Construct the appropriate network technologies

Assignment Help Computer Networking
Reference no: EM133585652

IT Networking and Communication

Learning Outcome 1: Identify the operation of the protocols that are used inside the Internet and use the seven-layer model to classify networking topology, protocol, and security needs.

Learning Outcome 2: Evaluate LAN technology issues, including routing and flow control. Explain the difference between switches and routers. Build and troubleshoot Ethernet, Wi-Fi, and Leased line networks. Connect networks with routers.

Learning Outcome 3: Apply the advanced knowledge gained to reflect on the security requirements of a network. Evaluate the issues that surround network applications such as quality of service (QoS) and network performance analysis. Be adaptable to changing requirements.

Case Study:
Your group is hired as a consultancy firm to set up a small private day-patient hospital network technology. The hospital has one building, 5 floors, Basement dedicated to secure car parking, Level 1 consists of a reception and a waiting room, Level 2 and 3 consistent of 2 operating theaters, 4 post-operative recovery rooms, Level 5 is the management, financial offices and the staff room.

Patients can access Wifi and there is an internal website - one page explaining how to get on to the network. Staffing is as follows: 4 Management, 3 financial officers and 5 nurses and 3 doctors.
The nurses and doctors share 4 phones per each floor on Level 2 and Level 3. Management staff and financial officers have a phone each.

In Packet Tracker:

Construct the appropriate network technologies. Separate Level 2 and 3 from other offices using VLANs. Separate VoIP phones on VLAN 0.
Setup appropriate subnet Config the wireless LAN.
Setup a WebSever for the website
Setup a DHCP server and a DNS server. Enable routers to connect to each other. Setup a STP.
Appropriate label your network diagram with annotation and background image. Generate appropriate network traffic.
Show QoS (e.g. show policy-map interface serial 0/0/0) before and after simulation.

Throughout this assessment you may find the following CISCO packet tracer sample labs useful. (File-> Open Samples) Wireless LAN, DHCP, Wireless, DNS, HTTPS, Wireless LAN Security Remember to view the configuration of a CISCO box use the following command; enable, show run

In a 5-6 minute video demonstrate your working Packet Tracer showing all features completed with appropriate traffic. Do NOT show you configuring them.

In a written report explain the following:
Explain the network subnets, super nets, etc (how did you implement and why. Broadcast address, network address, default gateway, host range)
Explain your topologies (e.g. why you uses switches/routers in the appropriate location) Explain what security measures are in place or how the security could be improved.
Explain what your design reliability, redundancy and other features that may have. Discuss in terms of OSI models, networking terminology, etc.

The word limit of the report is 1000 words.
The cover page must specify student names, ID numbers, unit details, and assignment details.
The assignment must use a 12-point font size and at least single line spacing with appropriate section headings.
The report must be submitted in a soft (electronic) copy as a Microsoft Word document on the LMS in Turnitin enabled submission link.

Attachment:- IT Networking and Communication.rar

 

Reference no: EM133585652

Questions Cloud

Concepts around health care system reform and transition : Consider the Nigerian healthcare system in need of reform. Discuss the key concepts around health care system reform and transition.
Why federalism is important in the united states : Write a draft of your presentation and submit it to this assignment. Include a definition of federalism, two to three examples of federalism, and why federalism
What are the reasons why the united states supreme court is : what are the reasons why the United States Supreme Court is the most powerful branch of government. Why are these reasons important?
How do pluralists understand the role of interest groups : How do pluralists understand the role of interest groups in the American political system? The presence of interest groups in American politics is generally
Construct the appropriate network technologies : Construct the appropriate network technologies. Separate Level 2 and 3 from other offices using VLANs. Separate VoIP phones on VLAN 0. Setup appropriate subnet
What concrete evidence supports the claim that the supreme : what concrete evidence supports the claim that the Supreme Court is indeed the weakest branch? What specific evidence supports the alternate claim
Demonstrate adaptability in building control : MITS4002 Object-Oriented Software Development, Victorian Institute of Technology - Create classes and objects that access variables and modifier keywords
Examine the actions of the states in international relations : Examine the actions of the states in international relations from the perspective of any two worldviews. Discuss how the options of the states are constrained
What physical signs or laboratory results : What physical signs or laboratory results would you NOT expect to see in a patient with bulimia?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd