Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

I. OUTLINE

This Case Study will require you to
1) Build a small network using three switches and one router
2) One switch will run as a distribution layer switch, the other two will run as access layer switches
3) A router will be connected to the distribution layer switch using 802.1Q trunking to route between subnets
4) The switches will be connected with two Ethernet links using Ether-channel bonding
5) The distribution layer switch will be con?gured as the STP root bridge

II. CASE STUDY DETAILS

Your Lab Supervisor will provide your group with your:

  •  Company/orgnaisation name
  •  Allocated network address information
  •  Subnetting requirements for four LANs to operate within your organisation
  •  VLAN numbers and VLAN names for each of the four LANs
  •  Network Management VLAN to use in your network

These details will be provided once you have registered your group within ESP and provided those details to your supervisor.

III. LOGICAL NETWORK TOPOLOGY

The logical topology for the organisations network is depicted in the ?gure below. Your organisation consists of four LANs which will each be connected to a single router to route traf?c between subnets.

688_Build a small network using three switches and one router1.png

IV. NETWORK ADDRESSING

Your Lab Supervisor has provided you with a network address (and subnet mask) and subnetting requirements for each of your four LANs. When subnetting your network to accomodate the required hosts for each of your four LANs, you must:

  •  Ensure that you have enough subnets to address the entire network
  •  Allocate a subnet for the management network (switches and routers) large enough to cover network growth of double the current ammount of infrastructure
  •  Subnet optimally such that the largest number of IP addresses within your allocated network remain for future expansion

In your ?nal report, you must explain your subnetting process and show your calculations.

V. SWITCH PORT ALLOCATION

You have been provided with ?ve VLAN identi?ers for your network, one for each of your four LANs and one for your management VLAN. You have been provided with appropriate names for the VLANs covering the subnets. The physical topology of your network must match the network diagram below.

1427_Build a small network using three switches and one router.png

For each port on the four network devices, you must nominate:

  •  Whether it will operate in access or trunking mode
  •  Which VLANs are allocated to which ports, and on which switches
  •  Which ports will be disabled

In your ?nal report, you must explain your decision process for switch port allocation.

VI. BASIC DEVICE CONFIGURATION

You are required to con?gure all switches and routers with the following information:

  •  Device names
  •  Message of the Day
  •  Interface descriptions
  •  Console and Enable passwords
  •  ssh Access
  •  All router interfaces are to have the lowest usable IP address of their allocated subnet

Further, all switches should be con?gured such that:

  •  Unallocated ports are disabled
  •  Appropriate switch-port security is con?gured

In your report you will need to justify your switchport security decisions and con?gurations.

VII. ADVANCED NETWORK CONFIGURATION

You will be required to con?gure 802.1Q trunking connections between the switches. Each switch will be connected to another switch via two trunking connections where the second connection is used for redundancy purposes.

You will be required to con?gure your network Spanning Tree Protocol to PVST+ and to ensure that the distribution layer switch is the Root Bridge.

VIII. ETHERCHANNEL BUNDLING

Network traf?c has grown since you ?rst built your network. The Ethernet trunking channels are no longer capable of carrying the offered load on their own. A decision has been made to change the redundant trunking connections between each switch into a bundled EtherChannel to double the maximumum throughput.

You must recon?gure your network such that the two links connecting the switches now form an EtherChannel. You must ensure that the distribution layer switch remains the Root Bridge for the Spanning Tree Protocol.

A. Testing

As part of the Case Study, you need to devise and document an appropriate testing regime to ensure that all the following conditions are met:
1) The nominate level of switchport security is functional
2) Full interconnectivity exists between all hosts in all LANs and the management VLAN
3) The redundant trunking links are functional in the event of failure of the primary links
4) The correct switch is con?gured as the PVST+ Root Bridge
5) EtherChannel bundling is correctly con?gured, the channel bandwidth is indeed doubled, and that the root bridge remains properly con?gured
6) ssh access to all network devices is functional

IX. ASSESSMENT ITEMS

The Case Study submission will consist of two components:

1) Prepare a report

2) A video presentation

A. Report Contents

You are required to produce a report that contains the following information.

Subnetting Discussion

A discussion of your subnetting approach, your calculations for each subnet, why particular subnet masks were chosen and how you allocated the subnets to individual networks

Network Drawing

A complete network drawing detailing allocation of addressing information for all relevant hosts and devices. This documentation must include port and VLAN allocation for all devices

Device Con?guration Summary

Tables containing the device information that is not included within the network drawing, including:

  •  Hostname information
  •  Console, enable and ssh passwords
  •  Assigned interface descriptions and the MOTD
  •  Port security summary

Design Discussion

Discussion of your design and decision making processes and reasoning. These discussions must include:

  •  Swithport allocation reasoning
  •  Port security reasoning and design
  •  Spanning Tree implementation details to de?ne the root bridge
  •  Planning for redundancy and EtherChannel considerations and deployment

Device Output

A copy of the output of the following commands on all devices:
show version
show run
sh ip int brief
sh ip route (routers only)
sh vlan brief (switches only)
sh interface trunk (switches only)

Testing Procedure

An outline of how you built your network and an overview of your testing to verify the complete functionality of your network

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9309659
  • Price:- $100

Priced at Now at $100, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Question in a short paragraph explain the transmission of

Question : In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one pa ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

Assignment wireless applications advances advantages and

Assignment : Wireless Applications, Advances, Advantages, and Disadvantages The adoption of wireless technologies varies from one industry to another, and is often based on the benefits provided versus the challenges, im ...

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As