Design a small-business LAN Logical Topology

Assignment Help Computer Networking
Reference no: EM132780853

Activity - Network Design Practical

1. Design a small-business LAN Logical Topology

2. Design a small-business Subnetting Scheme

Activity Outcomes: After completing this activity you should be able to

1. Demonstrate course knowledge to design an small-business LAN

Task 1. Design a Logical Topology with the following constraints:

Material Constraints:
• 2x 24-Port Layer 3 Network Switches
• lx Edge Router (connected out to the local LAN, the external RV21 5W LAN, and the WAN - 3 total connections)
• 2x Wireless Access Points
• lx Cisco RV215W (connected to the edge router to allow LAN communication from another building)
• 30 total network devices (these will determine your total subnets/VLANs and subnet scopes):

  • 10 VolP phones
  • 4 Executive computers
  • 2 Administration computers
  • 2 Finance computers
  • 3 Printers
  • 2 IT computers
  • 2 Servers
  • 5 network transport devices (listed above)
  • The Cisco RV215W

Logical Topology:

1. Use the image-editing tool of choice (a picture of pen-and-paper is fine)

2. Create a logical topology of the network you described above

3. Remember: Physical location is irrelevant in a logical topology, only how our devices are connected (VLAN's, Subnets, connection types, etc.) need to be included.

4. You need to include the following in your topology:

All device IP addresses

All port numbers used (most important on switches and routers)

Give all devices appropriate host names (excluding the VolP phones)

An example of a partially completed Logical Topology with the given constraints.

1364_figure.jpg

Task 2. Create a subnet scheme based upon the above functions and devices per function.

**(Use a Private Class C: 192.168.100.x)**

1. Document your subnet scheme as a list containing the Department/Function name, Net ID, host range, and Broadcast ID for each.

2. Don't forget to allocate an additional 1192.168.x.x/30 for your router-to-router (Edge Router to RV215W) connection and identify that in your list.

This subnet does not need to fall within the listed IP constraint.

Reference no: EM132780853

Questions Cloud

Management roles in change management : Competency Analyze leadership and management roles in change management.
Calculate the present values of the lease payments : Assuming 10 per cent marginal cost of debt to the lessee, calculate the present values of the lease payments.
What qualitative factors in background information consider : What qualitative factors in the background information would you consider when determining planning materiality for the 2021 audit of CCI?
Find current spot rate of baht against us dollar : Using the uncovered interest parity condition, illustrate what will happen to the current spot rate of baht against US dollar.
Design a small-business LAN Logical Topology : Design a small-business LAN Logical Topology and Demonstrate course knowledge to design an small-business LAN - Create a subnet scheme
Why organization do not want health information exchange : Using the internet, provide a summary of the recent status of the Direct Project. Discuss at least 2 reasons why some organizations do not want health.
Calculate the price-weighted index return : Calculate the price-weighted index return for the period ending in 2.
How should the janitor report the loss : Janitor did not own any stock in the company, and the loan was not a condition of employment. How should the janitor report this loss?
What is the present value of floating rate cash flows : Given the following spot yield curve, what should be the fixed rate. What is the present value of floating rate cash flows, assuming $1 notional principal

Reviews

Write a Review

Computer Networking Questions & Answers

  Fault-tolerant architecture and disaster recovery strategy

This assignment will give you the opportunity to provide a backup strategy and disaster recovery plan to protect the organization against disruptions to the availability of the system. In this final assignment, focus on the most critical system th..

  What is meant by the term wire-speed routing

Explain what data traffic is seen by computer 3 when computer 1 pings computer 2 in a LAN. A switch is used to interconnect the computers.

  Explain how the attack occurred

Explain how you would as an employee of a company practice those principles. Explain how the attack occurred and what was needed to remedy the situation

  Provide arguments for choosing a pc with windows

Compare and contrast the two, and provide arguments for choosing a PC with Windows or a Mac with Mac OS. Locate five online resources to help with Windows 8 training and troubleshooting.

  Contrast the benefits and problems of cat

When is CAT 7 due to be released and what does it do that CAT 6 and CAT 6a cannot?

  Assume there are n nodes

Assume there are N nodes connected to a wireless access point (AP) operating on IEEE 802.11b, and every node has at least one packet to send at a given time.

  Explain way handshake process use to initiate tcp connection

Explain the three-way handshake process used to initiate TCP connections. Describe the three basic types of network topologies and provide a sample diagram.

  Determine whether you prefer a laptop or desktop

From the e-Activity, determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to offer.

  Incident and crime scene procedures

Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidence seizure and storage procedures for these two types of investigations.

  Create a list of what can go wrong during deployment phase

Create a list of what can go wrong during the deployment phase of a project and steps that could have been taken to avoid these problems.

  Telecommunications-networking routing algorithms

Complex routing algorithms are used to maintain routing tables. What algorithms are used, and how do they work? What are the advantages and disadvantages of each?

  Identify different subnets according to network requirements

Identify the different subnets according to network requirements - Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd