Network design topology - implement it in packet tracer

Assignment Help Computer Networking
Reference no: EM132300619

Network Technologies Assignment - Network Comprehension

Background

Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS need to have a network. WMS consists of four close buildings, each with multiple floors. Each floor is dedicated to a business function as defined in the network design topology document. (separate document in Viso and PNG formats).

Task Details

You have been given the final design approved by the tender process and hired to implement that design. In this submission you should take the design given and implement it in Packet Tracer.

The design includes several VLANs, a Routing Layer 3 switch and a router connected to a DMZ and external networks (The Internet). There is a Wireless VLAN that all wireless access points connect to.

NOTE on using your best judgement:
There ARE ERRORS in this physical topology! Correcting these errors in some fashion demonstrates that you

• understand the concepts in enough detail to see the error and
• know what options exist in correcting these errors.

NOTE on needing to do research:

You WILL need to do some additional research to complete this assignment! Part of University assessments is about encouraging you to research topics. In other units you may be given a topic to research and then write a report or academic paper on the subject. In this unit you are still required to do some research (into Layer 3 switches) but you will instead be required to APPLY the result of that research directly.

Remember, this is an implementation. Transferring logical concepts into practical application needs to be displayed, physical implementation of logical processes such as subnetting are important.

• You have been given the Network range of 172.16.100.0/22 to work with, do not go outside this range.
• DHCP should be configured on the Layer 3 switch, not on a stand-alone server or router.
• The models of device images used in the Visio diagram may not be available in Packet Tracer. Use an appropriate device that provides the interfaces/capabilities required.
• The WiFi network should be large enough for a quantity of transient devices not pictured in the diagram.
• Be sure to organise your physical space as you add devices.
• Build progressively, saving intermediate attempts as backups (numbering each is a good idea).

Verified Expert

In this assignment, the modern wired and wireless computer network is designed for the company WAG.This assignment is done in Cisco packet tracer for simulation part and the report is prepared according to the project requirement in MS word.

Reference no: EM132300619

Questions Cloud

Describe some of the techniques that spector developed : Phil Spector was an important producer who created an original sound and recording style. Your task is to first, list and describe some of the techniques.
Why were americans of japanese ancestry incarcerated : Write a 500 - 750 word essay that addresses the following: why were Americans of Japanese ancestry incarcerated during the war?
What each of the views says about the social institution : Provide a brief description of what each of the views says about the social institution. Which view you think applies best for each of social institutions
Discuss in detail what is progressivism : What is Progressivism? (Give 2 examples of Progressive thought in the early 1900s) What is the difference between "civic reform," "political reform".
Network design topology - implement it in packet tracer : Network Technologies Assignment – Network Comprehension - business function as defined in the network design topology document
Analyze what you drew you into the piece : Analyze what you drew you into the piece and what kept you out (likes and dislikes) and explain why or why not. Identify production elements: costumes, music.
What factors led to the collapse of the roman republic : Part A: One paragraph or more, What factors led to the collapse of the Roman Republic and the emergence of the Roman Imperial government structure?
What are the characteristics that define modern europe : What are the most important characteristics that define "modern Europe", and what were some of the factors that contributed to it?
Define factors that contribute to western europe development : What were the most important factors that contributed to western Europe's development during the High Middle Ages 1000-1500?

Reviews

len2300619

5/7/2019 3:53:10 AM

Picking a random workstation: • Is DHCP enabled? o Demonstrates: ? You haven’t used statically assigned IP Addresses • Does it have an IP? o Demonstrates: ? DHCP is enabled and running (If DHCP is enabled) ? VLANS (if used) are configured and the VSI has associated the VLAN with an IP range • Pick another workstation in another department and ping the first workstation. o Demonstrates: ? Routing is enabled and default gateways (should be in DHCP) are configured correctly. • Ping the far interface (the one that has an IP NOT in the range 172.16.100.0/22) of the router that attaches to the DMZ. o Demonstrates: ? Routing tables on the DMZ router is configured properly • Ping the far interface (the one that has an IP NOT in the range 172.16.100.0/22) of the router that attaches to the Internet. o Demonstrates: ? Routing tables on the Internet router is configured properly

len2300619

5/7/2019 3:53:03 AM

Here a few things you can try (and what I WILL do when marking) and what they signify. show vtp status • Do this on your core switch and several edge switches • Demonstrates: o If VTP is configured and functioning show vlan brief • Demonstrates: o Shows that VLANs have been created, what IDs they have been assigned and what ports they are on. o Done on several edge switches, demonstrates if VTP is properly populating VLAN Databases show run show ip route • On your core switch this demonstrates: • your complete configuration • DHCP pools o your IP Subnetting, ranges and subnet masks. ? Is it done? Are all the subnets the same size? Or is there a more detailed approach? • VSI’s and their associations • If routing is enabled

len2300619

5/7/2019 3:52:51 AM

Concept Topology Excellent 5 All devices present, appropriate substitution of devices and physical layer correctly configured. VLANs / VSIs / VTP 7-8 All three services have been mostly or fully configured. Subnetting 7-8 Subnets are within range, big enough for their VLAN, of different sizes and allow for expansion. Routing / DHCP5-6 DHCP successfully configured and a Routing Protocol (such as RIP or OSPF) implemented

Write a Review

Computer Networking Questions & Answers

  Analyze at least two data transmission technologies

Analyze at least two data transmission technologies associated with the protocol. Include the bandwidth limitations of each technology and protocol.

  First prepare an abstract of your business recommendations

first create an abstract of your business recommendations for network solutions for large businesses. an abstract is a

  Draw a picture of a point-to-multipoint wireless network

What are the key issues to be obtained from conducting a site survey for each of the following?

  Relationship between business process modeling

What is the relationship between business process modeling, and software development (or systems procurement)?

  How efficient would 6 bit code in asynchronous transmission

How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?

  Describe the predominant electronic and physical threats to

write a 200- to 300-word response to the following questionsq1. what are the predominant electronic and physical

  Determine at least 5 information technology personnel

Determine at least 5 information technology personnel / roles that would be in place in order to start the business venture of gaining better traction.

  Why an organization block icmp traffic

CMP provides many useful services, yet some organizations block ICMP traffic. Why should an organization block ICMP traffic?

  An effective information technology manger must be as adept

an effective information technology manger must be as adept at the application of data storage techniques relative to

  Describe the terminal services gateway and how it

envision that you are a network administrator for a company. you are tasked with implementing a business process in

  What are the server port numbers for an ftp transfer

Your boss has read about IPv6 and wants to know if the network you oversee is ready for the transition. Prepare a response based on the networking and computer.

  Diagram of simplest connection between two computers

Using Ethernet Network Interface Cards or NICs, diagram simplest connection between two computers which will allow for communications and resource sharing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd