Create a physical network diagram

Assignment Help Computer Networking
Reference no: EM132226662

Project 1 -

The physical topology represents the way that the workstations are connected to the network through the actual cables that transmit data; the physical structure of the network.

The logical topology is the way that the signals or the data passes through the network from one device to the next without regard to the physical interconnection of the devices. Logical topologies represent the network protocols that direct how data moves across a network. The Ethernet protocol is a common logical bus topology protocol.

A logical topology is not necessarily the same as its physical topology.

Some Company CTO is considering the use of different subnets for each floor in Building 1 and has asked for a physical network diagram demonstrating this use. Using the Network information provided below, create a physical network diagram showing how the described network is interconnected.

Floor 10 - 172.18.10.0/24

Floor 9 - 172.18.09.0/24

Floor 8 - 172.18.08.0/24

Floor 7 - 172.18.07.0/24

Floor 6 - 172.18.06.0/24

Floor 5 - 172.18.05.0/24

Floor 4 - 172.18.04.0/24

Floor 3 - 172.18.03.0/24

Floor 2 - 172.18.02.0/24

Floor 1 - 172.18.01.0/24

1. Create a network diagram of the office designed in Module 02 with the network addresses document.

2. Describe the method you used to make identification of various subnets easier to identify.

Project 2 -

Logical Network topology represents a high-level overview of the signal topology of the network. Every LAN has two different topologies (the way that the devices on a network are arranged and how they communicate with each other).

The logical topology is the way that the signals or the data passes through the network from one device to the next without regard to the physical interconnection of the devices.

Logical topologies represent the network protocols that direct how data moves across a network. The Ethernet protocol is a common logical bus topology protocol.

A logical topology is not necessarily the same as its physical topology.

Some Company CTO after considering the change to the physical network inter connection has decided to continue to use the addressing approach from the IP addressing scheme based upon department. Using the Network Subnet Worksheet from Module 01, create a logical network diagram showing how the current network is interconnected.

Create a (Visio) network diagram of the office designed in Module 02 with the logical network addresses documented.

Project 3 -

Some Company completed a network usage audit as part of their fiscal yearend financial audit. The auditors noted that there was attempted access to the Payroll systems by users in unauthorized departments. In their recommendations, the auditors noted that the Payroll systems need to be isolated and access needs to be restricted to only those authorized users who are in Human Resources.

During a review of the proposed changes to be made, the Human Resources department points out there is a New Employee Benefits portal that is hosted on the HR Department. The portal needs to be accessed by Employees anywhere on the corporate network.

Create the ACLs necessary to limit access to Payroll Subnet: only those computers on the HR subnet should have access; no limitation on access to the HR Subnet.

Refer to the Course Project Introduction.

  • Create the commands to configure the Cisco Routers so that only the computers on the HR Subnet have access to the Payroll Subnet.
  • All computers on the network are able to access the HR Subnet.

Identify on which router the Access Control lists should be applied and explain your choice.

Note - Please use attached completed module 01 project template for reference to answer.

Attachment:- Assignment Files.rar

Reference no: EM132226662

Questions Cloud

Develop a legislative matrix based upon specific legislators : Student will develop a Legislative Matrix based upon the specific legislators in a residential/geographical legislative district. State and Federal legislators.
Explain methods by which PFSense can be hardened : Create a 300- to 500-word step-by-step instructional guide detailing how to detect scans using snort. Explain any other methods by which PFSense can be hardened
Review the process of outline creation : Review the process of outline creation. Review the information that discusses creating outlines. In particular, study the section that describes full-sentence.
Prepare an informative speech : Prepare an informative speech. In this assignment, you will create a delivery outline and deliver an informative speech.
Create a physical network diagram : Using the Network information provided below, create a physical network diagram showing how the described network is interconnected
What you believe is the speech specific purpose : What you believe is the speech's specific purpose? What strategies did the speaker use to achieve the specific purpose of the speech?
Policy and ethics in principles of information security : Explain laws, policy, and ethics in principles of information security. What is due care and due diligence?
What language strategies would you use in your speech : What language strategies would you use in your speech to make it sound more appealing to the entire group? What techniques could you use to establish common.
What makes cross docking difficult to manage : What makes cross docking difficult to manage? Did Amazon have cross docking systems?

Reviews

Write a Review

Computer Networking Questions & Answers

  Create a program that estimates the radio signal strength

Create a program that estimates the radio signal strength (%) - a range - for computers stationed at different distances (ft) from the AP. In your design use 5 distance zones, and proportionally assign to them signal strength ranges (%).

  Explain the three instruction formats used in mips

Explain the three instruction formats which are used in MIPS. What limitations do they put on form and kind of instruction which are used in te ISA?

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  What is the null and alternative hypothesis

Find the chi-square statistic.

  Will the packet be forwarded into its base network

What is the network mask used by the router? (in dotted decimal or binary). What is the network portion of the incoming packets IP address?

  Develop a well-researched project planning document

MN601 - demonstrate project leadership skills; identify and assess risk in designing, executing a major project and Network Project Management

  Features of ms excel

Write a two-page paper explaining the features of MS Excel 2013-be sure to address the items in the rubric below.

  Discuss the types of monitoring and alarms

Discuss the types of monitoring and alarms necessary in your configuration. Describe where each one is housed and how it is implemented

  What is the data rate for fast ethernet

A general rule of thumb is to allow how many meters for the cable run from the telecommunications closet to the work area?

  Explain how to formulate a query

Determine the functional dependences - Build this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data

  Current computer related incident or change in cybercrime

Current computer related incident or change in cybercrime laws The potential cause for the incident/ change in law

  List the networking and commination devices required

discuss in about 500 words, if the centre and the patients are going to benefit from the planned NBN. You need to discuss the advantages and disadvantages both.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd