Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Question: Task: This assessment is a practical assessment and will enhance and test your practical skills related to the subject topic. You are required to set up a simple network using minimum three PCs and minimum two routers, or use simulation software to set up the same network.

To complete this assessment you are expected to refer to information beyond the text book. This assignment is open; in that you are free to choose the devices or software you use to complete the specified tasks. Students are expected to research the necessary commands by themselves.

There are numerous web sites available that discuss Linux networking. You are expected to list your sources of information for the different tasks. When completing this 'project', you may encounter errors or experience difficulties getting your setup to work. If this occurs, your challenge is to analyse why they happen and report on how you solved the problems you encountered.

 Additional information will be provided for technology options to use in creating this lab closer to the assessment due date.

Part 1 - Setting up a Network

You are required to set up a network consisting of PCs, routers and servers. You need to configure routing between routers (minimum two routers required). The routers will have multiple network interfaces. The PC (client) will be connected to one of the router's interfaces and other PCs (servers) will be connected to the second router's interface.

Client <--> Router <--> Router <--> Server(s)

Each side of the router will be in its own LAN (or WAN) segment and should have a different network address, use private IP address ranges for each LAN Segment.

Perform the following activities and support your workings with screenshots:

1. Configure the PC, Server and Router interfaces with appropriate network addressing;

2. Configure routing (IP packet forwarding) on the routers;

3. On the client ping the client's own network interface, then the local router gateway interface, then the remote router interface, then the server;

4. Use the traceroute command from the client to the server. Include results of the traceroute in your submission.

Part II - Configuring Network Services

Perform the following activities: 1. DHCP: Configure DHCP on the server and show that the client PC has successfully received an IP Address and other network parameters (default router, netmask, DNS) using DHCP;

2. WEB Server: Configure a WEB server on dedicated machine, with URL as www.YOUR NAME.csu.edu.au

3. DNS: Configure a DNS Server on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing www.YOUR NAME.csu.edu.au from client PC, DNS must resolve this URL to IP address of WEB Server

4. Firewall: Configure traffic filtering on the router to block network traffic between client PC and WEB Servers, and then unblock traffic between them.

Before starting this task, you MUST show and discuss your proposed network topology with your lecturer.
A series of screen shots with commentary on each of the required tasks is to be submitted. The submission has to include an explanation of the tasks and all the commands used along with the output (or final result) in report format.

Rationale: This assessment item is designed to assess the understanding and use of some advanced topics in TCP/IP and how it is used to establish a internet environment. This assessment is designed to enhance analytical skills, planning and design capabilities of students under some predefined requirements. In particular, the assessment covers the following learning objectives:

• be able to analyse IP addressing requirements and design an addressing scheme;

• be able to analyse the requirements of IP routing and choose appropriate routing methods;

• be able to demonstrate how internetworking devices obtain their network configuration;

• be able to explain how data flows through the internet; and

• be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet;

Presentation: The assessment must be submitted in a report format electronically and should include the following components:

• Cover Page - should include Assessment No, Assessment Title, Student Name & ID and Student Email

• Executive Summary - this section should contain a brief summary about the contents of the report. This section should be a maximum of one A4 size page.

• Main Body of the report - Use this section to answer all the questions in Part I and Part II. Students must ensure that all tasks are identified clearly with headings.

• References - must be in APA style both in-text and at the end of the assessment document. This is also a part of the marking rubric

Please note: Assessment MUST be submitted as ONE word or pdf file on Turnitin. Please do not submit *.zip or *.rar or multiple files

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92300549
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Recent tariff actions by president trump include raising

Recent tariff actions by President Trump include raising tariffs and quotas on imports of both manufactured goods like televisions and automobiles and intermediate goods like steel and aluminum sheets. How will the econo ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Part auniversity of neverland offers more than 300

Part A University of Neverland offers more than 300 undergraduate programs. The Bachelor of Dreams is one of the highly regarded program offered by the University. The University tries to improve all its programs by intr ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data m ...

Part - athe assignmentwrite a critique review of the

Part - A The assignment Write a critique / review of the following paper: Mark Pollitt Eoghan Casey David-Olivier Jaquet-Chiffelle Pavel Gladyshev, "A Framework for Harmonizing Forensic Science Practices and Digital/Mult ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As