Recent Question/Assignment
ASSESSMENT COVER SHEET
Student name:
Student number:
Course name/code: ITICT103A
Internetworking 1
Subject name/code:
Teacher’s name:
Campus (TAFE college
you are attending):
Class /day/ time:
Assessment title:
Number of words:
Submission Due date:
I declare that the attached work is entirely my own except where the words or ideas of other writers are specifically acknowledged. This assignment has not been submitted for any other subject or course at any other institution. I confirm that the work was submitted by the due date indicated above.
Student signature:
.............................................
....................................................................................................... y teacher ONLY if an extension has been requested and granted ested and approved before original submission due date.
YES NO
YES
NO
This section to be completed b
Note: Extension must be requ
Extension approved
Supporting evidence sighted
Revised submission date:
Teacher signature:
....................................................................................................................................................
This section to be completed by teacher Mark/grade awarded:
Teacher signature:
Teacher feedback overleaf
Teacher feedback / comments
In this assessment, students must demonstrate their understanding of critical thinking in an IT context by examining given problems and proposing solutions using the methods explored in the unit. Students will choose a solution, then implement and evaluate their solution.
Students must submit a report that outlines the steps they followed to solve the problems and a packet tracer file to demonstrate the working solution.
Approximate word length is up to 1500 words with topology diagrams. The report should be clearly presented with supporting material as appendices, such as the calculations for the IP addressing scheme
Practical assignment brief
You have been approached by Company XYZ to design and deploy new branch offices to their network that will span three cities in Queensland:
• Brisbane (1300 users)
• Gold Coast (400 users)
• Cairns (200 users)
VLSM
The company uses 180.XY.0.0/16 at the company headquarters in Sydney with 3500 users and need to use a subnetting structure to incorporate the new cities. Adhering to the subnetting scheme and using VLSM, assign a subnet address to the networks and their links.
Access to the Internet is crucial for each office, as well as inter-branch-office networking. The large company’s headquarters is in NSW and the new subnets must have connectivity. For the QLD operation, you can choose any routing protocol, but you need explain the reason for your choice.
Note: XY is the last 2 numbers in your students ID
Elements
Your goal is to design, deploy and successfully implement their business requirements using all of the following:
• Switches
• Routers
• Workstations
• Routing protocols
• IP addressing: hosts, subnet addresses, broadcast addresses
• Default routes
• Static routes
• Cables
Solution
You are required to design the topology for the three new sub-networks and their connection to the Sydney office for approval from your instructor. At this stage of your studies, use serial connections as we have been doing in class to simulate ISP connections. Please discuss your design with your instructor for approval before implementing it in Packet Tracer. You must document each step you have taken, including your research sources.
Use Packet Tracer to implement, configure and test the network for end to end connectivity.
Configuration
The following is required on all routers
• A router name
• IP addresses on Interfaces as needed
• A routing protocol (not on all routers)
• Stopping unwanted DNS lookups if a command is entered incorrectly
• Passwords on all management interfaces
• Encrypted password to access privileged mode
• A banner of the day
• Descriptions on all interfaces
• Default Route which is passed on to all other routers as needed
• Static route as needed
• Stopping unwanted output from the router from disrupting commands as you
enter them
Deliverables:
1. Report explaining your solution, which includes a detailed topology of the network and the VLSM addressing scheme you have used. You can use Tables A and B as templates.
2. Working Packet Tracer file with your name in the filename
The criteria for marking this assessment is in the subject guide which you can access through Moodle.
Table A - IPv4 Subnetting Table
Network Name Subnet Address Subnet Mask Hosts Required Maximum
Hosts in Subnet In Uses (Yes or No)
Table B - Device Interface IP Addressing Table
Device Interface IPv4 address Subnet Mask
Sydney Router
Hidden Management (& Native) VLAN N/A