Build the network according to the user requirements

Assignment Help Computer Networking
Reference no: EM132135165

IT Networking Assignment - Networking Project Area

Major Lab Scenario -

Instructions

  • This lab has a time limit of one term
  • The lab must be completed by individual students, and the completed assessment returned to the assessor.
  • Successful completion of this lab assessment will require building the network EITHER on live equipment OR in Packet Tracer v6.3 or v7 and completing the stated given tasks.
  • Packet Tracer final configurations must be saved with the student's name, in the format: "Student Last Name, Student First Name . PKT".
  • The Packet Tracer file will also be emailed to the assessor.
  • If live equipment is used, then a written installation report will be submitted to the assessor.
  • The total available marks scaled to a mark out of 100, with a pass mark of 70/100 considered to be 'Satisfactory'.

Assessment Requirements:

  • Subnet an address space with given requirements.
  • Assign appropriate addresses to interfaces and document them in the address table.
  • Build the network according to the user requirements.
  • Erase the startup configuration and reload a router to the default state.
  • Assign the appropriate device names through the CLI.
  • Configure enable passwords on all routers, and set them all to "class".
  • Configure PCs with IP addresses, subnet masks, and default gateways.
  • Configure static routing on all routers, where applicable and verify static routing operation.
  • Configure switches and routers, including security requirements.
  • Create appropriate VLANs on switches and enable trunking of those VLANs.
  • Configure Inter-VLAN routing. Configure integrated DHCP, FTP Web, Email services.
  • Test and verify full conntectivity for the scenario.

Scenario:

In this Assessment you are to install a routing and switching solution to a small business marketing firm Jones & Partners. The firm has two marketing partners lawyers and two accounting support staff. For this reason it was anticipated to create two VLANs - one for the partners and one for the support staff. More VLAN could be added in the future as the business grows. Management of the network switches is local the moment, but in anticipation of remote access, a management VLAN, number 99, has been created.

As a contracted network installer and administrator, your task is to to install, configure and test the network, and network router and switches, using inter-VLAN routing to connected the support VLAN to marketing VLAN. Traffic control between the VLANs will be implemented using Access Control Lists and will be subject to specification to be defined at a later stage, together with DHCP for each VLAN. As a contracted network consultant you are to network the employees of Jones & Partners. At this stage each marketing partner and accounting support person occupy separate office cubicles within the same office space. Despite this the group of two support staff and group of two marketing partners are on separate VLANs.

Implement the first stage of the network by linking partners together and support staff together but with each group in a different VLAN. Allow the two groups to be linked, but restrictions will apply to FTP serives for the Accounting PCs using Access Control Lists on the router.

All PCs will have DHCP allocated IP addresses. There are two DHCP servers, one for each VLAN. One will also be a DNS server. A third server will integrate Web, Email, FTP, and NTP services. All servers have static IP addresses. Switches wilhave port security enables on all access interfaces.

You are required to recreate the network topology as shown, using live equipment or simulation software such as Packet Tracer 6.3 or 7.x with the following specifications:

Required Resources for Live Equipment or simulation software as appropriate

  • 1 Router (eg, 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
  • 2 Switches (Cisco 2950 or 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
  • 4 PCs
  • Console cable to configure the Cisco IOS devices via the console ports
  • Ethernet and Serial cables as shown in the topology

Task 1: Prepare to install enterprise switches

1.1 Describe how you would prepare for given work according to relevant legislation, work health and safety (WHS) regulation, codes and standards.

WHS takes after the following to the workers in Australia:

  • protecting laborers and different people from hurt by requiring obligation holders to dispense with or limit chance
  • providing for reasonable and compelling portrayal, conference and participation
  • encouraging associations and manager associations to play a helpful part in advancing upgrades in WHS practices
  • promoting the arrangement of exhortation, data, instruction and preparing for WHS
  • securing consistence with the Act through powerful and proper consistence and authorization measures
  • ensuring fitting examination and audit of moves made by people with forces or capacities under the Act
  • providing a system for consistent change
  • maintaining and fortifying national harmonization of WHS laws and encouraging a reliable national way to deal with WHS.

1.1 Write how you would arrange arrange site access according to required procedure, and how you would consult appropriate personnel to ensure task is coordinated effectively with others involved at the worksite

1.2 Sketch & Annotate the chosen network topology from technical requirements

1.3 Determine the internet protocol (IP) addressing scheme for the network topology.

1.4 Evaluate network management, capacity and security requirements, with specific reference to current and future requirements.

1.5 Select the router and switches with appropriate features according to technical requirements.

1.6 By researching equipment vendors identify specific router and switch products, their pricing, specifications and availability for the project.

1.7 Describe how would you project manage the installation of the components for the project with reference to task priority, security and contingency measures for minimal disruption to the client.

1.9 Describe how you would implement security on the network, both internally within devices, between devices and externally if the router is connected to an ISP or other router. Provide an exhaustive list of available strategies for the securing the network design. How would you monitor internal and external activity for security breaches?

Task 2: Pre-configuration

From the diagram schematic supplied below, configure the following items on all the routers and switches:

  • Hostnames on the router R1, and switches S1, S2
  • Configure enable and vty passwords on the router and switches.
  • Disable DNS lookup
  • Interface IP addresses, subnet masks, and no shutdown commands on R1, S1, S2
  • IP addresses and subnet masks on PCs, including the default gateway IP address.

Task 3: Configure VLANs on router R1

- Configure the hostname on R1 to R1.

- On Router R1, configure Fa0/1 interface to trunk for VLAN 99, VLAN 10 and VLAN 20 with 802. 1Q encapsulation to S1.

  • VLAN 99 = 172.16.99.0/24
  • VLAN 10 = 172.16.10.0/24
  • VLAN 20 = 172.16.20.0/24

Task 4: Basic Switch Configuration

Configure the hostname on switch S1 to S1.

Configure the hostname on switch S2 to S2.

Configure switch S1 with the VLAN 99 IP address of 172.16.99.2/24.

Configure switch S2 with the VLAN 99 IP address of 172.16.99.3/24.

Configure both switches with the default gateway address of 172.16.99.1.

Task 5: Configure VTP

  • Configure switch S1 as the VTP server and switch S2 as the VTP client
  • Configure both switch S1 and switch S2 as part of VTP domain Group1.
  • Create VLAN 10 with the name Accounting.
  • Create VLAN 20 with the name Marketing.
  • Create VLAN 99 with the name Management.

Task 6: Configure VLANs on switches

Configure the following on switch S1:

  • Configure the interface Fa0/4 on VLAN 10.
  • Configure the interface Fa0/5 on VLAN 20.
  • Verify all other interfaces are in VLAN 1.
  • Configure the following on switch S2
  • Configure the interface Fa0/4 on VLAN 10.
  • Configure the interface Fa0/5 on VLAN 20.
  • Verify all other interfaces are in VLAN 1.

Task 7: Configure VLAN Trunking

  • Configure trunking between switch S1 and switch S2 with 802.1Q encapsulation using port Fa0/2 on both switches.
  • Configure trunking between switch S1 and switch S2 with 802.1Q encapsulation using port Fa0/3 on both switches. This loop will be resolved with Spanning Tree Protocol.
  • Configure switch S1 for trunking between switch S1 and router R1 with 802.1 Q encapsulation using port Fa0/1.

Task 8: Configure Spanning Tree

Configure switch S1 to be the root bridge.

Task 9: Verify Connectivity

  • Save the configuration and verify interVLAN routing with the hosts attached. Also, the router and the two switches should be able to ping each other on their VLAN 99 interfaces.

Task 10: Install and run Network Management Software (SNMP)

  • Install or configure simple network management protocol (SNMP) agent software, on each switch, to collect network traffic data for the management information base (MIB) from that segment of the network and relay it to the management console
  • Install and configure SNMP management console software on a computer designated to be the network manager's main console, to collect network traffic data from the switch acting as agents

Task 11: Switch port manual configuration

  • Manually configure all access ports of the switch for speed and full or half-duplex operation

Task 12: Switch security

  • Manually configure all access ports of the switch for security

Task 13: Install and configure Web, FTP, Email, NTP, DHCP, DNS, TFTP services

  • Install and configure integrated network services

Task 14: Install and run remote access serivices

  • Install and configure remote access services to the router and swirches by configure Telnet access to these devices.

Task 15: Install a Switch IOS upgrade from a TFTP server

  • Delete the IOS from S1 flash memory and reload it from the TFTP server.

Task 16: Test and Troubelshoot the completed network for full operation

  • Connectivity should be assured. Security breaches tested. Access Control operational. Web servers, FTP server and Email serves accessible and operational.DNS and DHCP fully operational

Task 17: Test and configure VoIP services

  • Connect and configure VoIP services for each user in the project scenario.

Task 18 Completion

  • Tabulate test results and complete all user & test reports
  • Complete report and notify client of network status
  • Clean up and restore worksite to client's satisfaction
  • Secure sign-off from appropriate person.

Attachment:- Assignment Files.rar

Reference no: EM132135165

Questions Cloud

Discuss about the computerized accounting system : For this week's Discussion, research the most common threats to a computerized accounting system using the Internet and/or Strayer databases.
Evaluate pros and cons of completing a competitive analysis : Evaluate the pros and cons of completing a competitive analysis (using a competitive grid). Create a 5 slide visual presentation with speaker notes.
Explain the difference between nominal and ordinal data : Big Data is everywhere and various businesses around the world are driven by Big Data. However, while some businesses rely on Big Data for organizational.
Make five recommendations for simplifying extended process : Develop an extended process map for washing a car. Make five recommendations for simplifying the extended process.
Build the network according to the user requirements : ICT50415 IT Networking Assignment - Networking Project Area - Build the network according to the user requirements
Analyze the benefits and risks of globalizing : Analyze the benefits and risks of globalizing for the company you chose.
Firm has developed machine to manufacture steel canisters : A small firm has developed a new machine to manufacture steel canisters.
Estimate the ols regression models : Using the data provided in the "NonInterest Exp" tab, estimate the following OLS regression models for each of the three different types of expenses.
Identify key risks in terms of the economic and social risks : INB 6200 The Turkish and Japanese economies face different challenges over the next decade. The assignment requires you to choose one of the countries.

Reviews

len2135165

10/8/2018 10:36:58 PM

Marking Guide - Successful completion of all tasks in the Lab Demonstration. Documentation of the successful operation all network connectivity in the Lab Demonstration. Documentation evidencing the successful implementation, testing and operation of the Lab Demonstration. Marking Guide is integrated within the assessment Lab documentation.

len2135165

10/8/2018 10:36:52 PM

Instructions - This lab has a time limit of one term. The lab must be completed by individual students, and the completed assessment returned to the assessor. Successful completion of this lab assessment will require building the network EITHER on live equipment OR in Packet Tracer v6.3 or v7 and completing the stated given tasks. Packet Tracer final configurations must be saved with the student’s name, in the format: “Student Last Name, Student First Name.PKT” The Packet Tracer file will also be emailed to the assessor. If live equipemt is used, then a written installation report will be submitted to the assessor. The total available marks scaled to a mark out of 100, with a pass mark of 70/100 considered to be 'Satisfactory'.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd