Theory and Simulation Exercises
Value: 15%
Due Date: 04-May-2020
LAST FOUR DIGITS OF STUDENT ID – 2620 (use wherever needed in assignment)
Task
There are Two parts to complete in this assignment. There are 50 marks in total.
In this assessment, students must demonstrate their understanding of critical thinking in an IT context by examining given problems and proposing solutions using the methods explored in the subject. Students will choose a solution, then implement and evaluate their solution. Students must submit a report that outlines the steps they followed to solve the problems and a packet tracer file to support their solution.
Part A Questions (22 Marks)
Instructions:
Answer the following four sub-questions. Each question is worth marks as indicated.
1). Ethernet interfaces on Catalyst 2960 and Catalyst 3560 Series switches support different trunking modes with the help of Dynamic Trunking Protocol(DTP). Please explain four different trunking modes and elaborate each case with examples (6 marks)
2). Trunking issues are associated with incorrect configurations. The following three common problems associated with trunks.
Trunk mode mismatches
Allowed VLANs on trunks
Native VLAN mismatches
Please use your knowledge and skill to analyse and troubleshoot any two of the above problems through customised examples (supporting by network topology with detailed configuration) (3 marks each problem: 6 marks)
3). In a company Charles, it’s marketing department is on VLAN 10 and the sales department is on VLAN 20. Please design at least two ways to enable a member of the marketing department to communicate with a member of the sales department? (3 marks each method, 6 marks)
4). Layer 3 redundancy issues can be resolved by using HSRP on Layer 3 Switches, discuss HSRP issues which can conflict with STP which can lead to sub-optimal links. (4 marks)
Part B Case Study (28 marks)
The purpose of this case study is to evaluate your knowledge of the topics studied and your ability to design, model and test using a simulation of a network from a given description.
Instructions:
ABC head office provides internet connection for its two branch offices, to insure network connectivity, the head office has two edge routers connect to internet. The company has two public IP address 209.168.100.1/30 and 209.168.100.5/30, private IP address 10.0.0.0/8 block is used for the internal network. The head office has 80 hosts (20 servers, 60 PCs), Branch 1 has 50 hosts and Branch 2 has 20 hosts (Please use your last 4 digits of you Student ID (USE 2620 as last four digits HERE) as the second and third octets in the IP address block of the network to create the subnet).
1). After survey the current network, to address the scalability requirement, you decide to use EIGRP as dynamic routing protocol to connect the branches to the head office, please compare EIGRP with other dynamic routing protocol and static route, what is the benefit of EIGRP (3 marks).
2). For security concerns, users can be separated into two VLANs in head office, VLAN A for server farm and VLAN B for admin users. The users from Branch offices should not have access to the server farm. You decided to implement extended ACL to prevent the traffic from Branches, compare standard ACL with extended ACL, what is the advantage to use extended ACL? (3 marks)
3). Access to the Internet is crucial for each office, as well as, inter-branch-office networking. Your task is to design, deploy and successfully implement the company business requirements using all or any of the following: (22 marks)
Switches
Routers
Workstations
Operating systems
Routing protocols
IP addressing: hosts, subnet addresses, broadcast addresses
Router-based DHCP server
NAT/PAT
FHRP
Etherchannel
VTP
STP
After considering all the requirement, design your network topology and implement your design on packet tracer, submit a network design document considering the principles of network design. Include screen captures of your network in Packet Tracer and evidence that everything works end-to-end. You should submit one document including the answers to the questions and Packet Tracer *.pkt file.
Note:
1. The Private IP address (use private Network 10.0.0.0) please use your last 4 digits of your student ID as the second and third octets of your network address. Keep other bits same as what are shown in the addressing table and the figure below. For example, if your student ID is 11567890, using the last 4 digits (7890), your main network address will be 10.78.90.0.
2. Each subnet can be represented by two end devices with the lowest and the highest IP address.
3. Marks will be given for the quality of the analysis, design and model following the network design principles and evidence of correct operation (PacketTracer .pkt file).
Rationale
This assessment task will assess the following learning outcome/s:
be able to explain and evaluate the nature and operations of different LAN and WAN technologies.
be able to explain, analyse and troubleshoot different routing and switching protocols.
be able to design, verify, and solve a variety problems of VLANs and WANs.
In this assessment item, tasks are designed to reinforce the skill to analysis, design and model following the network design principles and evidence of correct operation on a middle-sized network communication, as well as how to configure dynamic routes to reach destinations outside of your network. Your ability demonstrate your skills of designing, configuring and troubleshooting.
Marking criteria and standards
The following criteria are designed to guide you in your presentation and preparation of your assignment. The criteria apply generally across all questions to show you the standard required for each of the criteria.
Criteria HD
Analysis, design and model All procedures articulated and applied clearly and concisely. All calculations are successful and complete, appropriate hardware identified and described clearly and concisely. Configuration commands are clear and accurate. Appropriate protocols are selected.
Dynamic Routing Protocols Dynamic Routing Protocols are contextualized to the problem and configured perfectly
ACLs Configurations of ACLs are completed and verified correctly
Level of depth of justification Explanations and justification are clearly articulated and comprehensive, explanations are logical and clear
Presentation Presentation is clear, concise and appropriate with no spelling or grammatical errors and uses appropriate APA referencing