当前位置:天才代写 > 计算机作业代写 > 网络技术基础代写 SOF203代写

网络技术基础代写 SOF203代写

2022-07-07 10:03 星期四 所属: 计算机作业代写 浏览:398

网络技术基础代写

DESCRIPTION OF COURSEWORK

Course Code:SOF203

Coanse Name:Fundamemtal of Network Technology

Acdemic Session: 202304

Assessment Title: Assigment 2

网络技术基础代写 Plagiarism is submitting or presenting someone else’s work, words, ideas,data or information as your own intentionally or unintentionally.

A. Introduction/ Situation/ Background Information  网络技术基础代写

In this assignment, we’ll use variable length subnet mask (VLSM) in the subnet planning organization. We’ll then setup and configure a simple network with multiple Layer 3 switch.

B. Course Learning Outcomes (CLO) covered

At the end of this assessment, students are able to:

CL04: Perform planning and configuration for a simple network.

C. University Policy on Academic Misconduct

1. Academic misconduct is a serious offense in Xiamen University Malaysia. It car

as any of the following:

i. Plagiarism is submitting or presenting someone else’s work, words, ideas,data or information as your own intentionally or unintentionally. This includes in published and unpublished material, whether in manuscript, printed or electron published and unpublished material, whether in manuscript, printed or electron form into your work without acknowledging the source (the person and the work).

ii. Collusion is two or more people collaborating on a piece of work (in part or whole) which is intended to be wholly individual and passed it off as own individual work. 网络技术基础代写

iii. Cheating is an act of dishonesty or fraud in order to gain an unfair advantage in an asssment. This includes using or attempting to use, or assisting another to use materials that are prohibited or inappropriate, commissioning work from a third party, falsufying data,or breaching any examination nules.

2. All the asessment submitted must be the outcome of the student. Any form of scademic misconduct is a serious offense which will be penalised by being given a zero mark for the entire asessment in question or part of the assessment in question, If there is more than one guilty party as in the case of ollusion, both you and your ollusio purtner(s) will be subjected to the same penaly.

网络技术基础代写
网络技术基础代写

D. Instruction to Students  网络技术基础代写

1. This is an individual assignment.

2. Submit a softcopy of the assignment reporn to the Moodle system. You shouki submit together with a cower page containing your name and ID mumber. Please save your report as“A2-YourlD-Name”(without the double quotes, for example, A2-DMT1234567-YauWeiChuen.pdD and uploud the PDF file for your submission.

3. Your report should use the following formats:

4. Compress all the eNSP files saved in Task 2 as “YourStudentID.ip” (e.g.. DMT1234567.zip).

Upload the zip fle on Moodle.

5. Submission deadline: 07 July 2022 (Thursday), before 12:00 noon.

6. Late submissions will be penalised,

E. Evaluation Breakdown

F. Tasks

Your organization is allocated a block of address 10.Y.0.0/23. You are required to plan the subnetsand IP addressing based on the following address allocation requirement for each subnet as shown in Figure 1.

  • The SWE LAN requires i5 addresses.
  • The DMT LAN requires j5 addresses.
  • The AI LAN requires k5 addresses.
  • The EE LAN requires 12 addresses.
  • The HR LAN requires 22 addresses.
  • The Admin LAN requires 32 addresses
  • Each link segment between two Layer 3 switches requires 2 addresses.
网络技术基础代写
网络技术基础代写

Figure 1

  • Example 2: If your student ID is DMT2109100, the address block that you use in this assignment is 0.0.0/23. The SWE LAN requires 15 addresses. The DMT LAN requires 105 addresses. The AI LAN requires 105addresses.

Complete the following tasks.

Task 1. Subnet Planning and Layer 3 Switch Configuration  网络技术基础代写

  1. Perform subnet planning for your organisation’s network.

Show your work of subnet  planning.

Assign VLAN ID and list the following address information for each subnet1:

  • Network address
  • Usable IP addressrange
  • Broadcastaddress
  • Decimal / CIDR Subnet mask

2.Table 1 is used for your configuration plan.

  • Fill in the IP address and subnet mask for each of the PC and VLANIF’s interface.

3.Connect each device as shown in Figure1.

  • Select “S5700” in eNSP as the Layer 3 switch for SW1, SW2, and SW3. (You can use S3700 if there is any issue of using S5700 with youreNSP)
    • Use “S3700” in eNSP for the remaining switches in the diagram.
    • You can select any appropriate switch’s interfaces for the link Make sure you perform your configuration on the correct interfaces in the subsequentsteps.

4.Rename the three “S5700” switches. You should configure it with your student ID followed by the device name as shown in Figure 1. For example, rename the switch SW1 as “DMT1234567-SW1” if your student ID is DMT1234567.

  • Take a screenshot of your configuration on switch SW1. A sample is shown in Figure 2.

Figure 2


1 Do not assign VLAN 1 for your subnet. 

4.Configure the switches with VLANs and assign IP addresses to the interfaces based on the results that you have obtained in Table 1.

  • Take screenshots of your configuration on switchSW1.
  • Take screenshots of your configuration on switchSW2.
  • Take screenshots of your configuration on switchSW3.

6.Configure the PCs based on the results that you have obtained in Table 1.

  • Take screenshots of your configuration on PCs.

Table 1

 

Device

Interface (VLANIF)  

IP Address

 

Subnet Mask

 

Default Gateway

 

 

SW1

 

SW2

 

 

SW3

网络技术基础代写
PC1
PC2
PC3
PC4
PC5
PC6

Task 2: Dynamic Routes Configuration  网络技术基础代写

  1. DisableSTP on the interfaces connected between the three Layer 3  For example, you can enter the following command to disable STP on interface GE 0/0/3 of SW1 as shown in Figure 3.

Figure 3

  1. Configure RIP version 2 on each switch.
  • Take a screenshot of your configuration on switchSW1.
  • Take a screenshot of your configuration on switchSW2.
  • Take a screenshot of your configuration on switchSW3.
  1. Verify the configuration by checking the routing table on each switch.
  • Take a screenshot of the routing table on switchSW1.
  • Take a screenshot of the routing table on switchSW2.
  • Take a screenshot of the routing table on switchSW3.
  1. Use the pingcommand to verify the connectivity between the PCs.  网络技术基础代写
  • Take screenshots of the ping result.
  1. Enter the tracert command to trace the route from PC2to
  • Take a screenshot of the traceroute result.

6.Right-click the link between SW1 and SW3 and select “Remove Connection”. This will remove the link between SW1 and SW3 as shown in Figure 4.

Figure 4

  1. Enter the tracert command again to trace the route from PC2 to
  • Take a screenshot of the traceroute result.
  1. Checkthe routing table on SW1 and SW3 to observe the changes of the RIP route information.
  • Take a screenshot of the routing table on switchSW1.
  • Take a screenshot of the routing table on switchSW3.
  1. What are thechanges?
  1. Listat least two problems that you have faced during the configuration in task 1 and  Discuss how you troubleshoot and solve the problems. Support your answer with appropriate screenshots. If you have not faced any problems during the configuration, discuss how you achieve it.
  2. Enter the “save” command to save the current configuration of switch SW1, SW2, andSW3 respectively.
  3. Saveyour work in eNSP by clicking on the “Save As” icon on the top left of eNSP’s menu bar.
网络技术基础代写
网络技术基础代写

 

更多代写:北美代写推荐  gmat代考价格  北美管理学代写  北美网课代上代修  代考  gre保分费用

合作平台:essay代写 论文代写 写手招聘 英国留学生代写

 

天才代写-代写联系方式