Preview

Fvbff

Powerful Essays
Open Document
Open Document
2478 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fvbff
CCNA4 Exploration:

Accessing the WAN

Guided Case Study

Student:

Date:

Marks: Overview and Objectives

This final case study allows students to build and configure a complex network using skills gained throughout the course. This case study is not a trivial task. To complete it as outlined with all required documentation will be a significant accomplishment.

The case study scenario describes the project in general terms, and will explain why the network is being built. Following the scenario, the project is broken into a number of phases, each of which has a detailed list of requirements. It is important to read and understand each requirement to make sure that the project is completed accurately.

The following tasks are required to complete the case study:

• Design the network using the diagram and accompanying narrative. • Simulate and test the network using the network simulator tool Packet Tracer.

• Correctly configure single-area OSPF

• Correctly configure VLANs and 802.1q trunking

• Correctly configure Frame Relay

• Correctly configure DHCP

• Correctly configure NAT and PAT

• Create and apply access control lists on the appropriate routers and interfaces

• Verify that all configurations are operational and functioning according to the scenario guidelines

• Provide documentation and configuration files as detailed in the following sections.

Scenario

The regional electrical utility company, South West Electrical, needs a network to be designed and implemented. The

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Step 1: Construct a network diagram for the project. (NOTE: EF for activity H should be 19)…

    • 552 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    2007 to generate a diagram for a proposed network topology. Write a 1-2 page proposal for…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    To complete this project you are required to initiate, plan, implement, monitor, finalise and review a straightforward work-related project based on a provided Scenario.…

    • 5764 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    Along with the skills and experience listed when describing Network Analyst, the Network Designer chosen to be a part of the network analysis team must also possess expert level knowledge and experience using network design and documentation tools in order to produce the documents and graphics necessary to satisfy the service request requirements. In the event upgrading and improving the existing network is not feasible, the Network Designer will be expected to document and provide a cost study of the network topology and infrastructure necessary for Kudler Fine Foods to address current, future, and even unanticipated technology and business requirements. The Network Designer will function as a peer of the technical resources associated with the analysis project and will report directly to the project…

    • 899 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Study 1 is a comprehensive assessment of the procurement and contracting process. By the end of your analysis you should have touched on all aspects of the contracting process from plan purchases and acquisition stage through the select sellers phase.…

    • 580 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NET410 Week 1 iLab

    • 383 Words
    • 2 Pages

    The first objective in the LAN Modeling tutorial is Setting Up the Scenario. The final step in setting up your scenario appears below.…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 3 Aib Problems

    • 895 Words
    • 4 Pages

    Once you have constructed the network, please answer the corresponding questions. Once you answer the questions, please post your responses to the Drop Box. You do not have to submit your network diagrams, the answers to the questions are sufficient.…

    • 895 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Best Essays

    554 Infrastructure

    • 3120 Words
    • 13 Pages

    Madeira, E. R. M. & Schulze, B. (2009, June). Managing networks and services of the future. Journal of Network and Systems Management. 17(1/2),…

    • 3120 Words
    • 13 Pages
    Best Essays
  • Good Essays

    The first step in securing your network is to identify the vulnerability and the risk associate with it. Risk Treatment Plan is based on overall security framework and based on the risk and vulnerability assessment. Risk Treatment is a process of selection and implementation of measures to mitigate risks identified earlier. We shall help your COMPANY in deciding the approach that it would take to manage the vulnerability and determine the degree of risk that it is prepared to accept. We shall assist technical team in formulating an effective vulnerability mitigation and resolution to address the vulnerabilities associated with the assets of the organization. This would be done by recommending industry best practice controls and establishing procedures for your company to mitigate these risks. The vulnerability assessment activity will address the security of different layers of technology according to the following diagram. There are several technology elements which will address more than one layer.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    802.1x CISCO ACS

    • 1730 Words
    • 9 Pages

    Step-by-step Guide for Configuring Cisco® ACS server as the Radius with an External Windows Database Table of Contents: INTRODUCTION: ....................................................................................................................................... 2 GETTING STARTED: ................................................................................................................................ 3 STEP-1: INTERFACE CONFIGURATION ............................................................................................. 4 STEP-2: NETWORK CONFIGURATION ...............................................................................................…

    • 1730 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    1. Evaluate the three scenarios proposed by the project team along the lines of the criteria presented in the case…

    • 1596 Words
    • 46 Pages
    Powerful Essays
  • Good Essays

    The simulation ran the project manager through the full life cycle of a project. It began with identifying all project stakeholders and project requirements in which the project manager must base decisions on. The project manager was given thought-provoking scenarios of project planning, budget, schedule, risk, quality, resource allocation and scope. It was left to the project manager to…

    • 1509 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    maniac

    • 5988 Words
    • 22 Pages

    This LAN design provides guidance on building the next-generation community college network, which becomes a common framework along with critical network technologies to deliver the foundation for the service fabric design. This chapter is divided into following sections:…

    • 5988 Words
    • 22 Pages
    Powerful Essays