Configure WEBs server on the dedicated machines

Assignment Help Computer Networking
Reference no: EM132375789

Assessment 1 - Network Design (Research)

In this assessment, you are required to read Assessment 2 (Research Network Design) and research a range of options/methods that can be used for network designing in Assessment 2. Based on your research you are required to post your views on pros and cons of each available option for the completion of Assessment 2 and select an option that you will use to complete that assessment.

In your post you must also justify the reasons behind your selection. Your post will be marked on:

  • Expressing your professional viewpoint on the topic.
  • Justifying your viewpoint with valid and credible evidence.

You are also required to provide constructive comments on at least one other student's post. The final marks for this assessment will be provided along with Assessment 2.

This Assignment was done by me and the conclusion was the following.

Conclusion - The existing ecosystem of network simulation and emulation software can be difficult to navigate. According to the above information and reading to the nature of the Assignment 4 need a network simulation tool as we discussed so my recommendation is cisco packet tracer good tool for compare to other simulation tool and I think that It has the capability to complete assignment requirements.

Assessment 2 - Network Design - Length: 500-700 words

Task - This is a practical assessment and will enhance and test your practical skills related to the subject topic.

Students are required to set up a network consisting of PCs, routers, switches and servers. You will need to configure routing between routers, use any dynamic routing protocol. The PCs (clients) will be connected to switches and switches to the router's interfaces. Clients and Servers are connected on different networks (don't attach clients and servers on same network).

Client(s) <--> Switch <--> Router <--> Router <--> Switch <--> Server(s)

To complete this assessment you are expected to refer to information beyond the text book. This assignment is open; in that you are free to choose the devices or software you use to complete the specified tasks. Students are expected to accomplish this task by utilising the necessary commands discussed in lectures and also described in the prescribed text book.

There are numerous web sites available that discuss networking , however you MUST list your sources of information for the different tasks. When completing this project, you may encounter errors or experience difficulties getting your setup to work. If this occurs, your challenge is to analyse why they happen and report on how you solved the problems you encountered.

Task 1 - Setting up a Network

Perform the following activities and support your workings with screenshots:

1. Configure the PCs, Server and Router interfaces with appropriate network addressing;

2. Configure any classless dynamic routing protocol on the routers;

3. On any client, ping the client's own network interfaces, then the local router gateway interface, then the remote router interface, then the servers. Check full network conductivity;

4. Use the traceroute command from the client to the server. Include results of the traceroute in your submission, explaining meaning of traceroute output.

Task 2 - Configuring Network Services:

Using the same network topology that you have setup in Task 1, perform the following additional activities

1. DHCP: Configure DHCP servers and show that the client PC has successfully received IP Addresses and other network parameters (default gateway, subnet mask and DNS IP address) using DHCP.

2. WEB Server: Configure WEBs server on the dedicated machines in their specified networks, with URL as yourname.csu.org

3. DNS: Configure DNS Servers on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing yourname.csu.org from client PC, DNS must resolve this URL to IP address of WEB Server.

4. Firewall: Configure traffic filtering on the web servers to block ONLY HTTP TCP traffic between one of the client PCs and WEB Servers and allowing all other IP traffic, provide evidence of such traffic filtering. You should verify firewall by using PING and HTTPS TCP traffic which should not be blocked.

A series of screenshots with commentary on each of the required tasks is to be submitted. The submission must include a comprehensive explanation of each task in your own words and all the commands used along with the output (or final result) in report format.

Reference no: EM132375789

Questions Cloud

Legally enforceable-bilateral contract-promissory estoppe : Define EACH of the following Terms- Legally enforceable, Bilateral Contract, Express Contract, UCC, Promissory Estoppe.
Illustrate the dysfunctional leadership and management : To prepare for your final essay, which is due in Unit 7, find a current events article from the last year which illustrates dysfunctional leadership.
Describe the health care hiring practices : For the final assignment, consider the pros and cons of the ACA on employment. Take some time to research both sides of the issue. Then develop an Infographic.
Discuss whether the results accurately portray your style : Consider the purpose of assessments in general and results may be used. Identify and describe three (3) instances whereby it may be beneficial to consider.
Configure WEBs server on the dedicated machines : Configuring Network Services: WEB Server: Configure WEBs server on the dedicated machines in their specified networks, with URL
What were the political and military strategies of each side : In the first years of the war, what were the political and military strategies of each side? Which was the more successful? Why? 250 words.
Discussion about the talent management : Discuss what talent management is and why it is a consideration addressed by a growing number of employers. Discuss what talent management.
Most effective way to prevent corruption : Based on what you have learned what would be the most effective way to prevent corruption Please explain
Synthesize consequentialism theories within business : Synthesize consequentialism theories within business conflicts of interest. you complete the Ethical Lens Inventory (ELI) within the EthicsGame Simulation.

Reviews

len2375789

9/24/2019 9:23:39 PM

Please i request you to make this assignment perfect and with all information required. I am emphasizing on perfection just because i scored just 5 marks out of 15 marks and the assignment was not accurate last time. So this time please make it perfect otherwise i will fail the subject. A series of screenshots with commentary on each of the required tasks is to be submitted. The submission must include a comprehensive explanation of each task in your own words and all the commands used along with the output (or final result) in report format. No description or lack of comprehensive description will result in deduction of marks.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd