Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Task 1 - Network Design:

The School of Computing is planning to organize a new network structure to accommodate the following situation. Please make suggestions on how this LAN can be designed based on floor map.
Network devices such as hub, switch, bridge, router, router switch, and wireless devices can be employed in combination.
The network design must provide high performance for the lab users and convenience for the staffs. Meanwhile, the cost of maintaining and building the designated network must be kept low.

A design proposal must be delivered at this stage that holds the following contents:

- Illustrations of the LAN design as well as necessary comments and annotations.
- Justifications of the current design, i.e. reasons for choosing structures and devices.
- Discuss whether this is a practical approach for the required situation from the following aspects:
- Network devices, Network topology, Performance, Cost, Convenience, Sharing of network resources, Any alternative solutions?
- Supplies list including sources of purchase,
- Model numbers, web links, cost, etc.
- The total cost for the network deployment (except for the PCs) should also be finalized.
- Distinguish between Network Devices, Computers and Servers.

Task 2 - Network Creation:

Upon the completion of Task 1, use Packet Tracer software to model the network that you have designed, and configure the network to make sure it is running properly.

The following requirements must be met:

- All the PCs except the ones in server room are workstations.

In the server room, there is a Web Server and a DNS Server.

- Test network connections between any two PCs, and give evidence.
- Allocate appropriate IP addresses for all the workstations and servers in network.
- Configure the DNS server and web server.

Make sure any PC in network can load the webpage from web server properly. Please include the Packet Tracer file in the submission. Screenshots must be included in the report.

The document must be:

• Total word count approximately 1800 words in length
• Word processed
• Inclusive of a list of references / bibliography (where applicable), following the Numeric Referencing System.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91267

Have any Question? 


Related Questions in Computer Engineering

Analyze the manner in which a cirt plan fits into the

Analyze the manner in which a CIRT plan fits into the overall risk management approach of an organization and how it supports other risk management plans.

1 implement the sub method for the polynomial class

1. Implement the sub method for the Polynomial class implemented in the chapter. 2. The implementation of the Polynomial mul method is O(n 2 ) in the worst case. Design and implement a more efficient solution for this op ...

Your group is working for a global organization that

Your group is working for a global organization that handles highly classified intellectual property. In many situations and scenarios, the implementation and operations teams have been creating and setting up environmen ...

This chapter covered network management whereas the

This chapter covered network management, whereas the previous chapter covered network security. Note that network design tasks are often interwoven, however, and shouldn't be considered discrete just because a book is di ...

1 what is pki why is it so important in information

1. What is PKI? Why is it so important in information security? 2. What is the difference between authentication and nonrepudiation? 3. Why is there a dispute between digital nonrepudiation and legal nonrepudiation?

Develop an algorithm that uses a random number generator

Develop an algorithm that uses a random number generator which always generates random numbers in the range lower. . . . upper. In each instance the random number generated should take on the role of middle in the above ...

In an ipv4 datagram the value of total-length field is

In an IPv4 datagram, the value of total-length field is (00A0) 16 and the value of the header-length (HLEN) is (5) 16 . How many bytes of payload are being carried by the datagram? What is the efficiency (ratio of the pa ...

1 if the processor has forwarding but we forgot to

1. If the processor has forwarding, but we forgot to implement the hazard detection unit, what happens when this code executes? 2. If there is forwarding, for the first five cycles during the execution of this code, spec ...

1 if you could what would you do to help create a national

1. If you could, what would you do to help create a national "security culture" in which everyone is more knowledgeable and proactive about threats to information security? 2. There have been several incidents of data th ...

Verify that eulers theorem holds in zm m 69 for all

Verify that Euler's Theorem holds in Zm, m = 6,9, for all elements a for which gcd(a,m) = 1. Also verify that the theorem does not hold for elements a for which gcd(a,m) ≠ 1. For the affine cipher in Chapter 1 the multip ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro