Ask Question, Ask an Expert


Ask Computer Engineering Expert

Task 1 - Network Design:

The School of Computing is planning to organize a new network structure to accommodate the following situation. Please make suggestions on how this LAN can be designed based on floor map.
Network devices such as hub, switch, bridge, router, router switch, and wireless devices can be employed in combination.
The network design must provide high performance for the lab users and convenience for the staffs. Meanwhile, the cost of maintaining and building the designated network must be kept low.

A design proposal must be delivered at this stage that holds the following contents:

- Illustrations of the LAN design as well as necessary comments and annotations.
- Justifications of the current design, i.e. reasons for choosing structures and devices.
- Discuss whether this is a practical approach for the required situation from the following aspects:
- Network devices, Network topology, Performance, Cost, Convenience, Sharing of network resources, Any alternative solutions?
- Supplies list including sources of purchase,
- Model numbers, web links, cost, etc.
- The total cost for the network deployment (except for the PCs) should also be finalized.
- Distinguish between Network Devices, Computers and Servers.

Task 2 - Network Creation:

Upon the completion of Task 1, use Packet Tracer software to model the network that you have designed, and configure the network to make sure it is running properly.

The following requirements must be met:

- All the PCs except the ones in server room are workstations.

In the server room, there is a Web Server and a DNS Server.

- Test network connections between any two PCs, and give evidence.
- Allocate appropriate IP addresses for all the workstations and servers in network.
- Configure the DNS server and web server.

Make sure any PC in network can load the webpage from web server properly. Please include the Packet Tracer file in the submission. Screenshots must be included in the report.

The document must be:

• Total word count approximately 1800 words in length
• Word processed
• Inclusive of a list of references / bibliography (where applicable), following the Numeric Referencing System.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91267

Have any Question? 

Related Questions in Computer Engineering

In distance-vector routing good news decrease in a link

In distance-vector routing, good news (decrease in a link metric) will propagate fast. In other words, if a link distance decreases, all nodes quickly learn about it and update their vectors. In Figure 20.33, we assume t ...

Consider these three networksa find a 3-core in the first

Consider these three networks: a) Find a 3-core in the first network. b) What is the reciprocity of the second network? c) What is the cosine similarity of vertices A and B in the third network?

Consider the vector adt from programming project 21a

Consider the Vector ADT from Programming Project 2.1: (a) Implement a new version of the ADT using an unsorted linked list. (b) Evaluate your new implementation to determine the worst case run time of each operation. (c) ...

Chapter 1 discussed four general methods for coping with

Chapter 1 discussed four general methods for coping with complexity: modularity, abstraction, hierarchy, and layering. Which of those four methods does a protocol stack use as its primary organizing scheme? Give two scen ...

Explain why it is important for the safety professional to

Explain why it is important for the safety professional to become knowledgeable and skilled in system safety concepts. Your response must be at least 75 words in length.

1 design and implement a program that compares the use of

1. Design and implement a program that compares the use of linear probing, quadratic probing, and double hashing on a collection of string keys of varying lengths. The program should extract a collection of strings from ...

1 who is ultimately responsible for managing a technology

1. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology? 2. What is contingency planning? How is it different from routine management plann ...

1 if a tlb is implemented as a set-associative cache how

1. If a TLB is implemented as a set-associative cache, how would you recommend determining the TLB slots examined by map (context, addr) ? Why? 2. Explain how to construct the cache tags of a virtual-address cache so tha ...

Repeat problem p4-3 for the differential manchester

Repeat Problem P4-3 for the differential Manchester scheme. Prob. 4.3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the graphs, g ...

Assume that our network may corrupt packets but it never

Assume that our network may corrupt packets, but it never loses or duplicates a packet. We are also concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM of a new p ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro