Explain the principles of communication in networks

Assignment Help Computer Network Security
Reference no: EM133530986

Networking and Security

Network Planning Assignment

Learning Outcome 1: Describe and explain the role and function of network connectivity in current computing.
Learning Outcome 2: Describe and explain the principles of communication in networks.
Learning Outcome 3: Describe the role and functionality of hardware and software entities that contribute to the network communications.
Learning Outcome 4: Describe and explain the protocols and interactions that implement network communications.
Learning Outcome 5: Describe fundamental aspects of cloud computing.
Learning Outcome 6: Apply networking architecture knowledge to analyze the networking needs of the business.

Overview
The main objectives of this assignment are:
• To help students gain a good understanding of the IP (Internet Protocol), which is the major underlying technology of the Internet.
• To help students to understand the importance of subnet and routing of IP address.
• To encourage students to conduct an independent investigation into IP related topics from books, the Internet and through practical investigation.

Engagement with this assignment should help students to understand the primary underlying concepts of the Internet world.

Case Scenario
You have been appointed as a Network System Administrator by the Australian government to allocate public IP Version 4 (IPv4) addresses and build a routing table for edge routers to connect the Australian states as shown in Figure 1.

The IPv4 is an exhaustive list of IPv4 addresses for current Internet users in the world. However, in this scenario, you have the liberty to use the entire available unreserved public IPv4 addresses for the Internet users in Australia.

2295_Edge routers.jpg

Figure 1: Edge routers R1 - R6 connecting different Australian States.

Tasks
The major task is to allocate the unreserved public IPv4 addresses to different states in Australia based on the number of Internet users in those states. The number of Internet users for each state is given below:

The task needs to be completed based on the following constraints and assumptions:

• Only unreserved public IPv4 addresses should be used for allocation.
• Each state should have a unique set of addresses - no address or set of addresses can be reassigned to any other state.
• You should use only the classless IPv4 addressing in the assignment.
• The number of allocated addresses for each state should not exceed by 20% of the specified Internet users for that particular state. For instance, the assigned addresses for Tasmania should not exceed 360 Thousand addresses.
• It is allowed to use one or more subnets to achieve the number of required address for a given state.

The minor task is to create a routing table for edge routers only for the state NT, WA and SA. The task needs to be completed based on the following constraints and assumptions:

• The routing table should be minimal with no redundant routes in the table.
• Any packets from the source (NT or WA or SA) should take the minimal route to reach the destination (NT or WA or SA).
• Identify the Network Interface Card address to connect NT, WA and SA.

Attachment:- Network_Planning_Template.rar

Reference no: EM133530986

Questions Cloud

Describe financial trend and comparative financial analysis : Describe the financial trend and comparative financial analysis graphically. Be creative here, a picture is worth a thousand words!
Select a country outside united states and its territories : Select a country outside the United States and its territories - Brazil. Go to the Geert Hofstede's Six Cultural Dimensions website and enter the country
How you would like to make a difference in your world : Consider how you would like to make a difference in your world and how this might align with ideas you may have at this point about your capstone project.
Why some business people might be seen as unethical : why should a profit-making organization be socially responsible to its various stakeholders? In an organization why some business people might be seen
Explain the principles of communication in networks : ITECH1102 Networking and Security, Federation University - Describe the role and functionality of hardware and software entities that contribute to the network
Research council and your manager has assigned : Research Council and your manager has assigned you on a project to research policy development by analysing the following factors as they apply to South Africa
Potential consequences for milton based on misconduct : What are potential consequences for Milton based on his misconduct? What are potential consequences for Compliant Heart based on its response to the incident?
How humans thrive and flourish : How humans thrive and flourish and how you would apply your theory of human flourishing (eudaimonia) in a social interaction.
Build capital budgeting analysis model by yourself : We assume that the company that you selected is considering a new project. The project has 8 years' life. build capital budgeting analysis model by yourself..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  Determine whether x is even or odd

It can be shown that 5 is a primitive root for the prime 1223. You want to solve the discrete logarithm problem 5^x = 3 (mod 1223). Given that 3^611 = 1 (mod 1223), determine whether x is even or odd. Follow the below step for correct answers.

  Write a description of security concerns for web application

Write a paper that includes the following: Write a description of the major security concerns for web or mobile application development,

  Social engineering attacks and counterintelligence

Social Engineering Attacks and Counterintelligence

  Analyzes the development of the system in your plan

Lists and explains the tasks associated with improving this interface. Analyzes development of the system in your plan. Analyzes the testing of the system in your plan. Analyzes the implementation of the system in your plan.

  Identify the principles of LAN design

Describe the technologies and architecture of LANs, Wireless LANs and WANs and Analyse and design LAN architecture for organisational requirements

  Overview of network security fundamentals

Overview of network security fundamentals, security threats, and issues (discuss from a company wide standpoint).

  Developing cybersecurity education

Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises - Guidelines for Journal Paper Analysis

  COMP3781 Cybersecurity Assignment

COMP3781 Cybersecurity Assignment Help and Solution, Flinders University - Assessment Writing Service - Secure Ethernet, Wireless and Mobile Networks

  Malware infection incident

A general incident response plan focusing on the Handling an Incident portion for only a malware infection incident.

  Differences between symmetric and asymmetric encryption

Describe the differences between symmetric and asymmetric encryption. Describe the common uses of the aforementioned selected cryptographic system.

  Identify the key elements in certificate

Identify the key elements in this certificate, including the owners name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd