Systematic understanding of system

Assignment Help Computer Networking
Reference no: EM132515972

CIS114-6 Network Systems and Administration - Majan University College - University of Bedfordshire

Learning Outcome 1: Demonstrate deep and systematic understanding of system and networking concepts, including principles, technologies, and emerging trends.

Learning Outcome 2. Scientifically and critically analyse, implement and evaluate networking techniques, technologies, strategies and methodologies used in industry. Apply analytical and problem-solving skills in order to select and implement networking solutions appropriate to multiple organisational and environmental contexts.

Your Problem is to implement a virtualised environment-based solution demonstrating the operation of a VPN operating in site-to-site (Tunnel mode). Your virtual machines (VMs) requirements must include 2 VyOS routers (fully configured using the VyOS router own commands - similar to Juniper and Cisco routers commands

1314_figure.jpg

Figure 2 shows an optional configuration where additional XP VMs are to be used to demonstrate the VPN operations in both site-to-site and remote VPN (Tunnel and Transport modes) with additional Wireshark captures to be performed from one of the XP VMs.

Use of a command line sniffer such as tcpdump should is required on the networks to demonstrate the mode of operation.
You are required to either build the VMs from scratch or use the official VyOS VM available from our FTP server (see document on BREO), Dr Ali Mansour's shared Google drive (see link on BREO).

Problem 1 Implement the topology shown in Figure 1 with fully functional routers (i.e. a network connecting the two VyOS routers).
The network should be configured, tested, demonstrated, and clearly documented (part of Problem 3) showing its full operation. Routing between the two routers must be configured using any form of routing. Details of your routing implementation must be clearly stated/shown.

Problem 2 Configure, test, and demonstrate the VPN operation.
Captured traffic must be shown to demonstrate the operation of the VPN and when the VPN is not active.

Problem 3 Technical report documenting all the work done in the previous tasks. See the points below under Documentation Requirements.

Attachment:- Network Systems and Administration.rar

Reference no: EM132515972

Questions Cloud

What is the most profitable production schedule : Determine whether the Printing division can meet the sale demand next month.What department is a constraint, if any? What most profitable production schedule
Describe the competitive model of a firm : Consider the competitive model of a firm where each firm has an identical linear supply curve (optimal supply rule). As the number of firms in the industry.
Mortgage with interest rate : You bought a house with price of $250,000. Your LTV (loan-to-value ratio) is 80%. You choose the 30-year mortgage with interest rate 6%.
What is the internal rate of return : What is the internal rate of return (IRR) of a project costing $3,000 (at year 0); having after-tax cash flows of $1,500
Systematic understanding of system : Demonstrate deep and systematic understanding of system and networking concepts, including principles, technologies, and emerging trends
What is the reason the inmates are being given the drugs : Why are diagnosed mental health problem inmates being held in a jail-type facility? What is the reason the inmates are being given the drugs?
What is standard deviation of the portfolio return : The volatility of IBM and MSFT are 35% and 30%, respectively, and the correlation between IBM and MSFT is 0.6. What is standard deviation of the portfolio retur
Simulation experience scenario : What are some ways that you see the principles of Incident Command demonstrated in this simulation, and some ways they could have been implemented better?
What is the effective borrowing cost : What is the effective borrowing cost if the loan will be prepaid at the end of nine years? Show the calculations in Excel.

Reviews

Write a Review

Computer Networking Questions & Answers

  Maximum size of file-tcp sequence numbers are not exhausted

Consider transferring a large file of L bytes from Host A to Host B. Assume a MSS of 1460 bytes. What is the maximum value of L such that the TCP sequence numbers are not exhausted?

  Find the mean of the numbers in the array

Input a list of positive numbers (terminated by 0) into an array, find the mean (average) of the numbers in the array, and output the result. Use a subprogram to input the numbers, a function to find the mean, and a subprogram to output the resul..

  Describe real-world examples of attenuation and white noise

Describe real-world examples of attenuation and white noise. Determine the most important and justify its significance over the remaining items.

  Which icmp messages contain part of the ip datagram

Which ICMP messages contain part of the IP datagram? Compare and contrast informational messages in ICMPv6 with informational messages in ICMPv4.

  What would have been the state of enterprise-wide networks

Describe the process of how one would distribute network protocols on the network. In the absence of SNMP and Remote Monitoring (RMON) protocols, what would have been the state of enterprise-wide networks

  Complete ipv4 overview sections of routing and switching pro

Complete the following sections of "Routing and Switching Pro" in. TestOut LabSim: Section 5.1: IPv4 Overview. Section 5.2: IPv4 Address Classes. Section 8.1: IPv6 Addressing Overviewections of "Routing and Switching Pro" in.

  Unique network address and number of subnet

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Please reply to the Subnetting Discussion Topic under Week 3 Discussions with your selection. Don't select a network address that som..

  Which of the given is a critical component of the

which of the following is a critical component of the self-defending network framework that relies on 802.1x and

  Explain main components of good security policy

Write down the main components of good security policy? Write down some of the most common attacks, and how can the network be protected against these attacks?

  Describe hacking tool that is used to gain access to network

In no less than 250 words, describe a hacking tool that is used to gain access to a network. Explain how the tool is used, how it works and how a netwoprk.

  Design an ethernet network to connect a single client pc

Design an Ethernet network to connect a single client PC to a single server.  The two devices are 410 feet apart.  They need to communicate at 800 Mbps.

  Name two type of errors networks suffer from

With the link state routing protocol what is the technique called for reluably pass link state on to the rest of the network?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd