Create simple network topology using packet tracer software

Assignment Help Computer Networking
Reference no: EM131616764

Assignment

At your workplace or school, research to determine 1-5 network devices in your hierarchal model. Create a simple network topology using Packet Tracer software. Place 1-5 devices at the appropriate levels of the Cisco three-layer hierarchical model design.

Topic: Hierarchal Topology

Question/Prompt: At your workplace or school, research to determine 1-5 network devices in your hierarchal model. Create a simple network topology using Packet Tracer software. Place 1-5 devices at the appropriate levels of the Cisco three-layer hierarchical model design. The model must include:

1. A labeled hierarchical model ( Access layer, distribution layer, and core layer);
2. Labeled Type, vendor, and model of the devices (ie. Cisco 2911 series router) ; and
3. 1 Simulated cloud, 1 PC per subnet to represent a subnet of devices.

If you are unable to do research at your workplace or school, or you do not have one to research, then create your own hierarchical model. Share your .pka in the Discussion Board Forum. Do you agree with the way the network is designed? If so, explain why. If not, state 1 way to improve the design and why you would make improvements.

Reference no: EM131616764

Questions Cloud

Determine the convection heat transfer coefficient : In the effort to find the best way to cool a smooth thin-walled copper tube, an engineer decided to flow air either through the tube or across the outer tube.
Estimate the steady rate of heat transfer : Water is heated at a rate of 10 kg/s from a temperature of 15°C to 35°C by passing it through five identical tubes, each 5.0 cm in diameter.
Fundamentals of operating systems and java programming : MN404 - Fundamentals of Operating Systems and Java Programming - Analyse and discuss the significance of use cases of UML specification
Explain levels of law enforcement in the united states : discuss the key aspects of various levels of law enforcement in the United States and use at least two examples of local law enforcement
Create simple network topology using packet tracer software : Create a simple network topology using Packet Tracer software. Place 1-5 devices at the appropriate levels of the Cisco three-layer hierarchical model design.
Define change in pressure drop and in rate of heat transfer : Consider laminar flow of a fluid through a square channel maintained at a constant temperature. Now the mean velocity of the fluid is doubled.
Do you think the united states is truly a meritocracy : Are there differences between the United States and other countries? Why? Which group in the society has the opportunity for upward social mobility and why?
Explain whats your opinion of the following evidence rule : What's your opinion of the following evidence rule, When seems a part , having available a firmer and more satisfactory evidence
Blood sugar meter that connects via bluetooth : I recently got a new blood sugar meter that connects via Bluetooth to my phone, and a dedicated app that receives and stores all my readings.

Reviews

Write a Review

Computer Networking Questions & Answers

  Develop the appropriate security policies governing wireless

Implementing wireless technologies involves technical and management issues or considerations that have strategic business implications within organizations.

  Create a network design for a fictitious organization and

create a network design for a fictitious organization. each week you will be completing a part of the assignment based

  Design a network for the local business

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business

  Differentiate real-time dsp and non-real-time dsp

Describe the difference between real-time DSP and non-real-time DSP. Give an example of each.

  Developing a professional network

Developing a professional network, experiences you had presenting your resume at job fairs, or interaction on professional networking websites such as LinkedIn

  Find the option in your routers web interface

You can verify your change took effect by running a command that shows your network connection details and checking what MAC address your network interface reports afterwards. If you need to change the MAC address on your router, you'll find this o..

  Question 1a what are the indispensable ingredients of a

question 1a what are the indispensable ingredients of a symmetric cipher?b what are the two basic meanings used in

  What is the required bandwidth for the transmission

Calculate the Network ID/Subnet ID of the host having an IP address 192.32.24.70 with a subnet mask 255.255.255.224. What would be the IP address of the 1st host and the last host of the subnet?

  Explain ethics of developing type of system

Number of citizens and their actions. Clearly this has privacy, implications. Explain the ethics of developing this type of system.

  What is the maximum number of hosts it can handle

A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle - What are the values of the header length, total length, identification, flags, and fragment offset fields for all three fragment header..

  Provide arguments for choosing a pc with windows

Compare and contrast the two, and provide arguments for choosing a PC with Windows or a Mac with Mac OS. Locate five online resources to help with Windows 8 training and troubleshooting.

  What kind of os to use all along with the file system and

the cto informed you that the board of executives showed great interest in building a new network based on the work you

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd