Create three separate networks for the employees

Assignment Help Computer Networking
Reference no: EM132640791 , Length: word count:2000

Case Study: Intelli Publishing

Intelli Publishing is a small and independent publisher based in Moreton Bay with 100employees. To support its current expansion, Intelli has leased the first 3 floors (out of 10) in a commercial building.The management decides to provide each employee with a workstation and a floor cannot accommodate more than 40 workstations. Recently, you have been hired as anetwork administratorand have a junior network technician to assist with the design of a physical network for Intelli Publishing. Your first task is to write a technical report to install a physical network for connectivity between the three floors which is then connected to a demarcation point in the building. The technical report must provide enough information and justify an appropriate topology, structured cabling, equipment room, and alternative distribution panelsthat will be used to build a neat and tidy physical network. You must also justify the type of networking devices, cables used, and how you would terminate structured cabling and testthose cables.Finally, sketch an outline of the physical network and answer the following questions.

Q1. You have decided to use a network ID 192.168.4.0/24 to create three separate networks for the employees of Intelli Publishing. Do you foresee any issues with this network ID in terms of public and private addresses? In your own words, explain how you will calculate each network ID, Subnet Mask, Host ID range, no of Usable Host, and Broadcast address. Marks will be awarded only for explaining how you have calculated each network ID, subnet mask, Host ID range, no of Usable Host, and Broadcast address. You must use concepts such as host bits, subnet size, default subnet mask, subnet bits and subnets to justify your answer.Simply listing out each network ID, subnet mask, Host ID range, no of Usable Host, and Broadcast address won't be awarded marks.

Q2.The junior network technician is designing a new network and you have been approached since he can't figure out the network id of the host 10.50.229.66/23. In your own words, explain in detail how you will find this. You must also include the broadcastaddress, first usable host and last usable host to justify your answer.Simply listing out the network ID, Usable Hosts, and Broadcast address won't be awarded marks.

Q3. You are planning to redesign a Classful 172.31.0.0 network to accommodate 1000 subnets with 15 hosts per subnet.In your own words, explain what subnet masks you could use to satisfy this new requirement. You must use concepts such as host bits, subnet bits, hosts and subnets to justify your answer.Consider all possible subnets in your answer. Simply listing out subnet masks won't be awarded any marks.

Q4. The business executives of Intelli are not familiar with the concept of how a computer can ping a web server through a switch. Further, you plan to demonstrate the path a packet takes from a computer in a network to a computer in a different network through a router. Your plan is to design this network using two computers, two switches, one router and a web server. Your task is to provide step by step instructions to the junior network technician so that he can demonstrate how a computer can ping a web server through a switch to the business executives. Further, explain and justify which network diagnostic tool would be the best to demonstrate the path of a packetfrom a computer in a network to a computer in a different network through a router. You must use concepts such as IP addresses, connection cables, ARP, TTL and ICMP to justify your answer.

Attachment:- Intelli Publishing.rar

Reference no: EM132640791

Questions Cloud

Relationship between naïve bayes and bayesian networks : What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?
Compare idealism and realism in business ethics : Compare Idealism and Realism in business ethics decision making.
Employer to develop incident response plan : You have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee
Differences between centralized and decentralized : Explain the differences between centralized and decentralized when it comes to ethics.
Create three separate networks for the employees : create three separate networks for the employees of Intelli Publishing. Do you foresee any issues with this network ID in terms of public and private addresses
Net programming : Explain Two tier and Three tier server model with neat diagram ? Describe feature and advantages of .net ?
Nature of the employment-relationship : Analyze the contested nature of the employment-relationship extensively?
Explain conflict of right and a conflict of interest : What is the difference between a conflict of right and a conflict of interest?
Imoprtance Of Strategic IT Planning : Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years?

Reviews

len2640791

9/23/2020 1:32:47 AM

Hello, Please find the attached documents. It contains all the information in it for the assessment. The case study and the report format are all inside the attachment. The report is of 2000 words and is very strict with the refrencing format. Hope you follow all the structure rules for refrencing.

Write a Review

Computer Networking Questions & Answers

  Explain why you think the network is effective and efficient

Examine its network design and explain why you think the network is effective and efficient. Recommend a better network design which can support the decisions and operations of the business if there is any.

  The network security systems in corporations

The network security systems in corporations and universities and how it can be developed - Majority of references should be peer reviewed

  1 a discuss the importance of scada securityb why are scada

1. a. discuss the importance of scada security.b. why are scada systems particularly vulnerable to cyber treats? c.

  Configuring vlans and deciphering stp output

Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week's TCOs and other course material, and just as important, how you feel ..

  Investigate capabilities and costs of an encryption package

Investigate the capabilities and costs of an encryption package. - Investigate the capabilities and costs of an online backup service.

  Identify and report network threats

MN502 - Overview of Network Security - Security Challenges in Emerging Networks - Identify and report network threats, select and implement countermeasures

  What disadvantages do wireless networks have

What disadvantages do wireless networks have? An electromagnetic signal contains what fields? What is their relationship? Define and give an example of narrow band and spread spectrum transmission.

  Risk and control self-assessment

Identify approaches on how to plan for threats and events that could potentially cause disruptions.

  Implementation plan to explain topology of network

Implementation Plan describing how this network will be implemented. In paper, explain the topology (both logical and physical) of network, network operating system, creation of user accounts, and security concerns.

  Diagram of the entire network

Diagram of the entire network. Diagrams for each location. Explanation of security procedures.

  Analyse the need for the network for above case study

Local Area Network Design and Setup - Melbourne institute of technology - Advanced Network Design - Local Area Network design and configuration

  Advantages of realtime processing

Advantages of realtime processing

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd