Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Project - Case Study

I. OUTLINE

This Case Study will require you to
1) Build a small network using three switches and one router
2) One switch will run as a distribution layer switch, the other two will run as access layer switches
3) A router will be connected to the distribution layer switch using 802.1Q trunking to route between subnets
4) The switches will be connected with two Ethernet links using Ether-channel bonding
5) The distribution layer switch will be configured as the STP root bridge

II. CASE STUDY
DETAILS
Your Lab Supervisor will provide your group with your:
- Company/orgnaisation name
- Allocated network address information
- Subnetting requirements for four LANs to operate within your organisation
- VLAN numbers and VLAN names for each of the four LANs
- Network Management VLAN to use in your network
These details will be provided once you have registered your group within ESP and provided those details to your supervisor.

LOGICAL NETWORK TOPOLOGY

The logical topology for the organisations network is depicted in the figure below. Your organization consists of four LANs which will each be connected to a single router to route traffic between subnets.

441_Figure.jpg

NETWORK ADDRESSING
Ask your staff and get the sub netting requirements for each of your four LANs. When sub netting your network to accommodate the required hosts for each of your four LANs, you must:
- Ensure that you have enough subnets to address the entire network
- Allocate a subnet for the management network (switches and routers) large enough to cover network growth of double the current amount of infrastructure
- Subnet optimally such that the largest number of IP addresses within your allocated network remain for future expansion

In your final report, you must explain your sub netting process and show your calculations.

Lan 1- Hosts Lan 2- Hosts Lan 3- Hosts Lan 4- Hosts
8000 2000 500 100
4000 1000 250 58
2000 500 100 28
1000 250 58 10
8000 500 100 28
8000 4000 100 58
1000 500 28 10
500 250 28 10
250 100 58 28
2000 1000 250 58
3000 2000 500 250
1000 500 250 150

V. SWITCH PORT ALLOCATION

You have been provided with five VLAN identifiers for your network, one for each of your four LANs and one for your management VLAN. You have been provided with appropriate names for the VLANs covering the subnets.

The physical topology of your network must match the network diagram below.

2273_Figure1.jpg

For each port on the four network devices, you must nominate:
- Whether it will operate in access or trucking mode
- Which VLANs are allocated to which ports, and on which switches
- Which ports will be disabled
In your final report, you must explain your decision process for switch port allocation.

VI. BASIC DEVICE CONFIGURATION
You are required to configure all switches and routers with the following information:
- Device names
- Message of the Day - Interface descriptions
- Console and Enable passwords
- ssh Access
- All router interfaces are to have the lowest usable IP address of their allocated subnet
Further, all switches should be configured such that:
- Unallocated ports are disabled
- Appropriate switch-port security is configured

In your report you will need to justify your switch port security decisions and configurations.

VII. ADVANCED NETWORK CONFIGURATION

You will be required to configure 802.1Q trunking connections between the switches. Each switch will be connected to
another switch via two trunking connections where the second connection is used for redundancy purposes.
You will be required to configure your network Spanning Tree Protocol to PVST+ and to ensure that the distribution layer switch is the Root Bridge.

VIII. ETHERCHANNEL BUNDLING

Network traffic has grown since you first built your network. The Ethernet trunking channels are no longer capable of carrying the offered load on their own.A decision has been made to change the redundant trunking connections between each switch into a bundled Ether Channel to double the maximum throughput.

You must reconfigure your network such that the two links connecting the switches now form an Ether Channel. You must ensure that the distribution layer switch remains the Root Bridge for the Spanning Tree Protocol.

Case Study

A. Testing
As part of the Case Study, you need to devise and document an appropriate testing regime to ensure that all the following
conditions are met:
1) The nominate level of switchport security is functional
2) Full interconnectivity exists between all hosts in all LANs and the management VLAN
3) The redundant trunking links are functional in the event of failure of the primary links
4) The correct switch is configured as the PVST+ Root Bridge
5) EtherChannel bundling is correctly configured, the channel bandwidth is indeed doubled, and that the root bridge remains
properly configured
6) ssh access to all network devices is functional

IX. ASSESSMENT ITEMS
The Case Study submission will consist of two components:
1) A report, assessed out of a total of 40 marks and worth 10% of your final mark. All group members will receive the same mark for the report

Attachment:- Case Study.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92318458
  • Price:- $90

Priced at Now at $90, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As