Network design and implementation project

Assignment Help Computer Networking
Reference no: EM133826558

Introduction to Information Networks

Learning outcome 1: Evaluate the main technologies, models and protocols used in data communications and networking.
Learning outcome 2: Explain the purpose and functionality of layered computer network models. Get Expert Writing Service Now!
Learning outcome 3: Identify problems that emerge among the networks that constitute today's internet architecture.

Assessment - Network Design and Implementation Project

Your Task

This assessment challenges you to apply theoretical concepts from your course to a practical network design and simulation project. You are expected to create a comprehensive network using Cisco Packet Tracer, a network simulation software. This project will test your ability to integrate knowledge across several networking domains, including network layer models, addressing and routing, transport layer protocols, wireless networking, network security, and Quality of Service (QoS).

Assessment Description

Part 1. Network Design Documentation
Purpose: To outline your entire network design process, from inception to implementation. This document will serve as a comprehensive blueprint of your network, detailing each decision and its justification.
Content:
Introduction: Describe the purpose and expected outcomes of the network.
Design Choices: Discuss the selection of network models (OSI or TCP/IP layers) and their suitability for your scenario.
Addressing Scheme: Provide a detailed IP addressing plan.
Routing Protocols: Detail which routing protocols (e.g., RIP, OSPF, BGP) are used and the rationale behind their selection.
Network Security Measures: Outline the security protocols (e.g., firewalls, VPNs) to protect the network.
Quality of Service (QoS): Explain your strategy for managing network traffic and ensuring quality of service.
Simulation Outline: Describe what will be demonstrated in the Cisco Packet Tracer simulation. You must use the Network Scenario Generators: Custom GPT: Network Scenario Generator to assist in generating and refining your network scenario. This tool is integral to creating realistic and challenging network environments for simulation.

Part 2. Network Simulation

Purpose: To practically implement and troubleshoot your network design in a simulated environment using Cisco Packet Tracer.
Setup Requirements:
Network Construction: Construct a network that includes:
Three Routers: Configured to manage traffic between different network segments.
Three Switches: Connecting devices within the same network segment.
Wireless Devices: Implement wireless access points as studied in Weeks 7 - 9.
Three Hosts: Devices (e.g., PCs) that generate and receive traffic.
One Rogue Device: Simulate security threats using a rogue laptop.

Modules: Include HWIC-2T (two-port serial high-speed WAN) modules in routers as part of Week 7-9's workshop.
Naming Convention: The first router should be named using your first name (e.g., Router_John) and the second router with your last name (e.g., Router_Doe).
Suggested IP Address Table:
For students new to subnetting, here is a suggested IP address table. These IP addresses are recommendations, and you can modify them based on your network scenario. Alternatively, use the Network Scenario Generators Custom GPT (link) to generate other valid IP address schemes.

Notes:
"XX" in IP addresses for Network A indicates that specific IPs will be provided to each student from the unique list of IPs during Week 12 to ensure individual configurations.
Router Naming: Replace Router_[Your_First_Name] and Router_[Your_Last_Name] with

your actual first and last names as specified in the assessment.
Network C: This network can be an additional segment if you want to simulate more advanced configurations or connect additional departments/locations.
Wireless Configuration: Access Points should have their own IP addresses within the respective network segments, and security settings (WPA2) should be configured for wireless access.

Configuration and Testing:
Router and Switch Configuration: Configure router interfaces and switch ports based on the addressing table above. Ensure all interfaces are enabled, and IP addressing is correctly set up.
Wireless Network Settings: Integrate wireless access points by configuring SSID, authentication, and performance metrics (signal strength, throughput).
Port Security: Configure port security on switches to restrict unauthorised access. Ensure port security is blocking rogue traffic while allowing legitimate devices to connect.
Testing and Verification: Use ping and diagnostic commands to test connectivity between devices and ensure smooth communication between routers, switches, and wireless devices.

In-Class Delivery
Purpose: To comprehensively articulate the process, decisions, and outcomes of your network design and simulation.
Format: Present your project to your facilitator in-class during Week 12, detailing the network design and simulation stages.
Introduction: Discuss the project scope and objectives.
Walk-through: Explain the network design in detail.
Demonstration: Highlight key functionalities within the simulation.
Challenges and Resolutions: Discuss any challenges faced and their resolutions.
Conclusion: Suggest potential improvements or future network expansions.

Reference no: EM133826558

Questions Cloud

Social media analytics in marketing strategy : Does not discuss why the role being played is relevant to the case study - Is generic in playing the role by not linking it to the specific details in the case
What do we know about the vernix on the babys body : What do we know about the vernix on the baby's body? Does the umbilical cord need to be clamped instantly or can that wait?
Describe some preventative steps one could use to delay : Describe the symptoms of the disease. Describe some preventative steps one could use to delay or avoid the disease/disorder.
What do you see as the most promising competitive advantage : What do you see as the most promising competitive advantage that this brewery has built? How does this advantage positively alter one of the Five Forces?
Network design and implementation project : Identify problems that emerge among the networks that constitute today's internet architecture - Network Design and Implementation Project
Examine the current financial position of your organization : Examine the current financial position of your organization. What are they doing exceptionally well (strengths)? What are they struggling with (weaknesses)?
Design an experiment to generate data to assist : Design an experiment to generate data to assist with prescriptive analytics for improving the well-being of nurses, particularly older nurses.
Evaluate the strengths and limitations of your study : Analyze the implications of your findings about the chosen health insurance subject. Evaluate the strengths and limitations of your study.
What is the rule on the use of a past practice : What is the rule on the use of a past practice? Has the union established a past practice? Does the contract language support the union position?

Reviews

len3826558

2/9/2025 11:01:21 PM

Cisco Packet Tracer Behavior: Standalone APs (e.g., "Access Point-PT" or "Wireless Access Point-PT" in Packet Tracer) do not support direct IP address assignment on their interfaces. In real-world scenarios, management IPs can be assigned to APs for remote administration. However, Packet Tracer simplifies this by abstracting Layer 3 configurations to connected switches or routers. Solution: Please ignore the IP address assignment for the Access Points and simply connect them to the network SSID as you did previously in Week 7. Delivery No formal presentation is required due to time constraints. The delivery will be 1-on-1, during which you will provide a 5-minute overview covering: Testing of the Simulation: Demonstrate that the Cisco Packet Tracer network setup functions as expected. Network Architecture Rationale: Explain the reasoning behind your network design choices. The lecturer may ask various questions to probe deeper into your understanding and to adequately assess each criterion.

len3826558

2/9/2025 11:01:11 PM

Part 2 – Network Simulation (Cisco Packet Tracer) No documentation or screenshots are required for this part unless you choose to include them. This part focuses on the practical implementation of your network design in Cisco Packet Tracer. Focus only on the requirements stated in the assessment – no additional tasks such as firewalls or VPNs are needed. All the requirements in Part 2 have already been implemented by you during this semester, including concepts such as wireless networking and security measures. Apply these concepts as you have done previously. Technical Explanation about Access Points (APs) Functionality Access Points (APs) are Layer 2 devices (Data Link Layer) and primarily handle wireless traffic bridging between clients and the wired network. IP addresses are Layer 3 (Network Layer) configurations, typically assigned to routers, switches (via SVIs), or end devices (e.g., PCs).

len3826558

2/9/2025 11:01:00 PM

I have received some common questions from some of you regarding Assessment 3, so I am providing further clarification here to ensure everyone is on the same page. Part 1 – Network Design Documentation No practical implementation is needed for this part. As outlined in the assessment instructions, this section requires you to document the entire network design process, from inception to implementation. This document serves as a comprehensive blueprint of your network, detailing each decision and its justification. You must cover all required aspects, including but not limited to: Routing Protocols: The selection and justification of protocols like RIP, OSPF, or BGP. Network Security Measures: Security protocols such as firewalls or VPNs to protect the network. Quality of Service (QoS): Your strategy for managing network traffic and ensuring service quality. Please review the detailed requirements in Part 1 of the assessment instructions. These topics have been thoroughly explained by your lecturer during the course, and you are expected to apply them accordingly.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd