Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Network Proposal Paper

Below are diagrams of a network topology diagram.

2265_Figure.jpg

261_Figure1.jpg

In this network, 12 trouble tickets are issued to fix the connectivity problem. Select any three tickets and use the troubleshooting approach to diagnosis the problems and implement solution to the problem.

Your paper should address the following.

- What was your troubleshooting plan?
- What methods did you use to diagnose the problem? You should address here why the device in the ticket has problem.
- How did you arrive at identifying the problem? Here you should address other protocols or technologies that are ruled out by using verifying commands
- Implementation solution to the problem with verification

TSHOOT Trouble Ticket
Ticket 1:
Device: R3
Problem: OSPFv2 MD5
Solution: Add authentication statement

Ticket 2
Device R1;
Problem: BGP issues (assume any)
Solution: Neighbors are not configured correctly

Ticket 3
Device: AS1
Problem: VLAN Configuration
Solution:: Access VLAN 12 on Fe0/11 and Fe0/12

Ticket 4
Device: R3
Problem: OSPFv3 (assume)
Solution: No IP OSPF area 20 and IP Ospf area 20 S1/0.324

Ticket 5
Device: DS1
Problem: VLAN Configuration
Solution: Switchport dot1.q trunking

Ticket 6
Device: R1
Problem: Redistribute
Solution: Redistribute Static EIGRP

Ticket 7
Device: R4
Problem: DHCP
Solution: Modify DHCP Range

Ticket 8
Device: R3
Problem: EIGRP relation with R2
Solution: Issue IP address at Interface

Ticket 9
Device: R3
Problem: NTP (assume)
Solution: Set clock Rate

Ticket 10
Device: R1
Problem: NAT Configuration
Solution: No IP NAT and IP NAT inside

Ticket 11
Device: DS2
Problem: HSRP (assume any)
Solution:

Ticket 12
Device: DS2
Problem: OSPF broadcast Area
Solution:

Network Troubleshooting Methodology

The process of troubleshooting of a network holds great significance to ensure the smooth functioning of all the processes. It makes sure that all the problems are eliminated from the system and there are no further issues that may cause a hindrance. However, the troubleshooting methodology involves many of steps which should be carried out in a professional manner. Steps to troubleshoot a network

1. Identify the Problem
- Identify Symptoms
- Question Users
- Determine if anything is changed

2. Establish a theory of Probable Cause

3. Question the obvious:
So, this is the step where you will devote your energies to confirm you narrowed-down problem. For example, in the case of loss of a DHCP address, you can type ipconfig/renew on the computer to check if the DHCP address is restored. If it is not restored, then it means that the DHCP server for that computer has not been put online yet. This will let you relate all your previous findings in order to think about a common problem which could have caused it.

4. Test the theory to determine the cause

5. Establish a plan of action to resolve the problem and identify potential effects

6. Implement the solution or escalate as necessary

7. Verify full system functionality and if applicable implement preventative measures

8. Document findings, actions and outcomes

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92019108
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Two countries australia and france have their interest

Two Countries Australia and France have their interest rates to be 8% and 2 %, respectively. If their currencies trade according to 2 Australian $s buy one euro in the spot market, what will their future spot rate be in ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

A wall street journal article noted that a study by us

A Wall Street Journal article noted that a study by U.S. Congressional Budget Office "estimated raising the minimum wage to $10.10 per hour reduced U.S employment by 500,000 but lift 900,000 Americans out of poverty". Wh ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As