Task - Configuring Network Services

Assignment Help Computer Networking
Reference no: EM132490054 , Length: word count:700

Assignment Task -

This is a practical assessment and will enhance and test your practical skills related to the subject topic.

Students are required to set up a network consisting of PCs, routers, switches and servers. You will need to configure routing between routers, use any dynamic routing protocol. The PCs (clients) will be connected to switches and switches to the router's interfaces. Clients and Servers are connected on different networks (don't attach clients and servers on same network).

Client(s) <--> Switch <--> Router <--> Router <--> Switch <--> Server(s)

To complete this assessment you are expected to refer to information beyond the text book. This assignment is open; in that you are free to choose the devices or software you use to complete the specified tasks. Students are expected to accomplish this task by utilising the necessary commands discussed in lectures and also described in the prescribed text book.

There are numerous web sites available that discuss networking , however you MUST list your sources of information for the different tasks. When completing this project, you may encounter errors or experience difficulties getting your setup to work. If this occurs, your challenge is to analyse why they happen and report on how you solved the problems you encountered.

Task 1 - Setting up a Network

Perform the following activities and support your workings with screenshots:

1. Configure the PCs, Server and Router interfaces with appropriate network addressing;

2. Configure any classless dynamic routing protocol on the routers;

3. On any client, ping the client's own network interfaces, then the local router gateway interface, then the remote router interface, then the servers. Check full network conductivity;

4. Use the traceroute command from the client to the server. Include results of the traceroute in your submission, explaining meaning of traceroute output.

Task 2 - Configuring Network Services

Using the same network topology that you have setup in Task 1, perform the following additional activities

1. DHCP: Configure DHCP servers and show that the client PC has successfully received IP Addresses and other network parameters (default gateway, subnet mask and DNS IP address) using DHCP

2. WEB Server: Configure WEBs server on the dedicated machines in their specified networks, with URL as yourname.csu.org

3. DNS: Configure DNS Servers on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing yourname.csu.org from client PC, DNS must resolve this URL to IP address of WEB Server

4. Firewall: Configure traffic filtering on the web servers to block ONLY HTTP TCP traffic between one of the client PCs and WEB Servers and allowing all other IP traffic, provide evidence of such traffic filtering. You should verify firewall by using PING and HTTPS TCP traffic which should not be blocked.

SUBJECT LEARNING OUTCOMES - This assessment task will assess the following learning outcome/s:

- be able to analyse IP addressing requirements and design an addressing scheme.

- be able to analyse the requirements of IP routing and choose appropriate routing methods.

- be able to demonstrate how internetworking devices obtain their network configuration.

- be able to explain how data flows through the internet.

- be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet.

Attachment:- TASK - Configuring Network Services.rar

Reference no: EM132490054

Questions Cloud

What is the etiologic agent : 1. Name a disease. 2. What is the etiologic agent? List 4 clinical signs and symptoms associated with this disease.
Describe the five basic mechanisms of antibiotic action : Describe the five basic mechanisms of antibiotic action against bacterial cells. What examples of drugs are used in each category.
Discuss the biological foundation behind : In the experiment above they perform a heat shock method and then plate the bacteria directly onto ampicillin containing plates.
Discuss characteristics that all respiratory system pathogen : Discuss characteristics that all respiratory system pathogens have in common. How do these characteristics enable them to cause respiratory infections?
Task - Configuring Network Services : Task - Configuring Network Services. Configure DHCP servers and show that the client PC has successfully received IP Addresses and other network parameters
List two to three qualities of the norovirus : 1. List two to three qualities of the norovirus that make it so infectious.
What is the role of the trial balance : What is the role of the trial balance and give the example for this ? What information does it show? and what informations does it not show?
Distinguish the kidney cortex from the medulla : What is the easiest way to distinguish the kidney cortex from the medulla? Describe the appearance of both the cortex and medulla.
Describe the appearance of the kidney tissue : Describe the appearance of the kidney tissue when seen under the microscope. What do you see when observing the nephrons in the cross-section wet mount?

Reviews

Write a Review

Computer Networking Questions & Answers

  What is done on a write during recovery

Many RAID implementations allow on-line repair in which the system continues to operate after a disk failure, while a new empty disk is inserted to replaced.

  Organization security plan

Identify threats and vulnerabilities.

  Data validation refers to checking the content

Data validation refers to checking the content of data to ensure that it satisfies certain rules, known as constraints. For example, the employee name should never be omitted in the employee table, and the delivery date should be after (greater th..

  Simulate the scenario in etherpeek

Simulate the scenario in Etherpeek and generate the required report. As part of the technical proposal, document the troubleshooting tools to be used and list the steps to be taken in case of a problem

  What is scope planning and scope creeping

Based on your understanding of project planning and budgeting, express your views on the following: What is scope planning and scope creeping? What are some of the ways to avoid problems and manage scope correctly

  Question 1a is an intrusion avoidance system more like a

question 1a is an intrusion avoidance system more like a honeypot or a firewall? describe why?b what does the quality

  The year of encryption

Formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantages and disadvantages of the selected solution.

  Determine performance of upgraded processor

If 30% of instructions need one memory access and another 5% need two memory accesses per instruction, determine the performance of upgraded processor with compatible instruction set.

  Social media networking power point

Social Media Networking Power point

  Performance of different network-layer routing algorithms

Performance of different network-layer routing algorithms - develop a program that will evaluate the performance of three different routing protocols

  What is contained in the payload of the packet

After the VPN server receives a positive reply from server T, the VPN server will tell program Z that Alice is a legitimate employee. Then program Z will send out the message to the VPN server. When the message leaves program Z, what is contained ..

  Identify the information that is carried in the header

Identify the information that is carried in the header, and state their values. What type of ICMPv6 message is this? What is the message?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd