Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

1. Introduction

This document describes the research-based assignment for this module. This assignment consists of two parts:

  1. A formal report
  2. And a presentation

2. Purpose of the assessment

  1. To enable students to design a network by applying the theory and practice of networks, network operating systems, and network technologies they have learnt.
  2. To enable students to select appropriate networking technologies for particular environment.
  3. To enable students to design a simulated network with LAN, WAN and Internet functionalities.

3.Organisation

This coursework should be undertaken individually. Students should apply the theory and concepts that they have learnt in the class, and are advised to research extensively by using the library, browsing the internet and other resources on the data communications in LAN, WAN, inter-site networking, NOS's and network technologies underpinning good network design and management to computersry out this assignment.

a. Overview

This assignment presents a scenario in which the XYZ COMPUTERS Company has hired your team to design their computer network. In order to help you organize this project, the scenario has been divided into seven phases listing the requirements for each phase. You have to accomplish each phase and prepare a formal report that can be given to the company.

This assignment requires that you accomplish the following:

  1. Identify the Network Components for XYZCOMPUTERS.
  2. Identify the topology and technology to be used for LAN/WAN Interconnectivity
  3. Identify the Network media to be used.
  4. Identify the Transmission equipment to be used
  5. Determine the protocols, and the NOS to be used.
  6. Perform VLSM design.
  7. Provide detail documentation in the appropriate format.
  8. Provide a written report.

b. Scenario

Satyam Computers is a newly established company that sells computers accessories. It has a chain of stores in four cities namely Kuala Lumpur, Ipoh, Penang, and Johor Bharu. Each store is housed in a building with Sales, Purchase, and Marketing and Administration departments in separate floors or rooms. Each employee has his/her own computer with access to Internet.
The company is implementing a wired network that should support 10% scalability over the next five to ten years. Your task is to design and document the network that will meet the requirements Satyam Computers.

c. XYZ Computers requirements

  1. Each store has a LAN with separated subnet for each department and all the four individual stores LANs are connected into a WAN.
  2. Each subnet has its own server and a printer.
  3. Assume an IP address for connection to the Internet router.
  4. Assume any public Class B Network IP address for internal addressing.
  5. Use a VLSM for IP addressing.
  6. All networking devices must have an IP address.

i. Kuala Lumpur

  • 18 employees in Sales.
  • 9 employees in Marketing
  •  7 employees each in Purchase and Administration.

 

ii. Ipoh

  • 9 employees in Sales
  • 5 employees in Marketing
  • 4 employees in Purchase and Administration

 

iii, Johor Bharu

  • 15 employees in Sales
  • 7 employees in Marketing
  • 5 employees in Purchase and Administration

 

iv. Penang

  • 12 employees in Sales
  • 5 employees in each Marketing, Purchase and Administration.

 

4 Deliverables

The Deliverables consist of the following (contribution to the overall module mark is given in brackets):

a. A formal written report containing

Phase -1: Satyam Computers Network Composition.

  1. Outline
  2. Summary of the Companies Network requirements
  3. Identify all the network components that would be included in the Satyam Computers network.

Phase - 2: LAN/WAN Interconnectivity

  1. Identify the LAN and WAN topology, and technology you would recommend and give the rationale behind.
  2. Create a table as shown below, and enter the network devices/components that you would be using in the Satyam Computers network under the corresponding layers they function in the right column

OSI model

Device /Components

Application

 

Presentation

 

Session

 

Transport

 

Network

 

Data Link

 

Physical

 

 

 Phase -3 : Physical Transmission options

  1. Identify the network media you would recommend to use in Satyam Computers network for the interconnection of devices, LAN and WAN.
  2. Briefly explain your reasons behind which should include pricing, bandwidth needs, and equipment needs.

Phase - 4: Transmission Equipments

  1.  Identify the transmission equipment like routers, switches and other transmission equipments that you would use in Satyam Computers network to provide LAN and WAN connectivity.Explain in brief the reasons for using those devices that you have identified.

 Phase -5: Network Protocol Architecture.

  1. Based on the requirements of Satyam Computers and which NOS you would recommend. Briefly explain your reasons.
  2. Determine which LAN and WAN protocols are supported by the NOS you recommended.
  3. Create a table as shown below, and enter the protocols under the corresponding layers they function in the right column.

TCP/IP Model

Protocols

Application

 

Transport

 

Internet

 

Host-to-network

 

Phase -6: Routing Protocols.

  1. Identify the routing protocols that you would recommend for the Satyam Computers  network. The possible routing protocol alternatives and properties should be identified in a brainstorming session. Each property is assigned a numeric value from 0 to 4. A recommendation be made and the decision matrix should be presented in the report as shown below.

Routing Protocol

Property 1

Property 2

Property 3

Total

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Group recommendation for Routing Protocol:

Phase -7: VLSM Design

  1. Your team has decided to use VLSM to maximize the use of IP address. Produce a table showing all possible subnets that meets the Satyam Computers requirements using VLSM.
  2. For each location, a set of tables for the Switches and Routers should be given as shown below.

 

 Phase -8: Network Design

Produce a logical diagram that includes:

  1. Router Switch Names
  2. Router Interface Details
  3. Network Addresses
  4. Number of Hosts per Network

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9524607

Have any Question?


Related Questions in Computer Network & Security

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

Recent tariff actions by president trump include raising

Recent tariff actions by President Trump include raising tariffs and quotas on imports of both manufactured goods like televisions and automobiles and intermediate goods like steel and aluminum sheets. How will the econo ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As