Design for small medium enterprise networks

Assignment Help Computer Network Security
Reference no: EM132961560

Networking Technologies Assignment

Objectives
The objective of this assignment is to assess your understanding of fundamental networking structure and network design concepts, and your ability to apply them to practical exercises using a tool (Packet Tracer).

Learning Outcome 1: Analyse and evaluate network technologies and services using a layered approach and network standards.
Learning Outcome 2: Formulate and analyse a network design for small medium enterprise networks.

Preparation
1) This assignment requires students to produce a Panopto video based on task instructions below. This assignment requires video recording equipment such as a notebook equipped with a camera, as well as the software Panopto (in Blackboard). If required, you can borrow a laptop from the library.
2) You should be familiar with Panopto in Blackboard and Packet Tracer for this assignment. It is recommended that you carefully follow the Panopto instructions when submitting your work. It is your responsibility to submit a video and a Packet Tracer (pkt) file correctly according to the instructions. Make sure you select the ‘Panopto Student Video Submission' option as shown below. Otherwise, it will not be successfully submitted.

IMPORTANT: If you submit your video via the wrong option it may delay the marking of your assessment and/or lead to late penalties. It is the responsibility of students to watch these video instructions and to follow them closely. You can edit your submission multiple times prior to the due date.
3) Practice recording a few times to keep within the time limit, and use the rubric as a guide, as it will be used for grading. Check here to learn how merge videos if necessary. Visit the Panopto for Students intranet site for more resources, and watch the video in the submission folder paying particular attention to the right Mashup tool for submission.

Requirements:
Watch this video before submitting your assignment
You will need to show footage of yourself completing each task, as well as footage of yourself speaking to the camera about each task.

1025_figure.jpg


Figure 1 Network topology.

Task 1 Network Design and Plan
Design and configure routers and hosts (but switches) in the network by allocating each IP addresses in an appropriate and minimal range (to maximise the spare ranges for future use) as shown in Figure 1 using Packet Tracer, and verify the connectivity fully works across the network including inter and intra networks.
Notes:
1. Use ‘ping' to verify connectivity ‘successful' status
2. Display names and IP addresses of devices and interfaces on the Packet Tracer screen
3. Use/design smallest subnet mask for each network where possible
4. Show the subnetting scheme in a single page in your presentation
5. Check ‘no auto-summary' command, which will be required to configure routing protocol such as RIP
and EIGRP

Task 2 Layer 2 Implementation and Analysis
In Subnet A, redesign and configure the network to allocate VLAN10 and VLAN 20 for 2 hosts by allocating each IP addresses in an appropriate range. Check connectivity within the same and different VLANs.
Demonstrate how Layer 2 and Layer 3 work differently by enabling and disabling the R1 interface, and analyse the results and explain why it was a ‘success' or ‘failure'.

Task 3 Layer 3 Evaluation
In Subnet B, clear the ARP table of devices, and ping from a host in Subnet B to a host in Subnet C. Evaluate and analyse how Layer 2 and Layer 3 addresses (source and destination) are allocated in each network's ingress and egress interfaces. For example, what address is and is not changed at the router interfaces with Subnet A and C? Explain why and justify your answers.

Networking Technologies - Assignment 2

Objectives
This assessment assesses your ability to demonstrate concepts of networks, protocols, and services including the following criteria:
• Evaluation and analysis of communication protocols including HTTP, HTTPS and TCP/IP
You will be required to learn how to use Wireshark (protocol analyser), procedures to generate traffic, and capture for analysis and evaluation. A presentation tool such as MS Power Point will be required to prepare slides to support the presentation.

Learning Outcomes
On completion of this assignment students should be able to:
• ULO 2: Analyse and evaluate network technologies and services using a layered approach and network standards.

Preparation
1) This assignment requires students to produce a Panopto video based on task instructions below. This assignment requires video recording equipment such as a notebook equipped with a camera, as well as the software Panopto in Blackboard (see instructions below). If required, you can borrow a laptop from the library.
2) You should be familiar with Panopto in Blackboard for this assignment. It is recommended that you carefully follow the Panopto instructions when submitting your work. It is your responsibility to submit a video file correctly following the instructions. Make sure you select the ‘Panopto Student Video Submission' option as shown below. Otherwise, it will not be successfully submitted.

IMPORTANT: If you submit your video via the wrong option, it may delay the marking of your assessment and/or lead to late penalties. It is the responsibility of students to watch these video instructions and to follow them closely. You can edit your submission multiple times prior to the due date.
3) Practice recording a few times to keep within the time limit, and use the rubric as a guide, as it will be used for grading. Check here to learn how merge videos if necessary. Visit the Panopto for Students intranet site for more resources, and watch the video in the submission folder paying particular attention to the right Mashup tool for submission.

Requirements
Watch this video before submitting your assignment
Provide a video demonstration using Wireshark as per the requirements.
You will need to show footage of yourself completing each task, as well as footage of yourself speaking to the camera about each task. Your video should cover the following tasks:
This task criterion requires students to generate their own traffic for Wireshark (Do not to use the pre-captures available at the Wireshark or Internet websites). Use the lab instructions or search the Internet to find how to generate traffic for each topic.
Task 1 HTTP/HTTPS
Generate and capture your own HTTP and HTTPS traffic and examine the message fields. Explain sequences of messages exchanged between the server and its client for HTTP and HTTPS traffic using Wireshark. Summarise the captured message flow using slides to support your presentation. Contrast both protocols with similarities and differences.

The following shows an example of how to generate HTTP traffic. Note that HTTPS traffic looks different from HTTP and requires security layer to be captured.
a) Clear the browser's cache (click Ctrl+Shift+Delete keys at the same time).
b) Find a site with HTTP. It may not be easy to find as many sites using HTTPS e.g.
c) Open Wireshark and start capturing.
d) Open your browser and access a HTTP site.
e) Stop capturing the packets and close the browser.
f) Find HTTP packets and complete the tasks.

Task 2 TCP/IP Encapsulation
Generate and capture your own TCP/IP traffic and packets and inspect TCP/IP model layers and fields. Analyse and explain encapsulation processes with TCP/IP layers and the header size of each layer and their payload sizes to verify the encapsulation. Summarise the captured message to show header and payload sizes using slides to support your presentation. (Note: Layer 2 also has a trailer)

Attachment:- Networking Technologies.rar

Reference no: EM132961560

Questions Cloud

Estimate the expected long-run dividend growth rate : Estimate the expected long-run dividend growth rate if an investor expects to earn the average historic return of 8.2%
Analyse and evaluate network technologies and services : Analyse and evaluate network technologies and services using a layered approach and network standards - Generate and capture your own TCP/IP traffic and packets
Formulate and analyse a network design : Formulate and analyse a network design for small medium enterprise networks - understanding of fundamental networking structure and network design concepts
Estimate purchases for June and July : Parts are purchased at a wholesale price of $20. Lakeside purchased 16,000 parts in May. Estimate purchases (in units) for June and July
Design for small medium enterprise networks : Analyse and evaluate network technologies and services using a layered approach and network standards - design for small medium enterprise networks
Identify the sequence of actions you need to take : Identify the sequence of actions you need to take to start this decision process. Propose a risk profile for each choice
Calculate the reduction percentage for the missy : Calculate the reduction percentage for the Missy top department for Fall if gross sales are $5,750,000 and the reduction dollars are $3,160,000
What is the amount of sales revenue reported : Apollo Corporation produces and sells a single product, sewing machines, for $100 per unit. What is the amount of sales revenue reported
What effective annual rate? is needy? paying : The Needy Corporation borrowed $14,000 from Bank Ease. What effective annual rate? (EAR) is Needy? paying

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain main targets seem to be larger or smaller companies

Research three recent information security breaches. Do the main targets seem to be larger or smaller companies? Is there a particular industry that seems predominately targeted?

  Give opinion of most important ways that believe encryption

Give your opinion of the two most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer.

  Write a report about how smart phone makes life easier

Write a report about the usage and benefits as well as how smart phone makes life easier. Introduce the subject of the report

  Concept of privacy and security

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  How technology information applies to the global environment

Introducing Network Devices- Write a 2- to 3-page paper explaining how this technology information applies to the global environment.

  Explain the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security.

  Modern networks have to support a number of digital data

modern networks have to support a number of digital data protocols as well as digital audio protocols. the ability to

  In the past several years incidences such as school

in the past several years incidences such as school shootings have caused loss of many lives in us schools and

  Configure a sniffer to monitor traffic

Configure a sniffer to monitor traffic. You will then run two network scans to emulate part of a hacker's life cycle

  Network topology design for abc

Network topology diagram and the domains of trust and security-related assumptions in your design and security policy to make this assumption valid.

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

1 decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher.2 encrypt the

  Describe the seven layers of the osi model

Describe the seven layers of the OSI model and how they interact with the connected layers. Discuss seven hardware or software components.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd