provided once you have registered your group within ESP and provided those details to your supervisor.

III. LOGICAL NETWORK TOPOLOGY
The logical topology for the organisations network is depicted in the figure below. Your organisation consists of four LANs which will each be connected to a single router to route traffic between subnets.

1861_Build a small network using three switches and one router.png

IV. NETWORK ADDRESSING

Your Lab Supervisor has provided you with a network address (and subnet mask) and subnetting requirements for each of your four LANs. When subnetting your network to accomodate the required hosts for each of your four LANs, you must:
 Ensure that you have enough subnets to address the entire network
 Allocate a subnet for the management network (switches and routers) large enough to cover network growth of double the current ammount of infrastructure
 Subnet optimally such that the largest number of IP addresses within your allocated network remain for future expansion In your final report, you must explain your subnetting process and show your calculations.

V. SWITCH PORT ALLOCATION

You have been provided with five VLAN identifiers for your network, one for each of your four LANs and one for your management VLAN. You have been provided with appropriate names for the VLANs covering the subnets. The physical topology of your network must match the network diagram below.

For each port on the four network devices, you must nominate:
 Whether it will operate in access or trunking mode
 Which VLANs are allocated to which ports, and on which switches
 Which ports will be disabled

In your final report, you must explain your decision process for switch port allocation.

VI. BASIC DEVICE CONFIGURATION

You are required to configure all switches and routers with the following information:
 Device names
 Message of the Day
 Interface descriptions
 Console and Enable passwords
 ssh Access
 All router interfaces are to have the lowest usable IP address of their allocated subnet

Further, all switches should be configured such that:
 Unallocated ports are disabled
 Appropriate switch-port security is configured

In your report you will need to justify your switchport security decisions and configurations.

VII. ADVANCED NETWORK CONFIGURATION

You will be required to configure 802.1Q trunking connections between the switches. Each switch will be connected to another switch via two trunking connections where the second connection is used for redundancy purposes.

You will be required to configure your network Spanning Tree Protocol to PVST+ and to ensure that the distribution layer switch is the Root Bridge.

VIII. ETHERCHANNEL BUNDLING
Network traffic has grown since you first built your network. The Ethernet trunking channels are no longer capable of carrying the offered load on their own. A decision has been made to change the redundant trunking connections between each switch into a bundled EtherChannel to double the maximumum throughput.
You must reconfigure your network such that the two links connecting the switches now form an EtherChannel. You must ensure that the distribution layer switch remains the Root Bridge for the Spanning Tree Protocol.

A. Testing
As part of the Case Study, you need to devise and document an appropriate testing regime to ensure that all the following
conditions are met:
1) The nominate level of switchport security is functional
2) Full interconnectivity exists between all hosts in all LANs and the management VLAN
3) The redundant trunking links are functional in the event of failure of the primary links
4) The correct switch is configured as the PVST+ Root Bridge
5) EtherChannel bundling is correctly configured, the channel bandwidth is indeed doubled, and that the root bridge remains
properly configured
6) ssh access to all network devices is functional

IX. ASSESSMENT ITEMS

The Case Study submission will consist of two components:

1) A report, assessed out of a total of 40 marks and worth 10% of your final mark. All group members will receive the same mark for the report

2) A video presentation, assessed out of a total of 10 marks and worth 5% of your final mark. Group members will receive individual marks for their part of the video presentation

Reference no: EM13115212

Questions Cloud

Residual dividend policy dividend and payout ratio : Fletcher Corp. has a capital budget of $1,000,000, but wants to maintain a target capital structure of 60% debt and 40% equity. The company forecasts this years net income to be $600,000.
Find probability distribution who end up with correct hat : He is equally likely to select any. Billy leaves last and takes the one remaining hat. Let x be the number of cowboys who end up with the correct hat.
Calculate the value of delta s : Calculate the value of delta S when 1.85 mol CH3OH (l) of is vaporized at 64.7 C. The normal boiling point of methanol is 64.7 C.
Explain tasks''s of strategic management : Evaluate AKA's performance on the following tasks's of strategic management a.developing a strategic vision b.setting objectives
Build a small network using three switches : Build a small network using three switches and one router and one switch will run as a distribution layer switch, the other two will run as access layer switches
Describe the potential legal and ethical issues : Describe the potential legal and ethical issues associated with establishing new wild populations.
Description of levered beta : Company has an unlevered beta of 1.10, no debt, but is considering changing it's capital structure to be 30% debt and 70% equity, corporate tax rate is 40%, what is the levered beta?
Determine minimum expected annual return for stock : If Stocks 1 and 2 have expected returns of 9 percent and 10 percent per year, respectively, then what is the minimum expected annual return for Stock 3 that will enable Glenda to achieve her investment requirement?
Find out more protein in the apoptotic cells : We did a lab experiment where we compared the amount of protein in apoptotic and normal cells. Im trying to write my discussion but don't know if we would expect to find more protein in the apoptotic cells or the normal cells. I have asked this qu..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd