Internetworking, Basic Computer Science

Assignment Help:
You have been approached by Company XYZ to design and deploy a new network that will span three cities in Queensland: Brisbane (12 users), Gold Coast (8 users), and Cairns (6 users).
The company already uses 192.168.3.0/27 and would like to maintain the same subnetting structure across these new cities. Note that the zero subnet is used. Adhering to their subnetting scheme, the three cities have been assigned their subnet numbers: Brisbane (4th), Gold Coast (6th), and Cairns (7th).
Access to the Internet is crucial for each office, as well as, inter-branch-office networking. Due to their larger business operations in NSW, routing protocols such as, EIGRP, OSPF, and RIP are used. For their QLD operation, you can choose any routing protocol, but you need explain the reason of your choice.
Your goal is to design, deploy and successfully implement their business requirements using all or any of the following:
• Switches
• Routers
• Workstations
• Operating systems
• Routing protocols
• IP addressing: hosts, subnet addresses, broadcast addresses
• Router-based DHCP server
• NAT/PAT

Solution
You are required to design topologies for the three sub-networks for approval. You can use Cisco Packet Tracer or any other program to develop your topology diagrams. You must document each step you have taken, including your research sources. Any information that you recommend must be supported by references, such as Internet links, printed documents, etc.
You can earn extra credit for this assessment by providing more than the minimum requirements (inform your lecturer if you wish to earn extra credits):
• Wireless networks
• VLSM
• Data traffic filtering (firewall)
• ACLs & wildcard masks
• Static routes
• Default routes
• Alternate path determination



Related Discussions:- Internetworking

Explanation pre increment with example, Problem 1 What is precedence of...

Problem 1 What is precedence of operators? How are expressions evaluated using precedences? Defining precedence of operators Explanation of how expressions are evaluat

Classification of database management systems, Question 1: (a) Describ...

Question 1: (a) Describe the three ways of classification of Database management systems (DBMS). (b) Why are System Analysts and Database Administrators needed in compa

HACKER, Briefly explain who a hacker is and what the activities of a hacker...

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

Application packages, APPLICATION PACKAGES : There are two options. You ca...

APPLICATION PACKAGES : There are two options. You can either write your own program or buy an applications package, i.e. a proprietary program, 'off-the-shelf. The former option i

Variable - concept of programming language, Variable - Concept of programmi...

Variable - Concept of programming language: Variable: As referencing memory by its physical address is very tedious, variable names are used. A variable is a symbolic name giv

Mainframe architecture, Mainframe Architecture: Till a few decades bac...

Mainframe Architecture: Till a few decades back, all computing was controlled through the central mainframes server. Multiple users could connect to the central host through u

Definition of resource sharing , Resource sharing is a concept which has de...

Resource sharing is a concept which has developed to contain many cooperative activities among libraries and other stakeholders. Interlibrary loan continues to be the basis of reso

Algorithms and pseudocodes.., how do you write the algorithm and the pseudo...

how do you write the algorithm and the pseudo code for cramer''s rule in visual basic.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd