Understand the primary underlying concepts of the internet

Assignment Help Computer Network Security
Reference no: EM133155453

ITECH1102 Networking and Security - Federation University

Learning Outcome 1: Describe and explain the role and function of network connectivity in current computing.

Learning Outcome 2: Describe and explain the principles of communication in networks.

Learning Outcome 3: Describe the role and functionality of hardware and software entities that contribute to the network communications.

Learning Outcome 4: Describe and explain the protocols and interactions that implement network communications.

Learning Outcome 5: Describe fundamental aspects of cloud computing.

Learning Outcome 6: Apply networking architecture knowledge to analyze the networking needs of the business.

Network Planning Assignment

Overview

The main objectives of this assignment are:
• To help students gain a good understanding of the IP (Internet Protocol), which is the major underlying technology of the Internet.
• To help students to understand the importance of subnet and routing of IP address.
• To encourage students to conduct an independent investigation into IP related topics from books, the Internet and through practical investigation.

Engagement with this assignment should help students to understand the primary underlying concepts of the Internet world.

Scenario
You have been appointed as a Network System Administrator by the Australian government to allocate public IP Version 4 (IPv4) addresses and build a routing table for edge routers to connect the Australian states as shown in Figure 1.

The IPv4 is an exhaustive list of IPv4 addresses for current Internet users in the world. However, in this scenario, you have the liberty to use the entire available unreserved public IPv4 addresses for the Internet users in Australia.

Tasks
The major task is to allocate the unreserved public IPv4 addresses to different states in Australia based on the number of Internet users in those states. The number of Internet users for each state is given below:

New South Wales (NSW) : 6 Million
Victoria (VIC) : 4 Million
Queensland (QLD) : 3 Million
Western Australia (WA) : 2 Million
South Australia (SA) : 1 Million
Tasmania (TAS) : 300 Thousand
Northern Territory (NT) : 150 Thousand

The task needs to be completed based on the following constraints and assumptions:

• Only unreserved public IPv4 addresses should be used for allocation.
• Each state should have a unique set of addresses - no address or set of addresses can be reassigned to any other state.
• You should use only the classless IPv4 addressing in the assignment.
• The number of allocated addresses for each state should not exceed by 20% of the specified Internet users for that particular state. For instance, the assigned addresses for Tasmania should not exceed 360 Thousand addresses.
• It is allowed to use one or more subnets to achieve the number of required address for a given state.

The minor task is to create a routing table for edge routers only for the state NT, WA and SA. The task needs to be completed based on the following constraints and assumptions:

• The routing table should be minimal with no redundant routes in the table.

• Any packets from the source (NT or WA or SA) should take the minimal route to reach the destination (NT or WA or SA).

• Identify the Network Interface Card address to connect NT, WA and SA.

Attachment:- Network Planning Assignment.rar

Attachment:- Network_Planning_Template.rar

Reference no: EM133155453

Questions Cloud

Calculate the principal payment for year : To finance the expansion, they would take out a $3.95 million loan with an interest rate of 4.15%, Calculate the principal payment for year 14
What is the cost of goods sold for the? year : Oaktree, Inc. is a merchandiser of inlaid wooden boxes. The company sold 6,500 units during the year. What is the cost of goods sold for the? year
Compute the materials activity variance : Budgeted total spending on direct materials = $110,000. Use the information presented for Great Outdoors to compute the materials activity variance
Compute the interest earned over this period : A sum of $2000 is invested from January 22, 2022 to February 28, 2022 at 11% simple interest rate. Compute the interest earned over this period
Understand the primary underlying concepts of the internet : Different states in Australia based on the number of Internet users in those states. The number of Internet users for each state
What was the total cost incurred during the period : If the October 1st Work in Process consisted of 5,000 units with a total cost of $220,000, what was the total cost incurred during the period
What is the difference between income and revenue : What are the main similarities and differences between the various types of profit margin ratios? What is the difference between income and revenue
Calculate the balances in the accounts : Based solely on the information provided, calculate the balances in the following accounts on the consolidated financial statements for 20X9 - Inventory
What is the debt yield : An investor is looking to buy a property with an NOI of $407,000 for $11,750,000. What is the Debt Yield? Does it meet the term sheet requirement

Reviews

Write a Review

Computer Network Security Questions & Answers

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

  Explain the symmetric and asymmetric encryption

If you were part of a government entity, what would you say about the potential benefits and drawbacks of encryption?

  Explain aes algorithms that implement symmetric cryptography

Decription of AES algorithms that implement symmetric cryptography and strenghts and weekness of algorithm.

  Description of the organization and the computer system

Begin with an description of the organization and the computer system you have chosen. Where necessary, you may make assumptions about any specifics

  What is the morality of posting an encryption key

What is the morality of posting an encryption key on a website publicly in order to help others play digital disks.

  Desktop publishing system

Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement

  Potential threats to a bank using mobile technology

Your goal is to identify the potential threats to a bank using mobile technology and rank them in terms of risk. To calculate risk, you will need to rank each threat in terms of severity and likelihood- ITECH3215-7215

  Determine the primary security concerns

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

  Compare and contrast public and in-house cas

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department. Compare and contrast public and in-house CAs.

  Evaluate the threat environment of the organization

Evaluate the threat environment of the organization. Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.

  Analyze three specific potential malicious attacks

Analyze three specific potential malicious attacks and / or threats that could be carried out against the network and organization.

  Write a report on web security services using xml encryption

Write a report on Web security services using XML Encryption and Signatures. The report must have a title, an abstract, an introduction and at least one section that extensively reviews the literature you have read.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd