CSC00240 Data Communications and Networks Assignment

Assignment Help Computer Networking
Reference no: EM132493122

CSC00240 Data Communications and Networks - Southern Cross University

PROBLEM

For this assessment, you need to complete two main tasks:
Part 1) Design the LANs of the case study.
Part 2) Design the IPv4 and IPv6 addressing scheme for the case study. Let us look at each task in a little more detail:

LANs' Design

The complete network consists of multiple subnetworks (in this case LANs) each of which has their own design according to usage. As we have learnt (or will learn depending on when you read this) in-class there are many design decisions involved in designing LANs. You need to design each component of the LANs with good justification for your design decisions. Your LAN design should fulfil the requirements laid out in the case study document. You will need to do some research on requirements for some of the functionalities the LANs need to perform and their solutions. For example, as stated in the document all the LANs should support video chats. You may also need to make some reasonable assumptions for your design. You should justify these assumptions. You will also provide costing for your solutions. All costings should be in AUD$.

IP Subnetting Design

We have seen (or will see in-class) that subnetworks and the devices in them need to be addressed. You will need to select a suitable starting address and subnet mask for IPv4 subnetting. The last two digits of your student ID should appear consecutively and in the same order as in your ID, in the starting address. For example, if your ID is 123456, then you can choose an address of the form xxx.x56.xxx.xxx. For the IPv6, please use the starting address:
2001 : DB8 : Θ :: /48

where Θ is the last four digits of your student ID expressed in hexa-decimal. The IP addressing should be provided in the form of tables (one for IPv4, one for IPv6) and contain the information noted down in the case study requirements. The starting addresses should be clearly stated before the beginning of the table.

Attachment:- Data Communications and Networks.rar

Reference no: EM132493122

Questions Cloud

Prepare journal entry allie will record for bond interest : Compute and specify the consolidated gain or loss on a consolidated income statement for at the end of 2020,Prepare consolidation entry B on 12/31/2020
Calculate the budgeted production for February : The average direct labor rate is $10.00 per hour. Calculate the budgeted production (in units) for February with work shown
Explain why adjustments are or are not required : Would need to be made to the journal entries you prepared in part 1 of this question, and explain why adjustments are or are not required.
What is the budgeted direct labor cost for August : Belant Company budgeted 200,000 units of production for June, 210,000 units. What is the budgeted direct labor cost for August
CSC00240 Data Communications and Networks Assignment : CSC00240 Data Communications and Networks Assignment help and solution, Southern Cross University - assessment writing service
What is the present value of the stream of payments : The bank will automatically deduct the payment from your account at the beginning of each month. What is your monthly equipment payment?
What were net cash inflows from financing activities : In Rapid Pac's statement of cash flows, what were net cash inflows (or outflows) from financing activities for 2018 and from investing activities for 2018?
Calculate the cash flows and npv of the project : Working capital is 15% of revenues in years 1-4, working capital is decreased to 0 in year 5. Now calculate the cash flows and NPV of the project
What the acceptable level of detection risk is : Control risk for fixed assets from 0.4 to 1.0 and audit risk (0.05) and inherent risk remain constant, the acceptable level of detection risk is most likely to

Reviews

Write a Review

Computer Networking Questions & Answers

  Build a clear understanding of project management

Network Project Management - Purpose of the assessment - examine a project case and write a 800-1000 words (excluding references) report on project management

  Explain why the data communication industry use the layered

explain me why the data communication industry use the layered osi reference model?1. it divides the network

  How the information would be used to optimize network

The statistics are in the form of counters that start from zero when a valid entry is created. Explained how the information would be used to optimize network. Provided examples of how to change network, based on information gathered and analyzed fro..

  Case study on implementation of data center networking

INTERNETWORKING (NC40-3) - overall analysis and evaluation of the topic in the report. Your report must contain strong technical content and sound argument

  Internal network address to incorporate variable length sub

Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol. Set up all of the accountants on a separate VLAN. Create a VPN connection to allow accountants to access the accounting database from..

  Starting a switch and router

Exercise: Toolwire Lab, Complete the following Toolwire Labs: Starting a Switch and Starting a Router

  1discuss the reasons and demo of how nc and tftp services

1.discuss the reasons and demo of how nc and tftp services are considering as the best remote support tools during a

  How will people know that the screen is touch-sensitive

Sketch two (2) alternative interface designs for the ATM and indicate which alternative you prefer. The goal of this assignment is to exercise your user interface design abilities. Creativity in balancing usability with the constraints of the inte..

  Proposal for an internet-intranet solution

You have been asked to present a proposal for an Internet/Intranet solution for a college. The college is especially interested in the promised efficiency gains to be found from new ways of working online, and the possibilities for cost savings (e.g...

  Detect or prevent network security breaches

detect or prevent network security breaches, you must understand the Internet protocols as well as the attacker does. The protocols originate

  Discuss net neutrallity

How is cloud computing and 'access anywhere" methodologies and services think streaming Impacting the WAN and ISPs

  Explain the types of physical network devices used

Explain the types of physical network devices used in connecting all devices across the organization based on what you know from the scenario.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd