Evaluate LAN technology issues

Assignment Help Computer Networking
Reference no: EM133585607

IT Networking and Communication

Learning Outcome 1: Identify the operation of the protocols that are used inside the Internet and use the seven-layer model to classify networking topology, protocol, and security needs.

Learning Outcome 2: Evaluate LAN technology issues, including routing and flow control. Explain the difference between switches and routers. Build and troubleshoot Ethernet, Wi-Fi, and Leased line networks. Connect networks with routers.

Learning Outcome 3: Apply the advanced knowledge gained to reflect on the security requirements of a network. Evaluate the issues that surround network applications such as quality of service (QoS) and network performance analysis. Be adaptable to changing requirements.

Case Study:
Your group is hired as a consultancy firm to set up a small private day-patient hospital network technology. The hospital has one building, 5 floors, Basement dedicated to secure car parking, Level 1 consists of a reception and a waiting room, Level 2 and 3 consistent of 2 operating theaters, 4 post-operative recovery rooms, Level 5 is the management, financial offices and the staff room.

Patients can access Wifi and there is an internal website - one page explaining how to get on to the network. Staffing is as follows: 4 Management, 3 financial officers and 5 nurses and 3 doctors.
The nurses and doctors share 4 phones per each floor on Level 2 and Level 3. Management staff and financial officers have a phone each.

In Packet Tracker:

Construct the appropriate network technologies. Separate Level 2 and 3 from other offices using VLANs. Separate VoIP phones on VLAN 0.
Setup appropriate subnet Config the wireless LAN.
Setup a WebSever for the website
Setup a DHCP server and a DNS server. Enable routers to connect to each other. Setup a STP.
Appropriate label your network diagram with annotation and background image. Generate appropriate network traffic.
Show QoS (e.g. show policy-map interface serial 0/0/0) before and after simulation.

Throughout this assessment you may find the following CISCO packet tracer sample labs useful. (File-> Open Samples) Wireless LAN, DHCP, Wireless, DNS, HTTPS, Wireless LAN Security Remember to view the configuration of a CISCO box use the following command; enable, show run

In a 5-6 minute video demonstrate your working Packet Tracer showing all features completed with appropriate traffic. Do NOT show you configuring them.

In a written report explain the following:
Explain the network subnets, super nets, etc (how did you implement and why. Broadcast address, network address, default gateway, host range)
Explain your topologies (e.g. why you uses switches/routers in the appropriate location) Explain what security measures are in place or how the security could be improved.
Explain what your design reliability, redundancy and other features that may have. Discuss in terms of OSI models, networking terminology, etc.

The word limit of the report is 1000 words.
The cover page must specify student names, ID numbers, unit details, and assignment details.
The assignment must use a 12-point font size and at least single line spacing with appropriate section headings.
The report must be submitted in a soft (electronic) copy as a Microsoft Word document on the LMS in Turnitin enabled submission link.

Attachment:- IT Networking and Communication.rar

Reference no: EM133585607

Questions Cloud

Provide a profile of your chosen struggling company : For this problem, you will submit a one to two pages document that will provide a profile of your chosen struggling company (from the list below).
Identify which principles from the articles were lacking : Think about a negative experience when you worked in a group or team and identify which principles from the articles were lacking.
Returned from hospital after physical illnesss : Jasmine has recently returned from hospital after a physical illness and has been referred to community-based rehabilitation to work on her occupational therapy
Determine what drug therapy to prescribe : Describe the method used to determine what drug therapy to prescribe? Discuss Schedule drugs and prescribing restrictions for each scheduled drug.
Evaluate LAN technology issues : MITS4004 IT Networking and Communication, Victorian Institute of Technology - Identify the operation of the protocols that are used inside the Internet
Describe financial estimates and rationale : Describe financial estimates and rationale which include financial statements and forms that document the viability of your proposed business and its soundness.
Surgical history negative : Shirley Jackson is 29-year-old female presenting today at your clinic with a positive home pregnancy test. Surgical history negative
How to prevent a future similar occurrence : GEB 1011- Provide an Action Plan for this case including how to prevent a future similar occurrence. Should include a contingency plan should problems arise.
Chronic acid reflux develops esophageal stricture : A patient with a history of chronic acid reflux develops an esophageal stricture. W

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the need of encapsulation elaborately explain the

q1. describe the need of encapsulation. elaborately describe the process of encapsulation and creation of packets as a

  Find a software vendor that sells a package

Search the Web to find a software vendor that sells a package that supports each of the following protocols: SDLC, HDLC, Ethernet, and PPP.

  What is the number of triangles in a complete graph

What is the number of triangles in a complete graph with vertices and what is the expected number of triangles in an Erdos-Rényi graph , a graph on vertices where each edge appears with a probability independently?

  Question 1think about a number of wireless devices nodes

question 1think about a number of wireless devices nodes which are connected to the internet via a single access point

  Compare two tools for one of three network management areas

Compare and contrast two tools for one of the three network management areas. What is the best tool for each area?

  What command line assign correct dns server ip address

While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server.

  Formulate ip that determine a set of disks for storage

Formulate an IP that determine a set of disks requiring the minimum amount of storage such that each file is on at least one of the disks.

  Difference between global ip address and private ip address

What is the difference between a global IP address and a private IP address? Describe how a gateway converts a private IP address into a global IP address.

  - describe the different types of controls that managers

- describe the different types of controls that managers can implement on any project - feed forward control concurrent

  What are the advantages of using rule sets

What are the advantages of logging more information to the alerts file and What are the disadvantages of logging more information to the alerts file

  DNCT704 – Network and Cloud Design and Assessment Problem

DNCT704 – Network and Cloud Design and Assessment Help-New Zealand School of Education, New Zealand-Diploma in Applied Network and Cloud Technology (Level 7)

  Company-s interpretation of requirement of system

You have taken job with a software user who has contracted previous employer to develop a system for them. You discover that your company's interpretation of requirements is different from interpretation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd