Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

I. OUTLINE

This Case Study will require you to

1) Build a small network using three switches and one router
2) One switch will run as a distribution layer switch, the other two will run as access layer switches
3) A router will be connected to the distribution layer switch using 802.1Q trunking to route between subnets
4) The switches will be connected with two Ethernet links using Ether-channel bonding
5) The distribution layer switch will be configured as the STP root bridge

II. CASE STUDY DETAILS

Your Lab Supervisor will provide your group with your:
 Company/orgnaisation name
 Allocated network address information
 Subnetting requirements for four LANs to operate within your organisation
 VLAN numbers and VLAN names for each of the four LANs
 Network Management VLAN to use in your network
These details will be provided once you have registered your group within ESP and provided those details to your supervisor.

III. LOGICAL NETWORK TOPOLOGY
The logical topology for the organisations network is depicted in the figure below. Your organisation consists of four LANs which will each be connected to a single router to route traffic between subnets.

1861_Build a small network using three switches and one router.png

IV. NETWORK ADDRESSING

Your Lab Supervisor has provided you with a network address (and subnet mask) and subnetting requirements for each of your four LANs. When subnetting your network to accomodate the required hosts for each of your four LANs, you must:
 Ensure that you have enough subnets to address the entire network
 Allocate a subnet for the management network (switches and routers) large enough to cover network growth of double the current ammount of infrastructure
 Subnet optimally such that the largest number of IP addresses within your allocated network remain for future expansion In your final report, you must explain your subnetting process and show your calculations.

V. SWITCH PORT ALLOCATION

You have been provided with five VLAN identifiers for your network, one for each of your four LANs and one for your management VLAN. You have been provided with appropriate names for the VLANs covering the subnets. The physical topology of your network must match the network diagram below.

For each port on the four network devices, you must nominate:
 Whether it will operate in access or trunking mode
 Which VLANs are allocated to which ports, and on which switches
 Which ports will be disabled

In your final report, you must explain your decision process for switch port allocation.

VI. BASIC DEVICE CONFIGURATION

You are required to configure all switches and routers with the following information:
 Device names
 Message of the Day
 Interface descriptions
 Console and Enable passwords
 ssh Access
 All router interfaces are to have the lowest usable IP address of their allocated subnet

Further, all switches should be configured such that:
 Unallocated ports are disabled
 Appropriate switch-port security is configured

In your report you will need to justify your switchport security decisions and configurations.

VII. ADVANCED NETWORK CONFIGURATION

You will be required to configure 802.1Q trunking connections between the switches. Each switch will be connected to another switch via two trunking connections where the second connection is used for redundancy purposes.

You will be required to configure your network Spanning Tree Protocol to PVST+ and to ensure that the distribution layer switch is the Root Bridge.

VIII. ETHERCHANNEL BUNDLING
Network traffic has grown since you first built your network. The Ethernet trunking channels are no longer capable of carrying the offered load on their own. A decision has been made to change the redundant trunking connections between each switch into a bundled EtherChannel to double the maximumum throughput.
You must reconfigure your network such that the two links connecting the switches now form an EtherChannel. You must ensure that the distribution layer switch remains the Root Bridge for the Spanning Tree Protocol.

A. Testing
As part of the Case Study, you need to devise and document an appropriate testing regime to ensure that all the following
conditions are met:
1) The nominate level of switchport security is functional
2) Full interconnectivity exists between all hosts in all LANs and the management VLAN
3) The redundant trunking links are functional in the event of failure of the primary links
4) The correct switch is configured as the PVST+ Root Bridge
5) EtherChannel bundling is correctly configured, the channel bandwidth is indeed doubled, and that the root bridge remains
properly configured
6) ssh access to all network devices is functional

IX. ASSESSMENT ITEMS

The Case Study submission will consist of two components:

1) A report, assessed out of a total of 40 marks and worth 10% of your final mark. All group members will receive the same mark for the report

2) A video presentation, assessed out of a total of 10 marks and worth 5% of your final mark. Group members will receive individual marks for their part of the video presentation

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9742808

Have any Question?


Related Questions in Computer Network & Security

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data m ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

True or false1 tcp ensures error free transmission2 the

TRUE or FALSE 1. TCP ensures error free transmission. 2. The process that initiates the communication is the server. 3. A host can serve as both server and client in a P2P network. 4. Audio and video applications cannot ...

Two countries australia and france have their interest

Two Countries Australia and France have their interest rates to be 8% and 2 %, respectively. If their currencies trade according to 2 Australian $s buy one euro in the spot market, what will their future spot rate be in ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As