Network implementation assignment

Assignment Help Computer Networking
Reference no: EM131990755

Background

Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actually need to have a network. WMS consists of four close buildings, each with multiple floors. Each floor is dedicated to a business function as defined in the following network design topology.

446_figure.jpg

Figure

Task Details

You have been given the final design approved by the tender process and hired to implement that design. In this submission you should take the design given and implement it in Packet Tracer. → Where there is ambiguity, you are encouraged to use your best judgement. ← The design includes several VLANs, a Routing Layer 3 switch and 2 routers to external networks. There is a Wireless VLAN that all wireless access points and the VPN server connect to.

NOTE on using your best judgement:

There ARE ERRORS in this physical topology! Correcting these errors in some fashion demonstrates that you
- understand the concepts in enough detail to see the error and
- know what options exist in correcting these errors.

NOTE on needing to do research:

You WILL need to do some additional research to complete this assignment! Part of University assessments is about encouraging you to research topics. In other units you may be given a topic to research and then write a report or academic paper on the subject. In this unit you are still required to do some research (into Layer 3 switches) but you will instead be required to APPLY the result of that research directly.

Remember, this is an implementation. Transferring logical concepts into practical application needs to be displayed, physical implementation of logical processes such as subnetting are important. You have been given the Network range of 10.0.0.0/21 to work with.

Reference no: EM131990755

Questions Cloud

Complete a trend analysis of each ratio for a three-year : Complete a trend analysis of each ratio for a three-year period. Describe what the trends you see for your company based on your ratio analysis.
How does huntingtons thesis support the fears of jihad : How does McWorld provoke and support Jihad? What does Barber find most threatening about globalization? How does Huntington's thesis support the fears of Jihad?
What is bright percentage return on her cash investment : How much of the purchase price of $1,010 did Ms. Bright pay in cash? What is Ms. Bright’s percentage return on her cash investment?
Research the impact of culture and politics on business : Why is understanding culture critical for successful international business? Research the impact of culture and politics on business using your textbook.
Network implementation assignment : Tender process and hired to implement that design. In this submission you should take the design given and implement it in Packet Tracer
Compute the net proceeds to the presley corporation : Compute the net proceeds to the Presley Corporation. Compute the earnings per share immediately after the stock issue.
What is bad boys cost of capital : The common stock of Bad Boys, Inc. is currently selling for $20.00 a share. Bad Boys, Inc. expects to pay a dividend of $1.50 per share next year.
What happens when the incumbent cost structure changes : What happens when the incumbent's cost structure changes? What is driving this outcome? How do you think economies of scale change with market size
Explain how the federal reserves monetary policy affects : Explain how the Federal Reserve's monetary policy affects your institution/intermediary in the financial market. Discuss in detail.

Reviews

len1990755

5/21/2018 5:37:23 AM

Subnetting 0 Subnetting has not been done or is incorrect. 1-3 Subnets are correct but are simplistic. Eg: all subnets are of the same size. Routing / DHCP 0 1-2 Neither of these components has been successfully configured Either routes or DHCP successfully configured or both are partially configured. 4-6 7-8 Subnets are correct and of different sizes but there is room for improvement or some error. Subnets are within range, big enough for their VLAN, of different sizes and allow for expansion. 3-4 Routes and DHCP successfully configured. 5 DHCP successfully configured and a Routing Protocol (such as RIP or OSPF) implemented

len1990755

5/21/2018 5:37:02 AM

Concept Absent Basic Proficient Excellent Topology 0 1-2 3 4 Absent or a significant number of oversights such as a good portion of the topology missing. Devices generally present but: • Some devices are absent • Some devices are added or incorrect • Physical layer is not configured Mostly correct but there is a minor mistake such as the physical layer configured incorrectly All devices present, appropriate substitution of devices and physical layer correctly configured. VLANs / VSIs / VTP 0 1-2 3-4 5-6 None of these components have been successfully configured One of these has been fully configured or two of these have been partially configured. Two of these has been fully configured or three of these have been partially configured. All three services have been mostly or fully configured.

len1990755

5/21/2018 5:36:55 AM

CSG5130 Assignment 2 Marks Allocation Topology Implemented Correctly 4 VLANs / VSIs / VTP correctly implemented 6 Subnetting done appropriately 8 Routing works correctly / DHCP Configured 5 Secret Department handled appropriately 2

len1990755

5/21/2018 5:36:40 AM

Submit the Packet Tracer file only through Blackboard. Include an MD5 hash in the comments section; this is for your benefit if there are problems with Blackboard. All submissions must be viewable in the latest version of Packet Tracer. If you need to test this, you can get a copy of Packet Tracer 7 from Cisco Networking Academy. If I cannot open your assignment in the latest version of Packet Tracer then you shall receive 0! The marking allocation for this assignment is at the end of this document. If any point is unclear send an e-mail, ask your lecturer on discord, phone or make an appointment well before the assignment is due with your lecturer.

Write a Review

Computer Networking Questions & Answers

  Sources must be cited in apa format nbspyour response

sources must be cited in apa format. nbspyour response should be a minimum of one 1 single-spaced page to a maximum of

  1 examine the steps an organisation would take to establish

1. examine the steps an organisation would take to establish a pmo or po if it did not previously have one. explain

  Phising email it is multipart what are the two parts the

phising email it is multipart what are the two parts? the html part is it inviting the recepient to click somewhere?

  Discuss the term scalability

Discuss the term "scalability." What does it mean? Why is it an important network design goal? What are some challenges designers face when designing.

  Simulate the network using netml

A satisfactory assignment document has been prepared; a network has been created and is depicted in a diagram in the assignment document and graphs which explain the behavior of the network in its original setup are presented including the throughp..

  What is the protocols

Upgrading a Stand-alone Computer to a Networked Computer Time Required: 30 minutes Objective: Upgrade a stand-alone computer to a networked computer.

  Developmental or iterative steps of creating an erm diagram

Analyze the risks that can occur if any of the developmental or iterative steps of creating an ERM Diagram are not performed. Select and rank at least five (5) entities that would be required for the development of the data repositories

  Analyse a case study related to programming

MN404 - Fundamentals of Operating Systems and Java Programming - Determine the classes that are required for the design minimum of four classes

  Describe what a pre-processor does in network-based ids tool

INFA 630- Compare and contrast signature-based and anomaly-based intrusion detection systems. Describe what a pre-processor does in a network-based IDS tool such as Snort.

  Describe the major network security organizations

As a member of the Network Security group, you have been asked to serve on the committee and to take the initiative in the following: 1. Describe the major network security organizations. 2. Identify risks, threats, vulnerabilities and countermeasu..

  Benefits-drawbacks of entering into a mentoring relationship

Using the Internet, research and read about mentoring. Based on your reading, post your responses to the following topics of discussion:

  Ways to stop interference from arc welders

Provided that both the design shop and front office utilizes areas? What medium guarantees immunity from the interference?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd