Determine the enhanced switching technology

Assignment Help Computer Network Security
Reference no: EM133105372 , Length: word count:2500

ICTNWK543 Install, operate and troubleshoot medium enterprise switches

Assessment Task: Project and Presentation

In this task
• The student will act as Kelly
• The assessor will act as a technical support person of a switch manufacturing company
• The student must discuss the enhanced switching functions with assessor
• The student must determine the enhanced switching functions supported by a switch
• In this task, the student must answer the relevant questions asked

Task 1.1
In the previous activities, you have performed the initial configurations on the switch and identified the cables and ports required to connect the switch in the network. The next challenge for Kelly is to determine the enhanced switching technology supported by the switch. Kelly held a meeting with the technical support team of switch manufacturer to ensure the enhanced technologies supported by a switch
As you are acting as Kelly. You are supposed to complete the meeting minutes template.

Task 1.2
This task is in continuation of task 1.1
In this task:
• The student will act as Kelly
• The student must configure the switch using advanced switching functions
After determining the enhanced technologies supported by switch now, Kelly has to connect the switch to the other devices by using the advanced switching functions mentioned below;
1. Vlan
2. Trunk
3. Inter-Vlan Route
4. STP and RSTP
You will need to show your trainer/assessor how you complete these functions above according to the switch and the network available. Your trainer/assessor will provide you access to these.
As part of your assessment, you are required to provide to your trainer/assessor a document which provides the information regarding the steps you have used to execute the above functions.

Task 1.3

This task is in continuation of task 1.2
In this task:
• The student will act as Kelly
• The student must find the root cause of the problem
• The student must resolve the problem using basic utilities
• The assessor must create the problem in network connectivity to assess students' skills

Part A

After finalising the installation, Kelly needs to run some tests to confirm the working of the network. While checking the connectivity between the network switches, Kelly found that a newly installed switch and server were not communicating with each other.
Kelly now needs to identify and resolve the network issue by using any one of the following basic utilities suggested by your assessor

• Ping
• Secure shell (SSH)
• Telnet
• Traceroute
• ipconfig

Attachment:- Project and Presentation.rar

Reference no: EM133105372

Questions Cloud

Management decision problem for amazon : What is the management decision problem (MDP) for Amazon
What is uppsala model in global strategy : What is Uppsala model in global strategy? Use it to map the internationalization of any company of your choice with examples
How changing market conditions can affect organisation : How changing market conditions can affect a organisation's business? Provide (1) organisation as example.
Explain the goal of controlling the organization : This week we are looking at differing organizational structures and how each accomplishes the goal of controlling the organization and fostering organizational
Determine the enhanced switching technology : Determine the enhanced switching technology supported by the switch. Kelly held a meeting with the technical support team of switch manufacturer
Four major internal components of an open system : Engage in a thoughtful dialogue (personal input supported by content from the textbook) with classmates as it relates to one or more of the following questions.
Completing an educational assignment : Describe a time when you conducted secondary research prior to making a purchase or completing an educational assignment.
Review existing network design and asset inventory : Prepare a project plan - get the security clearance from the IT administrator to access the site. To gain security clearance
National subsidy strategies exist in australia : What three (3) national subsidy strategies exist in Australia?

Reviews

Write a Review

Computer Network Security Questions & Answers

  CS 6262 Network Security Assignment Problem

CS 6262 Network Security Assignment Help and Solution, Georgia Institute of Technology, Homework Help - Analyze network traffic on the host.

  Develop a system security plan for an information system

Develop a sample System Security Plan for an information system. Select and incorporate appropriate management, technical, and operational security controls into a system security plan.

  What is the difference between a session key and master key

What is the difference between a session key and a master key? Show that Feistel decryption is the inverse of Feistel encryption.

  What is the definition of information security what

1.what is the definition of information security? what essential protections must be in place to protect information

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  Mobile technologies and commerce

Your attention in this paper can be focused on any of the following topics covered in our text: · Information Management / IT Architecture. · Database, Data, Warehouse, and Data Mining. · Networks, Collaboration, and Sustainab..

  Define copyright trade secrecy and patents as they related

Define copyright trade secrecy and patents as they related

  List of security activities or controls

List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data

  Explain policies and procedures that will be used on network

Create a memo to the company employees that describes the policies and procedures that will be used on the network. Write your memo so that it describes what the employees must do, and what the employees are not allowed to do.

  How does active directory support network security

ISOL534 Provide an explanation of if/where/how does Active Directory support network security. The paper must be at least 10 pages (2,000-2,500) words.

  What was the total price for the hardware configuration

What was the total price for the hardware configuration you chose? What manufacture did you choose for your replacement computer?

  Why does the use of passwords put the overall security

Why does the use of passwords put the overall security of the network in jeopardy? Discuss whether additional measures could have been taken.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd