ITEC101 Computer Networks Assignment

Assignment Help Computer Networking
Reference no: EM132905107

ITEC101 Computer Networks - Australian Catholic University

Task - Build a network

Instructions

This is an individual assignment. You need to troubleshoot, plan, design, configure and build an effective and optimal network for a small organisation.

Network Scenario:

You will be provided two network scenarios as follows.

Scenario 1 (Network troubleshooting)- You will be given a packet tracer file that includes a number of misconfigured devices, interfaces and protocols. You need to identify the errors, re-configure the devices/interfaces/protocols to make the network functional. You also need to answer a number of questions related to the network scenario. You need to submit your updated packet tracer file and answers to the questions for this part of the assignment.

Scenario 2 (Building a network)- You will be given a set of network design requirements for a small organisation. Based on the requirements, you need to plan, design, configure and build an effective, optimal and sustainable network. You also need to answer a number of questions related to your network design. For this part of the assignment, you need to submit a packet tracer file of the designed and configured network. You also need to submit answers to the questions related to the designed network including physical topology, logical topology, IP addressing, security and sustainability issues of the network.

Attachment:- network scenario.rar

Reference no: EM132905107

Questions Cloud

Information governance and records : Identify and complete the missing phrase to directly complete the granular definition?
Global environment : A written security policy is the foundation of a successful security endeavor. Without a written policy, security will be chaotic and uncontrolled.
Explain the term credit conditions : Explain the types of mergers and acquisitions and Discuss the key arguments for the motivations of mergers and acquisitions
Calculate the total drilling per month : Calculate the total drilling per month and drilling rate per minute - How many drilling units are required to meet the overburden-preparation requirements
ITEC101 Computer Networks Assignment : ITEC101 Computer Networks Assignment Help and Solution, Australian Catholic University - Assessment Writing Service
What is the cost comparison for replacing the old equipment : What is the cost comparison for replacing the old equipment. Use only relevant items and add the items together for the next 7 years
What is the use of lcnrv calculations in companies : Explain whether every trading and manufacturing company must perform LCNRV calculations and what is the use of LCNRV calculations in companies?
What is the carrying value of the investment : On March 31, 2020, RAIN Company acquired 20,000 shares of Droplets Company at #120 per share. What is the carrying value of the investment
Explain two methods you use to build good coding habits : You spent some time last week learning about the format of the ICD-10-CM code book. Explain two methods you use to build good coding habits

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe the different types of wireless signals

Describe the different types of wireless signals and how they are used in applications that support business objectives.

  What range of frame sizes does stop-and-wait give efficiency

A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent?

  Find round-trip delay due-speed of light equal transmission

At what data rate does round-trip delay due to speed of light equal transmission delay for 1-KB packet? Suppose speed of light in fibre to be 2/3 speed of light in vacuum.

  What current assets are included on the balance sheet

Internet Problem Choose a publicly held corporation (unless your teacher assigns a particular corporation for this assignment) and find the balance sheet.

  Decribe the application of dol system

One of the first applications of a DOL-system was to simulate the development of a fragment of a multicellular filament such as that found in the blue-green.

  How cryptography can be used to secure data transmission

In this essay, you will provide a real-world example of how cryptography/hashing can be used in order to secure data transmission across a network.

  Identify and briefly explain any four key requirements

An organization called Ranbaxy Inc. has currently 3 divisions in 3 different locations within Sydney city. One of the divisions serves as the company headquarters.

  Vpn replacement technologies

MN610 - Virtual Private Networks - VPN Technologies and Security issues - Analyse and discuss the significance of VPN for contemporary organisations

  Estimate the size of the multicast forwarding table

Estimate the size of the multicast forwarding table needed to handle multicast of audio from 100 radio stations, if each station has a total of ten million.

  What is theoretical maximum channel capacity

What is the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Constructing an outline for the research paper

In preparation for constructing an outline for the research paper, discuss the topic that you may have selected for the paper, and attempt to layout your approach to the research, and the sub-topics

  What is connection-oriented networking?

Networking modes: What is connection-oriented networking? How many modes can it be operated and what are they?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd