Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment

Part A

Question 1

USQCollege uses OSPF as the dynamic routing protocol for its campus network. The network is not connected to any ISP and is isolated from the Internet.

The in-house network administrator insisted that the existing authentication process for OSPF is not efficient. So he assigned you to re-programmed OSPF such that the authentication process will apply MD5 to a message and the output will be sent to destination as cipher text. The receiver will apply MD5 and get back the original message.

The network administrator knows that AES is one of the best encryption algorithms we can use. As the next phase of improving the security, he planned to switch from MD5 to AES for OSPF authentication. You are assigned to be in charge of this switching over as your next task.

a) Will you accept the first task or reject it? Explain your reasons for accepting or rejecting the task.
b) Will you accept the second task or reject it? Explain your reasons for accepting or rejecting the task.
c) The network administrator is planning ahead to connect the campus network to an ISP. Assume that the OSPF to be used is the standard version, not the modified version. List and explain the routes to be installed in the boundary router and the ISP router.
d) Assuming the ISP router has an IPv4 address of 200.200.200.1 and the LAN gateway router has an IPv4 address of 201.201.201.1. List the required Cisco commands to install the routes.
e) How can the route to the ISP be transferred to other routers within the campus LAN?

Question 2

Floor plan of the Wolfgang Concern Hall:

541_Floor plan of the Wolfgang Concern Hall.jpg

You are going to implement a wireless network to the Wolfgang Concern Hall using access points with an effective range of 14 meters.

a) What is the minimum number of access point do you need?
b) Show

• In a diagram, show how the concern hall was covered by the wireless range of access points. The diagram should also show the coverage of individual access points.

• Your calculation,
• The data you use for the calculation, and
• Any assumptions you made.

c) Which type of access point (independent, controller based, cluster, cloud) will you use? Explain the reason for your choice.

Question 3

2077_Switched Network of ANZCollege.jpg

Download Q3.pkt.

Q3.pkt simulates the switched network of ANZCollege. Assume all links are of the same cost.
The top two switches are S1 and S5.

a) Why STP allows links L1 and L2 both to be active?
b) Which switch is the root switch?
c) What is the path assigned by STP:

1. From S4 to root switch?

• Explain why other paths are blocked.
• List the root port(s), designated ports and non-designated ports along the path from S4 to root switch.

2. From S5 to root switch?

• Explain why other paths are blocked.
• List the root port(s), designated ports and non-designated ports along the path from S4 to root switch.

d) Explain the port status for the ports of link L7 and link L8.

Question 4

AUssieCollege uses EIGRP as the dynamic routing protocol for its campus network. The network is connected to an ISP using a single router R1.

a) The in-house network administrator is not happy when R1 fails, all users will be disconnected from the Internet. What would you suggest to improve the situation? Justify your suggestion.

b) The AussieCollege LAN uses Cisco switches and is running STP. What would suggest to improve the convergence speed of the LAN network? Justify your suggestion.

c) The network administrator assigns you to implement redundancy for the network. Provide an implementation plan with supporting reasons to the network administrator.

Attachment:- Q3.pkt

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91940072

Have any Question?


Related Questions in Computer Engineering

Make a function first-char that consumes a nonempty string

Make a function first-char that consumes a nonempty string and produces a string consisting of the first character in the original string. Do not use string-ref.

A string in c is simply an array of characters with the

A string in C++ is simply an array of characters with the null character(\0) used to mark the end of the string. C++ provides a set of string handling function in as well as I/O functions in . With the addition of the ST ...

We use typecasting when we want to cast a value of one type

We use typecasting when we want to cast a value of one type to a value of another type. Specifically, in this program, we want to convert a value of type double to a value of type int. Recall that Java lets you assign a ...

You really need help with this assignment with step by step

You really need help with this assignment with step by step instructions on how to complete it. Using SQL Developer and SQL Plus 1. Create role customer_entry 2. Grant role customer_entry permission to update OE.CUSTOMER ...

Nbspa senior collected data concerning the amount of time

A senior collected data concerning the amount of time students had to wait when adding or dropping courses at the beginning of the semester. The student then built a model of the behavior and experimented different strat ...

In my sample database i need to use select statements to

In my sample database I need to use SELECT statements to find the following: 1) Find the full names of supervisors together with the total number of employees directly supervised by each one of them. 2) Find the full nam ...

A simple repetitive song with varying verse the ants go

A simple repetitive song with varying verse, "The Ants Go Marching" provides a simple assignment for remembering the basic Control Structures - loops, switch statements, if-then-else statements, etc., that you learned in ...

Imposing a tariff leads to the existence of two deadweight

Imposing a tariff leads to the existence of two deadweight triangles, which are the Consumption distortion and Production distortion losses. It is easy to understand why consumption distortion constitutes a loss for soci ...

Diacussion 1 how would one distinguish between an

Diacussion: 1) How would one distinguish between an organizational weekness and threat to the organization? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA for ...

Each student will create classes methods and design icons

Each student will create classes, methods, and design icons for their mobile device application using OOP language and GUI. The following must be included. Your instructor may add additional requirements, if any, in a se ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As