demonstrate their understanding of critical thinking | My Assignment Tutor

here are Two parts to complete in this assignment. There are 50 marks in total. In this assessment, students must demonstrate their understanding of critical thinking in an IT context by examining given problems and proposing solutions using the methods explored in the subject. Students will choose a solution, then implement and evaluate their solution. Students must submit a report that outlines the steps they followed to solve the problems and a packet tracer file to support their solution. Part A Questions (22 Marks)Instructions:  Answer the following four sub-questions. Each question is worth marks as indicated. 1). Ethernet interfaces on Catalyst 2960 and Catalyst 3560 Series switches support different trunking modes with the help of Dynamic Trunking Protocol(DTP). Please explain four different trunking modes and elaborate each case with examples (6 marks) 2). Trunking issues are associated with incorrect configurations. The following three common problems associated with trunks. Trunk mode mismatches Allowed VLANs on trunks Native VLAN mismatches Please use your knowledge and skill to analyse and troubleshoot any two of the above problems through customised examples (supporting by network topology with detailed configuration) (3 marks each problem: 6 marks in total)  3). In a company Charles, it’s marketing department is on VLAN 10 and the sales department is on VLAN 20.  Please design at least two ways to enable a member of the marketing department to communicate with a member of the sales department? (3 marks each method, 6 marks in total) 4). Layer 3 redundancy issues can be resolved by using HSRP on Layer 3 Switches, discuss HSRP issues which can conflict with STP which can lead to sub-optimal links. (4 marks) Part B Case Study (28 marks) The purpose of this case study is to evaluate your knowledge of the topics studied and your ability to design, model and test using a simulation of a network from a given description. Instructions: ABC head office provides internet connection for its two branch offices, to insure network connectivity, the head office has two edge routers connect to internet. The company has two public IP address and, private IP address block is used for the internal network. The head office has 80 hosts (20 servers, 60 PCs), Branch 1 has 50 hosts and Branch 2 has 30 hosts (Please use your last 4 digits of you Student ID as the second and third octets in the IP address block of the network to create the subnet).  1). After survey the current network, to address the scalability requirement, you decide to use EIGRP as the dynamic routing protocol to connect the branches to the head office, please compare EIGRP with other dynamic routing protocols and static route, elaborate the benefit as well as shortcoming of using EIGRP (3 marks). 2). For security concerns, users can be separated into two VLANs in head office, VLAN A for server farm and VLAN B for admin users. The users from Branch offices should not have access to the server farm. You decided to implement ACL to prevent the traffic from Branches. Comparing standard ACL with extended ACL, what is the advantage to use extended ACL instead of standard ACL? (3 marks) 3). Access to the Internet is crucial for each office, as well as, inter-branch-office networking. Your task is to design, deploy and successfully implement the company business requirements using all or any of the following: (22 marks) Switches Routers Workstations Operating systems Routing protocols IP addressing: hosts, subnet addresses, broadcast addresses Router-based DHCP server NAT/PAT FHRP Etherchannel VTP STP After considering all the requirement, design your network topology and implement your design on packet tracer, submit a network design document considering the principles of network design. Include rationale, screen captures of your network in Packet Tracer and evidence that everything works end-to-end.  You should submit one document including the answers to the questions and Packet Tracer *.pkt file.  Note:  1. The Private IP address (use private Network please use your last 4 digits of your student ID as the second and third octets of your network address. Keep other bits same as what are shown in the addressing table and the figure below.   For example, if your student ID is 11567890, using the last 4 digits (7890), your main network address will be 2. Each subnet can be represented by two end devices with the lowest and the highest IP address.  3. Marks will be given for the quality of the analysis, design and model following the network design principles and evidence of correct operation (Packe


Leave a Reply

Your email address will not be published. Required fields are marked *