Explain the term Spanning Tree Protocol

Assignment Help Computer Network Security
Reference no: EM133105346

ICTNWK543 Install, operate and troubleshoot medium enterprise switches

Assessment 1:

Question 1: Identify each of the network switches in the attached table and explain the operations of each in 70-120 words.

Question 2: What is a debug command, and how are they used? Write your answer in 30-50 words. Provide three (3) examples of debug commands?

Question 3:
A) What are Virtual Local Area Networks (VLANs) and why are they needed? Write your answer in 50-100 words.
B) What basic commands are used to create a VLAN connection?

Question 4: Explain the term Spanning Tree Protocol (STP) and its operation? Write your answer in 250-300 words

Question 5: A) What is switch calling line identification (CLI)? Write your answer in 25-50 words.
B) Write six (6) basic commands used for CLI.

Question 6: What command is used to secure a network port by deactivating the port?

Question 7: Explain the term port security in cisco switches? Write your answer in 40-70 words.

Question 8: Explain the difference between dynamic locking and static locking of a managed cisco switch. Write your answer in 20-60 words for each.

Question 9: Writethe commands required to configure port security in cisco switches.

Question 10: Explain the term secure shell (SSH). Write your answer in 50-100 words

Question 11: List seven (7) advanced switching technologies used in today's environment

Question 12: List seven (7) of the most common issues associated with network switches?

Question 13: List ten (10) types of networks that are commonly used. Explain each network in 40-90 wordsDefine Virtual Local area network (VLANs)?

Question 14: List eight (8) devices used to create different types of networks.

Question 15: Complete the following table of network documentation? The first one has been completed as an example.

Question 16: What methods can you use to review an existing network design? Write your answer in 100-150 words.

Question 17: List five (5) elements needed to meet the technical requirements of a network.

Question 18: Explain each of the following terms in 40-90 words for each.

1. Network segmentation
2. Network Traffic management What basics utilities are used to confirm network operations?

Question 19:
A) List the four (4) tasks included in initial switch configurations.
B) Write the basic steps to perform the initial configurations.

Question 20: List five (5) different types of each network component.

a) Physical Media used for transmission
b) Network connectors

Question 21: Explain the procedure of upgrading switch firmware through CLI

Question 22: List five (5) various methods used to back up configuration files of network switch? Write your answer in 25-50 words.

Question 23: How can you configure trunk between two (2) switches? Write your answer in 100-150 words. Provide an example to support your answer.

Question 24: How can you create and verify the inter-Vlan route? Write the steps and commands required to complete this.

Question 25: What steps do you need to follow to configure Rapid Spanning Tree Protocol on a network switch?

Question 26: List the WHS/OHS Act, Regulation, Code and Regulator enforced in each state and territory of Australia.

Question 27: List eight (8) basic utilities used to check network connectivity.

Assessment 2: Project

Project 1

Scenario

Eastwood Secondary School is committed to providing its students with the education they will need to succeed in today's digitally connected world. Currently, they are learning about website development, sound editing, and creating complex videos.

A huge volume of information needs to pass through the network, and the school's existing10/100 megabit switches cannot handle all of this traffic. They need updated switches able to push a huge amount of data (Gb) out and have enough speed to image all the computers within the school and its geographically dispersed district. The switches must have modularity to accommodate connectivity for a 10 Gigabit fibre backbone between cable closets across the school, and to the network access storage cluster in the data cabinet. Every computer in the schools required a 1 Gigabit port to accommodate the variety of applications used by students.

Eastwood secondary contact Fibex for the project.Fibex, an authorised dealer for leading network switch manufacturers, also provides network solutions to many institutions. Fibex has given Kelly a chance to show his skills by leading this project. As per company policies, Kelly must create project documentation. Kelly also needs to collect & document the legislation & WHS/OHS codes related to the project.

Task 1:

In this task:
o The student will act as Kelly
o The student must research to check the latest codes of practices and legislation that apply to the project
o RTO /trainer will arrange the copy of the latest legislation.
o RTO must provide student access to a computer with an internet connection.

You are required to complete the following table to gather the information on legislation regarding your project plan

Task 2:
This task is in continuation of Task1
Instructions:

In this task:
• The student will act as Kelly
• The student must complete the access request form.
• The student must submit the completed access request to the trainer/assessor.
After reviewing the legislation, Kelly needs to visit the school campus to review the existing network inventory and to prepare a list of elements required for upgrading the existing network. As per Eastwood secondary procedures, every visitor needs permission to access the switch room.

Task 3:
This task is in continuation of Task 2
Instructions:
In this task
• The student will act as Kelly
• The assessor will act as the IT administrator from Eastwood Secondary
• The student will review the existing network design and asset Inventory
• The student must document the findings after reviewing the existing design and inventory
Kelly's request gained approval after two days by the IT administrator. Kelly visited the site and reviewed the existing inventory (mentioned below ) provided to him by the IT department. After conducting the review, Kelly discussed the issues they are facing at the moment. Kelly needs to document the meeting results and network elements required in a template for meeting minutes

Task 4:
This task is in continuation of Task 3
In this task
• The Student will act as Kelly
• An assessor will act as a store person of Fibex
• The student will interact with an assessor to confirm the availability and specification of the network equipment identified in task 2
• A student must complete the template to document the information
Eastwood Secondary school management is happy with the solution proposed by Kelly, and they are happy to go ahead. Management asked Kelly to create a detailed project plan for this project.
As Kelly started to prepare the project plan, the first step is to check the availability of the proposed network elements. His company Fibex is an authorised supplier of leading network switch manufacturers. He needs to make a call and document the specification & availability of network elements from stores in the template provided below.

Task 5:
This task is in continuation of Task 4
In this task
• The student must prepare a project plan
• The Assessor will provide the necessary information to a student
After documenting the confirmation from the store, you need to document a detailed project plan, including the following information and share it with your assessor. Your project plan needs to be 500-1000 words.
1. Scope of Project
2. Different phases of a project
3. Selecting internetworking devices
4. IP address Plan
5. Downtime costing
6. Budget of project

Task 6:
This task is in continuation of task 5
Part A
In this task:
• The student will act as Kelly
• The assessor will act as IT administrator
• The student must explain the Project Plan and technical terminology to IT administrator
• The student must answer the relevant questions
• The student must liaise with IT administrator for the approval of the project and request the security clearance
• The student must draft a mail for security clearance
After preparing the project plan, Kelly held a meeting with the IT administrator to explain the project plan to gain security clearance to access the server room of Eastwood.

Part B
As Kelly gained approval for the project plan now, he has to get the security clearance from the IT administrator to access the site. To gain security clearance, you are required to write an email to the IT administrator. Your email should include the following:
The answer may vary. A student must write an email to the IT administrator by including the following information
• Date
• Address
• Subject
• Greetings
• Main Body - Stating the reason
o Permission to access the server room
o Date and time of access
Closing

Project 2
This project is in continuation from project 1.

Task 1.1
In this task:
• The student will act as Kelly
• The assessor and other students act at team members
• The student must prepare the designs and explain the technical terminology used
In preparation for the commencement of the project, the student will need to prepare and document the following for the team:
1. Design of network segmentation based on the network available
2. A diagram for network traffic management based on the available network
3. A list of basic switching requirements based on the network they are working with.

Once this has been completed, Kelly will need to hold a team meeting on the proposed commencement date of the project to explain the following as the part project design.
1. How network can be segmented
2. How the network traffic can be managed
3. What the basic requirements are to install the switches
As you are acting as Kelly, you must complete the minutes of meeting template given below

Task 1.2
This task is in continuation of task 1.1
In this task:
• The student will act as Kelly
• The student must perform the initial configurations on the switch
• Student must identify and document the basic requirements to install the network switch

Part A
After the meeting, it is time for Kelly and the team to jump into action. As a first step, Kelly needs to perform the initial configurations of the switch according to organisational requirements. Eastwood Secondary also wants Kelly to document the configurations for their reference.
You are acting as Kelly and need to document the steps you will use to carry out the following activities for the initial switch configuration:
• Reset the switch to factory defaults
• Set IP address
• Set interface description
• Clear MAC address table
• Add static MAC address in CAM table
• Save the running configurations
• Backup configuration settings to the server
• Upgrade the firmware
Once you have completed the documentation, you need to organise a time with your trainer/assessor and show them how you can execute the initial configuration of a switch. Your assessor will provide a network switch with a speed of 10/100gbps to check your skills.

Part B
After performing the initial configurations on the network switch, Kelly needs to prepare a list of appropriate media, cables and ports required to connect the switch to other network devices. Using the template below, write down the requirements you will need.

Assessment Task 3: Project and Presentation

Project 3
This task is in continuation with project 1 & 2.
In this task
• The student will act as Kelly
• The assessor will act as a technical support person of a switch manufacturing company
• The student must discuss the enhanced switching functions with assessor
• The student must determine the enhanced switching functions supported by a switch
• In this task, the student must answer the relevant questions asked

Task 1.1
In the previous activities, you have performed the initial configurations on the switch and identified the cables and ports required to connect the switch in the network. The next challenge for Kelly is to determine the enhanced switching technology supported by the switch. Kelly held a meeting with the technical support team of switch manufacturer to ensure the enhanced technologies supported by a switch
As you are acting as Kelly. You are supposed to complete the meeting minutes template.

Task 1.2
This task is in continuation of task 1.1
In this task:
• The student will act as Kelly
• The student must configure the switch using advanced switching functions
After determining the enhanced technologies supported by switch now, Kelly has to connect the switch to the other devices by using the advanced switching functions mentioned below;
1. Vlan
2. Trunk
3. Inter-Vlan Route
4. STP and RSTP
You will need to show your trainer/assessor how you complete these functions above according to the switch and the network available. Your trainer/assessor will provide you access to these.
As part of your assessment, you are required to provide to your trainer/assessor a document which provides the information regarding the steps you have used to execute the above functions.

Task 1.3

This task is in continuation of task 1.2
In this task:
• The student will act as Kelly
• The student must find the root cause of the problem
• The student must resolve the problem using basic utilities
• The assessor must create the problem in network connectivity to assess students' skills

Part A

After finalising the installation, Kelly needs to run some tests to confirm the working of the network. While checking the connectivity between the network switches, Kelly found that a newly installed switch and server were not communicating with each other.
Kelly now needs to identify and resolve the network issue by using any one of the following basic utilities suggested by your assessor

• Ping
• Secure shell (SSH)
• Telnet
• Traceroute
• ipconfig

Attachment:- Operate and troubleshoot medium enterprise switches.rar

Reference no: EM133105346

Questions Cloud

Interpret the effect of the payer mix on revenue : Interpret the effect of the payer mix on revenue.
Affect the success of acquisition : Of the problems that affect the success of an acquisition, which one do you believe is the most critical in the global economy? Why?
Explain the four pillars of an ideal organization : Briefly explain the four pillars of an "ideal" organization. (Core Behaviours, Behaviours, Vision, Core Values, and Purpose). Place them in order of priority an
Several financial analysis techniques : As part of the bank's evaluation process, you have been asked to take an examination that covers several financial analysis techniques
Explain the term Spanning Tree Protocol : What are Virtual Local Area Networks (VLANs) and why are they needed and Explain the term Spanning Tree Protocol (STP) and its operation
Trade-off between debt financing and equity financing : Why does the Quick Ratio subtract "Inventory" from the Current Ratio?
Process of developing business strategy : Assume that you will be starting your own business and you are in the process of developing your business strategy.
Rafi strategy : Would you endorse the RAFI strategy to any of your institutional clients? Even if Research Affiliates views about fundamental weights being better
Process of developing business strategy : Assume that you will be starting your own business and you are in the process of developing your business strategy.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd