Configure WEBs server on the dedicated machines

Assignment Help Computer Networking
Reference no: EM132375789

Assessment 1 - Network Design (Research)

In this assessment, you are required to read Assessment 2 (Research Network Design) and research a range of options/methods that can be used for network designing in Assessment 2. Based on your research you are required to post your views on pros and cons of each available option for the completion of Assessment 2 and select an option that you will use to complete that assessment.

In your post you must also justify the reasons behind your selection. Your post will be marked on:

  • Expressing your professional viewpoint on the topic.
  • Justifying your viewpoint with valid and credible evidence.

You are also required to provide constructive comments on at least one other student's post. The final marks for this assessment will be provided along with Assessment 2.

This Assignment was done by me and the conclusion was the following.

Conclusion - The existing ecosystem of network simulation and emulation software can be difficult to navigate. According to the above information and reading to the nature of the Assignment 4 need a network simulation tool as we discussed so my recommendation is cisco packet tracer good tool for compare to other simulation tool and I think that It has the capability to complete assignment requirements.

Assessment 2 - Network Design - Length: 500-700 words

Task - This is a practical assessment and will enhance and test your practical skills related to the subject topic.

Students are required to set up a network consisting of PCs, routers, switches and servers. You will need to configure routing between routers, use any dynamic routing protocol. The PCs (clients) will be connected to switches and switches to the router's interfaces. Clients and Servers are connected on different networks (don't attach clients and servers on same network).

Client(s) <--> Switch <--> Router <--> Router <--> Switch <--> Server(s)

To complete this assessment you are expected to refer to information beyond the text book. This assignment is open; in that you are free to choose the devices or software you use to complete the specified tasks. Students are expected to accomplish this task by utilising the necessary commands discussed in lectures and also described in the prescribed text book.

There are numerous web sites available that discuss networking , however you MUST list your sources of information for the different tasks. When completing this project, you may encounter errors or experience difficulties getting your setup to work. If this occurs, your challenge is to analyse why they happen and report on how you solved the problems you encountered.

Task 1 - Setting up a Network

Perform the following activities and support your workings with screenshots:

1. Configure the PCs, Server and Router interfaces with appropriate network addressing;

2. Configure any classless dynamic routing protocol on the routers;

3. On any client, ping the client's own network interfaces, then the local router gateway interface, then the remote router interface, then the servers. Check full network conductivity;

4. Use the traceroute command from the client to the server. Include results of the traceroute in your submission, explaining meaning of traceroute output.

Task 2 - Configuring Network Services:

Using the same network topology that you have setup in Task 1, perform the following additional activities

1. DHCP: Configure DHCP servers and show that the client PC has successfully received IP Addresses and other network parameters (default gateway, subnet mask and DNS IP address) using DHCP.

2. WEB Server: Configure WEBs server on the dedicated machines in their specified networks, with URL as yourname.csu.org

3. DNS: Configure DNS Servers on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing yourname.csu.org from client PC, DNS must resolve this URL to IP address of WEB Server.

4. Firewall: Configure traffic filtering on the web servers to block ONLY HTTP TCP traffic between one of the client PCs and WEB Servers and allowing all other IP traffic, provide evidence of such traffic filtering. You should verify firewall by using PING and HTTPS TCP traffic which should not be blocked.

A series of screenshots with commentary on each of the required tasks is to be submitted. The submission must include a comprehensive explanation of each task in your own words and all the commands used along with the output (or final result) in report format.

Reference no: EM132375789

Questions Cloud

Legally enforceable-bilateral contract-promissory estoppe : Define EACH of the following Terms- Legally enforceable, Bilateral Contract, Express Contract, UCC, Promissory Estoppe.
Illustrate the dysfunctional leadership and management : To prepare for your final essay, which is due in Unit 7, find a current events article from the last year which illustrates dysfunctional leadership.
Describe the health care hiring practices : For the final assignment, consider the pros and cons of the ACA on employment. Take some time to research both sides of the issue. Then develop an Infographic.
Discuss whether the results accurately portray your style : Consider the purpose of assessments in general and results may be used. Identify and describe three (3) instances whereby it may be beneficial to consider.
Configure WEBs server on the dedicated machines : Configuring Network Services: WEB Server: Configure WEBs server on the dedicated machines in their specified networks, with URL
What were the political and military strategies of each side : In the first years of the war, what were the political and military strategies of each side? Which was the more successful? Why? 250 words.
Discussion about the talent management : Discuss what talent management is and why it is a consideration addressed by a growing number of employers. Discuss what talent management.
Most effective way to prevent corruption : Based on what you have learned what would be the most effective way to prevent corruption Please explain
Synthesize consequentialism theories within business : Synthesize consequentialism theories within business conflicts of interest. you complete the Ethical Lens Inventory (ELI) within the EthicsGame Simulation.

Reviews

len2375789

9/24/2019 9:23:39 PM

Please i request you to make this assignment perfect and with all information required. I am emphasizing on perfection just because i scored just 5 marks out of 15 marks and the assignment was not accurate last time. So this time please make it perfect otherwise i will fail the subject. A series of screenshots with commentary on each of the required tasks is to be submitted. The submission must include a comprehensive explanation of each task in your own words and all the commands used along with the output (or final result) in report format. No description or lack of comprehensive description will result in deduction of marks.

Write a Review

Computer Networking Questions & Answers

  Denote any input symbol not equal to m

A paragraph of English text is to be scanned and the number of words beginning with "con" counted. Design a finite-state machine that will output a 1 each time.

  Recommend a network to accommodate the office locations

power networks has opened offices in toledo columbus and cleveland. the corporate headquarters are located in toledo.

  System analyst and design-business process-functional model

Advanced Business Systems (ABS) is a consulting and staffing company providing specialized staffing and consulting services to clients in a variety of different industries. It has offices in major U.S. metro areas and has ongoing relationships wit..

  Concepts for understanding adoption and diffusion

How do the basic concepts for understanding adoption and diffusion The case study discusses value sensitive design,

  Compare features cost and feedback from reviewers

Research Antivirus Software For Windows machines, the built-in Windows Defender is considered to be a fairly decent solution for home users.

  How storage vmotion can be used to create greater up-time

Your team has been asked by senior management to cut costs related to the IT infrastructure of your company. Your team does all of the cost analysis.

  What are the networks technical requirements

MN621 Advanced Network Design Assignment. Write a report on a network plan by answering following: What are the network's technical requirements

  Compare and contrast bri and pri isdn

Compare and contrast BRI and PRI ISDN.- What is a 2B+D?-  How does MPLS work?- Compare and contrast circuit-switched services, dedicated-circuit services, and packet-switched services.

  What is the main difference between internet and www

Based on our in-class discussion about Amazon brick-and-mortar store, discuss why you think Amazon opened a physical store in the era of e-commerce?

  List and briefly define the SSH protocols

What services are provided by the TLS Record Protocol? What steps are involved in the TLS Record Protocol transmission? List and briefly define the SSH protocol

  Functions of consumer advocacy groups

You might need to do some research on the purposes and functions of consumer advocacy groups AND the method of filing a consumer complaint

  Explain what kind of connections the salespeople use

CNT-Books wants an affordable way to establish remote connections for its salespeople, who log on from customer sites all over the country.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd