Design for small medium enterprise networks

Assignment Help Computer Network Security
Reference no: EM132961560

Networking Technologies Assignment

Objectives
The objective of this assignment is to assess your understanding of fundamental networking structure and network design concepts, and your ability to apply them to practical exercises using a tool (Packet Tracer).

Learning Outcome 1: Analyse and evaluate network technologies and services using a layered approach and network standards.
Learning Outcome 2: Formulate and analyse a network design for small medium enterprise networks.

Preparation
1) This assignment requires students to produce a Panopto video based on task instructions below. This assignment requires video recording equipment such as a notebook equipped with a camera, as well as the software Panopto (in Blackboard). If required, you can borrow a laptop from the library.
2) You should be familiar with Panopto in Blackboard and Packet Tracer for this assignment. It is recommended that you carefully follow the Panopto instructions when submitting your work. It is your responsibility to submit a video and a Packet Tracer (pkt) file correctly according to the instructions. Make sure you select the ‘Panopto Student Video Submission' option as shown below. Otherwise, it will not be successfully submitted.

IMPORTANT: If you submit your video via the wrong option it may delay the marking of your assessment and/or lead to late penalties. It is the responsibility of students to watch these video instructions and to follow them closely. You can edit your submission multiple times prior to the due date.
3) Practice recording a few times to keep within the time limit, and use the rubric as a guide, as it will be used for grading. Check here to learn how merge videos if necessary. Visit the Panopto for Students intranet site for more resources, and watch the video in the submission folder paying particular attention to the right Mashup tool for submission.

Requirements:
Watch this video before submitting your assignment
You will need to show footage of yourself completing each task, as well as footage of yourself speaking to the camera about each task.

1025_figure.jpg


Figure 1 Network topology.

Task 1 Network Design and Plan
Design and configure routers and hosts (but switches) in the network by allocating each IP addresses in an appropriate and minimal range (to maximise the spare ranges for future use) as shown in Figure 1 using Packet Tracer, and verify the connectivity fully works across the network including inter and intra networks.
Notes:
1. Use ‘ping' to verify connectivity ‘successful' status
2. Display names and IP addresses of devices and interfaces on the Packet Tracer screen
3. Use/design smallest subnet mask for each network where possible
4. Show the subnetting scheme in a single page in your presentation
5. Check ‘no auto-summary' command, which will be required to configure routing protocol such as RIP
and EIGRP

Task 2 Layer 2 Implementation and Analysis
In Subnet A, redesign and configure the network to allocate VLAN10 and VLAN 20 for 2 hosts by allocating each IP addresses in an appropriate range. Check connectivity within the same and different VLANs.
Demonstrate how Layer 2 and Layer 3 work differently by enabling and disabling the R1 interface, and analyse the results and explain why it was a ‘success' or ‘failure'.

Task 3 Layer 3 Evaluation
In Subnet B, clear the ARP table of devices, and ping from a host in Subnet B to a host in Subnet C. Evaluate and analyse how Layer 2 and Layer 3 addresses (source and destination) are allocated in each network's ingress and egress interfaces. For example, what address is and is not changed at the router interfaces with Subnet A and C? Explain why and justify your answers.

Networking Technologies - Assignment 2

Objectives
This assessment assesses your ability to demonstrate concepts of networks, protocols, and services including the following criteria:
• Evaluation and analysis of communication protocols including HTTP, HTTPS and TCP/IP
You will be required to learn how to use Wireshark (protocol analyser), procedures to generate traffic, and capture for analysis and evaluation. A presentation tool such as MS Power Point will be required to prepare slides to support the presentation.

Learning Outcomes
On completion of this assignment students should be able to:
• ULO 2: Analyse and evaluate network technologies and services using a layered approach and network standards.

Preparation
1) This assignment requires students to produce a Panopto video based on task instructions below. This assignment requires video recording equipment such as a notebook equipped with a camera, as well as the software Panopto in Blackboard (see instructions below). If required, you can borrow a laptop from the library.
2) You should be familiar with Panopto in Blackboard for this assignment. It is recommended that you carefully follow the Panopto instructions when submitting your work. It is your responsibility to submit a video file correctly following the instructions. Make sure you select the ‘Panopto Student Video Submission' option as shown below. Otherwise, it will not be successfully submitted.

IMPORTANT: If you submit your video via the wrong option, it may delay the marking of your assessment and/or lead to late penalties. It is the responsibility of students to watch these video instructions and to follow them closely. You can edit your submission multiple times prior to the due date.
3) Practice recording a few times to keep within the time limit, and use the rubric as a guide, as it will be used for grading. Check here to learn how merge videos if necessary. Visit the Panopto for Students intranet site for more resources, and watch the video in the submission folder paying particular attention to the right Mashup tool for submission.

Requirements
Watch this video before submitting your assignment
Provide a video demonstration using Wireshark as per the requirements.
You will need to show footage of yourself completing each task, as well as footage of yourself speaking to the camera about each task. Your video should cover the following tasks:
This task criterion requires students to generate their own traffic for Wireshark (Do not to use the pre-captures available at the Wireshark or Internet websites). Use the lab instructions or search the Internet to find how to generate traffic for each topic.
Task 1 HTTP/HTTPS
Generate and capture your own HTTP and HTTPS traffic and examine the message fields. Explain sequences of messages exchanged between the server and its client for HTTP and HTTPS traffic using Wireshark. Summarise the captured message flow using slides to support your presentation. Contrast both protocols with similarities and differences.

The following shows an example of how to generate HTTP traffic. Note that HTTPS traffic looks different from HTTP and requires security layer to be captured.
a) Clear the browser's cache (click Ctrl+Shift+Delete keys at the same time).
b) Find a site with HTTP. It may not be easy to find as many sites using HTTPS e.g.
c) Open Wireshark and start capturing.
d) Open your browser and access a HTTP site.
e) Stop capturing the packets and close the browser.
f) Find HTTP packets and complete the tasks.

Task 2 TCP/IP Encapsulation
Generate and capture your own TCP/IP traffic and packets and inspect TCP/IP model layers and fields. Analyse and explain encapsulation processes with TCP/IP layers and the header size of each layer and their payload sizes to verify the encapsulation. Summarise the captured message to show header and payload sizes using slides to support your presentation. (Note: Layer 2 also has a trailer)

Attachment:- Networking Technologies.rar

Reference no: EM132961560

Questions Cloud

Estimate the expected long-run dividend growth rate : Estimate the expected long-run dividend growth rate if an investor expects to earn the average historic return of 8.2%
Analyse and evaluate network technologies and services : Analyse and evaluate network technologies and services using a layered approach and network standards - Generate and capture your own TCP/IP traffic and packets
Formulate and analyse a network design : Formulate and analyse a network design for small medium enterprise networks - understanding of fundamental networking structure and network design concepts
Estimate purchases for June and July : Parts are purchased at a wholesale price of $20. Lakeside purchased 16,000 parts in May. Estimate purchases (in units) for June and July
Design for small medium enterprise networks : Analyse and evaluate network technologies and services using a layered approach and network standards - design for small medium enterprise networks
Identify the sequence of actions you need to take : Identify the sequence of actions you need to take to start this decision process. Propose a risk profile for each choice
Calculate the reduction percentage for the missy : Calculate the reduction percentage for the Missy top department for Fall if gross sales are $5,750,000 and the reduction dollars are $3,160,000
What is the amount of sales revenue reported : Apollo Corporation produces and sells a single product, sewing machines, for $100 per unit. What is the amount of sales revenue reported
What effective annual rate? is needy? paying : The Needy Corporation borrowed $14,000 from Bank Ease. What effective annual rate? (EAR) is Needy? paying

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd