Create a network topology using a network simulator

Assignment Help Computer Networking
Reference no: EM133682331

Networking and Communication

Assessment - Case Study

Introduction
This is a Group assessment comprised of 5 Students. All group members must have to present their part in the demonstration/presentation.

Part A (Detailed Design): In this group assignment, you will assess the given case study to design a multi-level subnetting and provide a subnetted IP design plan. You must create a network topology using a network simulator (Cisco Packet Tracer) with the necessary labels and write a report on the design rationale. Each group must submit a report with the IP design plan, network topology screenshot and network design rationales.

Part B (Detailed Topology, Configuration and Demonstration): Using the network simulator (Cisco Packet Tracer), your group should configure the network designed for Part A. Each group must submit a report containing configuration commands and their descriptions and present the network demonstration.

Task
Mr. Sam, the IT director at Sydney Hospital, manages the network. Mr. Sam has requested your help proposing a network solution that meets the hospital's requirements. The hospital is growing, and the management has approved funds for network improvements.

The medical staff would like to be able to access medical systems using laptops from any of the patient rooms. Doctors and nurses should be able to access patient medical records, x-rays, prescriptions, and recent patient information. Mr Sam purchased new servers and placed them in the data centre. The wireless LAN (WLAN) has approximately 50 clients, with about 50 more due in six months. The servers must have high availability. Furthermore, an IP Telephony solution will be deployed, and IP addresses should be allocated for the 50 IP phones per floor.

Patient rooms are on floors 6 through 10 of the hospital building. Doctors should be able to roam and access the network from any floor. A wireless radio-frequency (RF) survey report mentions that three access points placed in the main hallways on each floor can provide full wireless coverage.

The current network has ten segments, with LAN switches and fast Ethernet ports that reach a single router that also serves the WAN. Only a single link is used from the floors to the core router. The router is running the EIGRP routing protocol, and they want to move to a standards-based routing protocol. The new back-end servers are in the same segment as those used on floor 1. Mr. Sam mentioned that users complained of slow access to the servers. He also hands you a table with the current IP addresses (see Table 1).

Mr Sam would like a proposal to upgrade the network with updated switches that support Gigabit Ethernet to the desktop, redundant 10 Gigabit Ethernet (10GE) fibre uplinks, and Power over Ethernet (PoE), and to provide 10 Gigabit Ethernet access to the servers. The proposal should also cover secure WLAN access with centralised management on floors 6 through 10. Include an IP addressing scheme that reduces the number of Class C networks the hospital uses. Mr. Sam wants to reduce the number of networks leased from the Internet service provider (ISP).

Provide the answers to the following questions/directives in Part A and verify them in Part B by implementing it in cisco packet tracer:

  • What are Sydney Hospital's business requirements?
  • Are there any business-cost constraints?
  • What are the network's technical requirements?
  • What are the network's technical constraints?
  • Prepare a logical diagram of the current network.
  • Does the hospital use IP addresses effectively?
  • What do you recommend for improving the switching speed between floors?
  • What IP addressing scheme would you propose Based on the number of servers and clients provided?
  • What routing protocols do you recommend?
  • What solution do you recommend for WLAN access and the network upgrade?
  • Recommend and explain appropriate security measures.
  • Draw the proposed network solution.

The report must follow the marking guide. Please note that citation of sources is mandatory and must be in the IEEE style.

Reference no: EM133682331

Questions Cloud

Determine gaps in the technological tools and structure : OL 668- Determine gaps in the technological tools and structure of the organization that should be considered when working within a global structure.
Authority to punish wrongdoers on their reservation : Do the Native Americans have any authority to punish wrongdoers on their reservation?
Protection of intellectual property and information rights : Protection of intellectual property and information rights will not be thing of past. With digital age in full effect with rapid advancements in technology
Process serve to individual involved in judicial system : What is substantive due process? What purpose does substantive due process serve to an individual involved in the judicial system?
Create a network topology using a network simulator : The proposal should also cover secure WLAN access with centralised management on floors 6 through 10. Include an IP addressing scheme that reduces the number
Musician to perform at birthday party : A woman hired a musician to perform at her husband's birthday party. the musician notified the woman that he had broken his arm and would not be able to perform
Should judges uphold the constitution and published laws : Should judges uphold the Constitution and published laws, as written, or be allowed to legislate from the bench based on personal philosophies
How the novel creates empathy for some of main characters : How the novel creates empathy for some of the main characters: How the Clutter family embodies the American Dream?
What changes would you make to probation programs : What changes would you make to probation programs? Do you think it would be appropriate to increase restrictions imposed on probation? Explain your rationale

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain how csma ca dcf works

How does Wi-Fi differ from shared Ethernet in terms of topology, media access control, and error control, Ethernet frame?- Explain how CSMA/CA DCF works.

  Draw an aoa network diagram representing the project

Draw an AOA network diagram representing the project. Put the node numbers in circles and draw arrows from node to node, labeling each arrow with the activity letter and estimated time.

  Individual website design and development

Complete the website design document in Microsoft Word. Cover all the elements for your site design (see 'Overview: Individual WebsiteDesign Document and Development Effort Instructions' link).

  Describe wi-fi and telecommuting

Describe Wi-Fi and telecommuting. What are the issues associated with allowing this technology to access the organization's network?

  Consider a situation where two microcontroller

Consider a situation where two microcontrollers are connected with a CAN network. Computer 1 generates 8-bit data packets that must be sent to Computer 2, and Computer 2 generates 8-bit data packets that must be sent to Computer 1

  Implement windows network infrastructure

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized (considering how group policy will be used and users will be organized)?

  Analyze malware using appropriate procedures

Identify and analyze malware using appropriate procedures, tools and techniques and Distinguish and critically compare malware delivery and spreading techniques

  Interested in social networks

Social Networks.Facebook has over one billion subscribers (The total population of the world is just over 7 Billion). Please think about the following questions and discuss them with your fellow students.

  Discuss how different phishing attacks work

Discuss how different Phishing Attacks work? What is biometrics and what are various ways to implement it?

  Adoption of an enterprise security framework

How is the adoption of an enterprise security framework helpful for developing an enterprise security policy and how does Donn Parker's model compare with the X.805 framework?

  Calculate the end-to-end transit time for a packet

Calculate the end-to-end transit time for a packet for both GEO (altitude: 35,800 km), MEO (altitude: 18,000 km) and LEO (altitude: 750 km) satellites

  Find the average duration of tcp connections

Is IP switching worthwhile for applications you run? To find out, monitor the traffic from your computer and find the average duration of TCP connections.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd