Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Network Technology Assignment

Learning Outcomes tested in this assessment:

1. Critically Evaluate, design and implement both LAN & WAN systems,

2. Install and configure routers and switches,

3. Critically evaluate the performance of Link state in comparison to distance vector routing protocols,

4. Design Network management infrastructure.

Network Technology Assignment -

The assignment places you in the position of a computer network administrator required to setup a proposed network and configure the routers accordingly.

As administrator you will be required to make logical and justifiable decisions in order to produce feasible router configurations.

You are responsible for the configuration of all the shown routers.

The basic network requirements have been provided overleaf. An important consideration will be the method of implementation and verification.

You are required to think carefully and have a logical strategy in order that the configurations can be implemented with minimal error.

Your configurations must be commented with explanations. For example if VRF commands are issued then a comment must clearly explain what their purpose is.

The main topography has already been installed and is shown in Figure1.

2441_figure.png

All routers shown in the diagram are Cisco 2800 Series routers.

Alternative designs are not required and will not be considered.

STANDARD MPLS VPN IS TO BE USED. 

MPLS LITE OR ANY OTHER METHOD WILL NOT BE ACCEPTED

YOU ARE NOT REQUIRED TO CONFIGURE THE WORKSTATIONS

YOU ARE NOT REQUIRED TO IMPLEMENT A PHYSICAL NETWORK

The Assignment Brief -

As a network administrator, you are required to configure the CE routers and C routers of your company.  The Telco company in each location has configured the P routers and PE routers in the MPLS Core cloud.

All of the network including the MPLS cloud are owned and administrated by the company. There are no external links to this section of the network. Other internal departments are already using the network but are not shown on the diagram Figure1.

CE routers provider facing interfaces have been assigned addresses as follows:

LON (Headquarter)         202.2.252.2/30

LIS                               202.2.252.6/30

PAR                              202.2.252.10/30

The following requirements have been agreed and must be implemented:

1. All LAN connections are to be directly connected using a FastEthernet link.

2. PAR HR is to reach LON Finance via an MPLS VPN

PAR IT is to reach LON Mgmt via an MPLS VPN.

PAR IT is to reach LIS Prod via an MPLS VPN.

3. LON Mgmt, LIS Prod, and PAR IT are to have a full mesh MPLS VPN connection.

4. PAR IT is to have a direct MPLS VPN link to LIS Prod. The link will additionally be protected by implementing IPSec.

PAR HR is to have a direct MPLS VPN link to LON Finance. The link will additionally be protected by implementing IPSec.

5. LIS Prod must not have any access to PAR HR. 

LIS Prod must not have any access to LON Finance.

6. The Company has stipulated that all routers must be locally secure.

7. Each client router will distribute appropriate IP addresses to client workstations in an efficient manner using DHCP.

Assessment -

You are required to write a report on the commissioning of the network explaining the configuration, decisions taken and the strategy to confirm implementation.

Network decisions and justification

There are several aspects of the implementation which need to be decided. All decisions need to be explained and justified.

Router Configurations

This should not be a print out of a complete configuration. Only configurations made to implement the network need to be included. All configurations should be commented.

Present your configurations logically and coherently.

In other words the configuration details for a VPN should be given separately from other configuration details.

Strategy for Implementation and Testing

Implementation strategy should show a logical approach to the design and setup of the network.

Testing strategy should detail which tests, debugs etc should be used.

You may present the strategies independently or combined.

Report on how testing to be conducted with appropriate command such as debugs, ip route, ping test. 

Discussion and Conclusion

Discussion can be at the end of the document or after individual implementations. If discussion is spread throughout the document then a brief summary should be given at the end.

Conclusion should summarise for the reader what has been achieved.

Attachment:- Assignment.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92562486

Have any Question?


Related Questions in Computer Network & Security

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As