Case study - eastern health systems

Assignment Help Computer Networking
Reference no: EM132290360

Small Networks - Skills-Based Evaluation (SBE)

Small Networks Skills-Based Evaluation (SBE) (STP, LACP, VLAN, Trunking, Routing and DHCP)

Case Study: Eastern Health Systems (EHS)

Background

EHS has contracted your company to expand their computer network into a new building, which they have purchased.

Issue
Since you are joining an existing network, you are expected to adopt the EHS network standards in your design. In cases where there is not a specific EHS requirement you will use industry standard conventions.

EHS Standards

1. Management VLANs will use VLAN ID 99

2. Data VLANs will start numbering at 10. VLANs 1-9 and 99 must not carry user data (network management data is fine)

3. All unused ports in a device (router or switch) will be shut down or assigned to VLAN 1

4. EHS IP addressing uses the Class B private address range 172.16.0.0/16. All subnets use a 24 bit mask (255.255.255.0)

5. The third octet of any IP address will match the associated VLAN ID

6. Every network device will have a UID and password login and be accessible using telnet or SSH

7. A banner will be presented to every user of the device, detailing the device name and location

8. The building has a single floor; all of the workspaces may be serviced from one of the two wiring closets. The closets are within 90 meters of each other.

9. There will be approximately forty (40) workstations in the facility, spread evenly over 4 data networks (NOTE: You must include all 40 workstations in your packet tracer configuration). Switches must be connected to others using the fastest, most reliable method possible.

10. The contracted ISP will provide a Cisco 2621 router with the ISP interface configured. All building networks must connect to this device (R4). While the ISP interface is configured, the router does belong to EHS and will need to be configured by your company for intra-VLAN routing and DHCP.

11. Workstation IP addressing will be issued via DHCP, without exception, for each data network (for instance, VLAN 10's DHCP scope should be within 172.16.10.x. The management network will not use DHCP.

Attachment:- Assignment.rar

Reference no: EM132290360

Questions Cloud

Explain and evaluate the implications of ethical dilemma : Explain and evaluate the implications of this ethical dilemma utilizing at least two specific ethical frameworks.
Explain the variation in the model predictive power : IT836 Score the model with the testing data and create the model's confusion matrix. Also, calculate the overall, 10-50K, 50-80K, and GT 80K misclassification.
What is the government role in regulation : What is the government's role in regulation? Should they be responsible for regulating business at all? Shouldn't that fall on the business itself?
Provide example of production or service process : Provide an example of a production or a service process that is not yet automated.
Case study - eastern health systems : You are expected to adopt the EHS network standards in your design. In cases where there is not a specific EHS requirement you will use industry standard
Your response be in light of the specific ethical concepts : You are the CEO of a major oil company. As CEO, what would your response be in light of the specific ethical concepts?
How is it acquisition different from commodity purchases : The title of this course is IT Acquisition Management. Explain in YOUR own words what that means? Why is it important? How is IT acquisition different.
Should all businesses-organizations have opt-in statement : Assume you are working for a company that sells music online. Should all businesses/organizations have the opt-in statement?
How do you pay for the enforcement : If things have to be inspected, but you don't have the resources to hire the inspectors, then how does it happen? And how do you pay for the enforcement?

Reviews

Write a Review

Computer Networking Questions & Answers

  Create a technical proposal for a network services

You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below

  The possibility of a career in computer hardware sales

Examine the possibility of a career in computer hardware sales. Which area of sales do you believe holds the brightest prospects for young college graduates-mainframe computers, supercomputers, or high-volume storage devices? Why?

  What is the function of inverse multiplexing

What is the function of inverse multiplexing (IMUX)? If you were buying a multiplexer, why would you choose either TDM or FDM? Why?- Some experts argue that modems may soon become obsolete. Do you agree?

  Design and implement qos on a converged network

As a network engineer working for a Service Provider, design and implement QoS on a converged network. For this project it is assumed that the converged network offers triple play services and has the following traffic: VOIP, High Definition TV (H..

  Designing the most secure network possible

Designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN

  1identify which are the weak spots for mas in its

1.identify which are the weak spots for mas in its relationship with buyers. how can mas improve its collaboration with

  What dss tool would you recommend to track characteristics

What is a neural network? What DSS tool would you recommend/use to track those three characteristics you identified earlier?

  Show that f-function of des is not reversible

Show that F-function of DES is not reversible and explain how a Feistelcipher whose main component is not reversible can actually support decryption.

  Compute actual maximum channel capacity

Given narrow (usable) audio bandwidth of telephone transmission facility, a nominal SNR of 56dB (400,000), and a distortion level of <0.2%. Determine actual maximum channel capacity?

  New privacy issues related to cyberspace

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios

  Ways to secure a wlan

Explain in 200 to 300 words at least two different ways to secure a WLAN. What are the ramifications if a WLAN is breached

  Run the algorithm developed for a difs

Run the algorithm developed in the previous exercise for a DIFS whose attractor is the Sierpinski gasket. The code is presented in Table.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd