--%>

Topologies and Configuration Tasks

Assessed Learning Outcomes

1  Design a small routable network comprising LAN and WAN components

2  Configure routers to implement small routable networks

Scenario

You are a network engineer for a UK based travel agency (UKTA) which has the following network topology:

Topology

1183_topology.png

Configuration Tasks

You are required to configure the above topology to meet the following requirements:

1. Using the network address 192.168.156.0/22, create an addressing scheme to accommodate all hosts on the network as follows:

Device

Interface

Number of Hosts

HQ

Fa0/0

90

Fa0/1

60

S0/0/1

2

S0/0/0

2

Remote1

Fa0/0

30

Fa0/1

60

S0/0/1

2

Remote2

Fa0/0

128

Fa0/1

60

S0/0/0

2

2. Configure EIGRP with AS Number 1.

Configure EIGRP on the HQ router and advertise all connected networks except the loopback interface

Configure EIGRP on Remote1 and Remote2 and advertise all connected networks.   

3.   Configure a static default route on the HQ router to the loopback interface. Propagate the default route through out the AS.

Testing

1.      Write a detailed test plan to thoroughly test and verify your configuration.

2.      Produce suitable test results based on the above test plan.

Bandweth

  1. Bandweth calculating

Deliverables

A written report containing the following, but not exhaustive, sections:

  1.   Detailed Design including justifications
  2.   Detailed addressing scheme
  3.   Configuration files, one per page
  4.   Detailed Test Plan and Test Results
  5.   Packet Tracer files (on a CD)

Grade Criteria

Marks will be awarded based on the Anglia generic assessment criteria for a Level 2 module (see Module Guide for full details). However, the following guidelines should assist students in their assignment planning:

1.         Valid addressing scheme with correct usage of subnet masks and interfaces addresses

2.         Accuracy of router configurations to include global and router configuration

3.         Quality of test plan and relevant test results

4.         Report presentation quality    

 

 

 

 

 

 

   Related Questions in Computer Network Security

  • Q : Types of Computer crimes Explain the

    Explain the various types of Computer crimes ?

  • Q : Analysis on Wireless Technology 1.

    1. Summarize what is being accomplished in this section in a few sentences. What is being accomplished here is that we have created a sequence generator that outputs two short random messages. The multiple sequence source generates

  • Q : Define Wifi Broadband What do you mean

    What do you mean by the term Wifi Broadband?

  • Q : Wireless Information Security System

    Wireless Information Security System: In any wireless network only secure authorized usage should be given and the company should make sure o putting the best practices into use. The access points should not be given access without putting it through

  • Q : Types of information derived from

    Explain the types of information which are derived from the traffic analysis attack?

  • Q : Network layers What are the methods

    What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.

  • Q : General LAN Security setup General LAN

    General LAN Security setup: There are certain methods which can be used as general security such as not connecting the wireless network directly to SAMS network. The SSID should be changes on regular basis. After installation of the network the defaul

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Reasons for using PGP Specify the

    Specify the reasons for using the PGP?