Determine the enhanced switching technology

Assignment Help Computer Network Security
Reference no: EM133105372 , Length: word count:2500

ICTNWK543 Install, operate and troubleshoot medium enterprise switches

Assessment Task: Project and Presentation

In this task
• The student will act as Kelly
• The assessor will act as a technical support person of a switch manufacturing company
• The student must discuss the enhanced switching functions with assessor
• The student must determine the enhanced switching functions supported by a switch
• In this task, the student must answer the relevant questions asked

Task 1.1
In the previous activities, you have performed the initial configurations on the switch and identified the cables and ports required to connect the switch in the network. The next challenge for Kelly is to determine the enhanced switching technology supported by the switch. Kelly held a meeting with the technical support team of switch manufacturer to ensure the enhanced technologies supported by a switch
As you are acting as Kelly. You are supposed to complete the meeting minutes template.

Task 1.2
This task is in continuation of task 1.1
In this task:
• The student will act as Kelly
• The student must configure the switch using advanced switching functions
After determining the enhanced technologies supported by switch now, Kelly has to connect the switch to the other devices by using the advanced switching functions mentioned below;
1. Vlan
2. Trunk
3. Inter-Vlan Route
4. STP and RSTP
You will need to show your trainer/assessor how you complete these functions above according to the switch and the network available. Your trainer/assessor will provide you access to these.
As part of your assessment, you are required to provide to your trainer/assessor a document which provides the information regarding the steps you have used to execute the above functions.

Task 1.3

This task is in continuation of task 1.2
In this task:
• The student will act as Kelly
• The student must find the root cause of the problem
• The student must resolve the problem using basic utilities
• The assessor must create the problem in network connectivity to assess students' skills

Part A

After finalising the installation, Kelly needs to run some tests to confirm the working of the network. While checking the connectivity between the network switches, Kelly found that a newly installed switch and server were not communicating with each other.
Kelly now needs to identify and resolve the network issue by using any one of the following basic utilities suggested by your assessor

• Ping
• Secure shell (SSH)
• Telnet
• Traceroute
• ipconfig

Attachment:- Project and Presentation.rar

Reference no: EM133105372

Questions Cloud

Management decision problem for amazon : What is the management decision problem (MDP) for Amazon
What is uppsala model in global strategy : What is Uppsala model in global strategy? Use it to map the internationalization of any company of your choice with examples
How changing market conditions can affect organisation : How changing market conditions can affect a organisation's business? Provide (1) organisation as example.
Explain the goal of controlling the organization : This week we are looking at differing organizational structures and how each accomplishes the goal of controlling the organization and fostering organizational
Determine the enhanced switching technology : Determine the enhanced switching technology supported by the switch. Kelly held a meeting with the technical support team of switch manufacturer
Four major internal components of an open system : Engage in a thoughtful dialogue (personal input supported by content from the textbook) with classmates as it relates to one or more of the following questions.
Completing an educational assignment : Describe a time when you conducted secondary research prior to making a purchase or completing an educational assignment.
Review existing network design and asset inventory : Prepare a project plan - get the security clearance from the IT administrator to access the site. To gain security clearance
National subsidy strategies exist in australia : What three (3) national subsidy strategies exist in Australia?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd