Fast Ethernet cables are uses for interdependent connection; on the other hand, serial cables are used for the connection of central organization router with department routers.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
Myanmar Brewery Limited (MBL) was established on March 29, 1995 as one of the earliest major joint-venture projects in Myanmar with the Union of Myanmar Economic Holding Ltd (UMEHL) to build a green field brewery in Yangon with a total invested capital of US$ 50 million. The joint venture company of Myanmar Brewery is Fraser & Neave Group of company (F & N) has invested 55% and Union of Myanmar Holding Ltd 45%. Myanmar Brewery was officially opened on 7th May 1997.
The brewery is located on a 13.6 hectare site in Pyinmabin Industrial Complex, Mingaladon Township, Yangon. MBL is a medium sized company with about 600 employees. MBL is the secondary and tertiary sectors. It imports the raw material from foreign countries. MBL uses the finest raw materials and produces the best products to maximize economics principle. MBL owns 82% for market power. So MBL is a monopoly market power.
MBL is considered as one of the best-run foreign-invested companies in Myanmar. The company is known not only as a company which produces consistently high quality products but also as a leader in environmental protection with its investment in a modern waste water treatment plant costing over US$ 1 million.
MBL is one of the first companies in Myanmar to send its staff abroad and locally for training programmers in various fields; from brewing & packaging to marketing, sales and administration skills.
First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
After implementing the whole project, this project is costly but quickly communication and can get exact and safety information. Moreover, information can be shared safety and easily in the office. Our company can give not only better service but also better experience. By using this proposed Network Development system, up to date information can be distributed each department in offices. So the data communication media never lost and terminated.
FirAfter implementing the whole project, this project is costly but quickly
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
Myanmar Brewery Limited (MBL) was established on March 29, 1995 as one of the earliest major joint-venture projects in Myanmar with the Union of Myanmar Economic Holding Ltd (UMEHL) to build a green field brewery in Yangon with a total invested capital of US$ 50 million. The joint venture company of Myanmar Brewery is Fraser & Neave Group of company (F & N) has invested 55% and Union of Myanmar Holding Ltd 45%. Myanmar Brewery was officially opened on 7th May 1997.
The brewery is located on a 13.6 hectare site in Pyinmabin Industrial Complex, Mingaladon Township, Yangon. MBL is a medium sized company with about 600 employees. MBL is the secondary and tertiary sectors. It imports the raw material from foreign countries. MBL uses the finest raw materials and produces the best products to maximize economics principle. MBL owns 82% for market power. So MBL is a monopoly market power.
MBL is considered as one of the best-run foreign-invested companies in Myanmar. The company is known not only as a company which produces consistently high quality products but also as a leader in environmental protection with its investment in a modern waste water treatment plant costing over US$ 1 million.
MBL is one of the first companies in Myanmar to send its staff abroad and locally for training programmers in various fields; from brewing & packaging to marketing, sales and administration skills.
First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
After implementing the whole project, this project is costly but quickly communication and can get exact and safety information. Moreover, information can be shared safety and easily in the office. Our company can give not only better service but also better experience. By using this proposed Network Development system, up to date information can be distributed each department in offices. So the data communication media never lost and terminated.
FirAfter implementing the whole project, this project is costly but quickly
the computer network,
computer networking a top-down approach,
computer network definition,
computer networking notes,
computer networking tutorial,
computer networks Tanenbaum,
computer networking concepts,
bridge in the computer network,
computer networks interview questions,
computer network security,
uses of a computer network,
switch in a computer network,
gateway in a computer network,
components of a computer network,
a router in the computer network,
computer networking courses,
introduction to computer networks,
application of computer network,
computer and network security,
computer networks ppt,
topology in the computer network,
computer network diagram,
computer network mcq,
types of computer network,
computer networking in Hindi,
computer network architect,
computer networking basics,
computer networking jobs,
Simple Power Point Slides about Client-Server Architecture and Peer-to-Peer Architecture.
A short description (with pictures) about Client and Server computers is given in slides.
Feel Free to Like or Dislike the Slides.
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
Electronic commerce, commonly written as e-commerce or eCommerce, is the trading or facilitation of trading in products or services using computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web for at least one part of the transaction's life cycle, although it may also use other technologies such as e-mail.
E-commerce businesses may employ some or all of the following:
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
the computer network,
computer networking a top-down approach,
computer network definition,
computer networking notes,
computer networking tutorial,
computer networks Tanenbaum,
computer networking concepts,
bridge in the computer network,
computer networks interview questions,
computer network security,
uses of a computer network,
switch in a computer network,
gateway in a computer network,
components of a computer network,
a router in the computer network,
computer networking courses,
introduction to computer networks,
application of computer network,
computer and network security,
computer networks ppt,
topology in the computer network,
computer network diagram,
computer network mcq,
types of computer network,
computer networking in Hindi,
computer network architect,
computer networking basics,
computer networking jobs,
Simple Power Point Slides about Client-Server Architecture and Peer-to-Peer Architecture.
A short description (with pictures) about Client and Server computers is given in slides.
Feel Free to Like or Dislike the Slides.
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
Electronic commerce, commonly written as e-commerce or eCommerce, is the trading or facilitation of trading in products or services using computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web for at least one part of the transaction's life cycle, although it may also use other technologies such as e-mail.
E-commerce businesses may employ some or all of the following:
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
Project
Purpose
The purpose of this project is to provide an opportunity for students to apply network administration and design competencies gained throughout this course.
Deliverables
Please choose ANY FOUR options from the following five options and complete the report for your chosen four options (OPTION 1 is MANDATORY).
Option 1: Network Design Case (100 points)
Option 2: Windows Security Firewall (33.33 points)
Option 3: Configuring OSPF Routing (33.33 points)
Option 4: Configuring EIGRP Routing (33.33 points)
Option 5: IPv6 Address Configuration (33.33 points)
Option 1: Network Design Case
Scenario
Consider that the prevailing market conditions have made it possible for our firm to expand our current operations. I have presented several options to our board of directors and they are eager to proceed with an expansion except for one condition. The board feels that our current telecommunications infrastructure hinders our business operations and that it is imperative to design a new voice and data infrastructure to facilitate the planned expansion. The board is prepared to advocate any prudent expenditure necessary to implement a new infrastructure at the upcoming stockholder’s meeting.
As you know, our firm is headquartered in San Antonio where we occupy the first and third floor of a large, but somewhat antiquated building. Each floor of the building measures 400 ft. by 250 ft. We currently have 52 Pentium-based PC’s located on the third floor to meet the needs of our accounting, billing, and phone sales departments. The first floor contains 17 Pentium-based computers and six Apple PowerMacs used by management, our receptionist, walk-in sales staff, and our adjusters. We currently have a 10Base2 network that is used to connect some, but not all, of our existing systems. The previous network manager told us the remaining systems could not be networked due to the 10Base2 architecture. We also have smaller offices in Austin, Houston, and Corpus Christi. These offices generally have 4 to 6 Pentium or Apple-based computers. The computers in these locations are not currently networked.
Our immediate expansion plans, if approved by the shareholders, include opening a second office in Houston, two offices in Dallas and an office in El Paso. These offices will be similar to the existing small offices operated in Austin, Houston and Corpus Christi. My vision for the new telecommunications network includes having all of the existing and proposed offices connected together in a seamless, secure manner. All of the computers in all of the offices should be connected.
Deliverables:
· I need to understand whether or not we can continue to build on our current network and why. I also need to know what we should use to replace it if we need to do so.
· I see the network as consisting of two primary parts, the networks within each facility and the network that connects the various facilities together. Please provide diagrams that illustrate h ...
We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.
What is Qualitative Research_ Different Qualitative Research Topics of InterestTotal Assignment Help
A lot of thought goes into the selection of qualitative research topics in order to make an outstanding research paper. The article explores the reason behind qualitative research and presents 12 topics to take inspiration, along with some key factors to consider while selecting a qualitative research topic.
The majority of quantitative research is based on numerical data that has been acquired from a source. The raw numerical data is subjected to statistical calculations and analysis in order to discover any trends or important tidbits of information.
There are a number of qualitative research subjects that focus on obtaining information directly from the source. Qualitative research relies on information gleaned directly from participants themselves. Qualitative research involves interviewing subjects one-on-one to gather data.
Human resource-management-essay-challenges-in-employee-attraction-and-retenti...Total Assignment Help
The human resource management essay represents the analysis of the challenges that the finance sector is facing in order to attract and retain the employees to their job roles.
Human resource-management-essay-on-attracting-and-retaining-staffTotal Assignment Help
The aim of human resource management essay is to understand the attraction and retention of talent within communication sector organizations followed by its key challenges.
Machine Learning Assignment: How JD utilizes Artificial Intelligence?Total Assignment Help
In this Machine Learning Assignment, a detailed analysis is being provided about the latest Machine Learning that is being used by JD, an online retail company.
Imputation credit (franking credit) discussed in this financial management assignment is the credit given to the shareholders on the part of the taxes paid by the company on profits so that the dividends distributed by the company could be saved from double taxation
This research study of management assignment is related to the physical environment design of restaurant by developing a Multiple Criteria Decision-Making model.
The primary aim of this article discussed in change management assignment is to explore the case studies where managerial communication skills have helped in successfully managing the change initiatives.
As per the Utilitarian theory of ethical consideration discussed in Robotics assignment, it can be identified that consequence is a strong determinant within the course of ethical analysis of a certain activity.
Marketing assignment ultimate guide to advertising trends in 2019Total Assignment Help
The Big Tobacco Company discussed in this marketing assignment is utilizing social media as a weapon to trap the young generation of society with smoking addiction.
The current marketing assignment presents the reflective analysis of two articles where one relates to the marketing trends and another one explores the concept of misconception of consumers while buying sustainable products.
Business environment assignment on analysis of different types of companies t...Total Assignment Help
An organisation can be of different types and size. According to the size and sectors, the scope of the companies varies. In Business Environment Assignment, a brief analysis of different types of companies, their size and scope.
Finance assignment globalization and cross-border business relationsTotal Assignment Help
This Finance Assignment reviews the important of increased globalization and cross-border business relations have made it mandatory for the financial reports of different countries to communicate a similar language. This is achieved through the convergence to IFRS which makes interpretation of financial statements easier and more apt to suit the business requirements.
In this Urban Planning Assignment it is mentioned that with increased urbanization, it is difficult for the government to control the flow of people into the same. Apart from the above-mentioned issues related with urbanization and development of cities discussed in this Urban Planning Assignment, it does provide a compact area that supports a vast majority of the population.
Research project assignment proposal for oxygen share program in perth-conve...Total Assignment Help
The current research project assignment aims to plan the suburbs in a way where every household will generate their own share of Oxygen. The location proposed is the city of Perth, Australia.
Financial analysis assignment: Analyzing the Business Strategies of Various C...Total Assignment Help
The major part of operations as discussed in this financial analysis assignment of
Woolworth's Limited is in Australia and New Zealand. The company belongs to consumer goods
industry (Woolworth's, 2019)
Project management assignment evaluating the process in car manufacturingTotal Assignment Help
In this Project Management Assignment it is identified that Lean manufacturing process is utilized in the engine design and manufacturing in car industry for increasing the work efficiency and reducing the negative impact on the environment.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
1. Network Assignment On Project Design
1. Project Scope and Requirements
1.1 Scope of the Project discussed in network assignment:
From the newly developed system, expects of the organization is included in the
following project scope:
For new office branches, the implementation of structure and design architecture
is required.
By developing network architecture, the organization can implement the
connectivity within the organization.
To measures, the resource and cost required the organization to invest in new
architecture developments.
1.2 Requirements of the Project:
In IT project of a company should follow these essential types of equipment are:
Security: Security measures need to implement to giving protection to the
confidential information so that outsiders cannot access any technology or
information.
Effective Communication: To improve the growth and effectiveness of the
business, it is essential to build communication among various department of a
company.
Addressing: To avoid conflict while data transaction, it is essential to use the
effective addressing scheme.
Budget: For developing an active network within time and budget, it is essential to
evaluate budget [1].
2. 1
2. Network Design and Justification:
2.1 Network Design:
For the IT industry, various devices of hardware have selected with the support of
Cisco Packet Tracer. The structure of the IT industry has shown in the image below:
2.2 Justification:
With the help of Cisco Packet Tracer, the above structure mentioned in this network
assignment depicts the configured and design for the organization. For support, the
business organization various device such as PCs, switches, routers have set. Based
on the departments, the network has categorized. The departments are HR, sales, IT,
development and accounting. These departments are also interconnected with
various VLANs [3]. Multiple techniques have been used to assign an IP address. For
enable, device communication, need to configure RIP routing protocol over the
devices. FastEthernet cables are uses for interdependent connection; on the other
hand, serial cables are used for the connection of central organization router with
department routers.
3. 2
3. Network Topology Diagram and its Implementation:
The structural, organizational relationship has shown in the below:
3.1 IP Addressing:
For serial infrastructure, the IP address, i.e. 220.200.200.1 at R@1, will provide an
opportunity to communicate with other branches.
4. 3
To interact with other departments, configured sub-interfaces has considered as a
gateway. Every different department uses it. Commands that use for setting sub-
interfaces are in below:
With address 200.200.200.2, another router has configured. The name of the router is
R@2.
5. 4
Configured addressing as 200.200.200.5 in the second serial interface
These following commands are used in the CLI mode to assign gateway address to
FastEthernet port.
10. 9
3.3 Routing protocol Configuration:
RIP that is a routing protocol has methods for adding the communication medium
among all other routers [2]. Multiple network addresses have added in this protocol,
which has connected with the router.
With the scheme of addressing, other routers have configured.
12. 11
Internet Service provider configuration, as shown below:
3.4 Host Configuration:
The IP address, which is a unique identification address has assigned in PC14 for
identifying the location of the device through the network.
The successful and productive connection is built through a PC4. Through the below
gateway, successful results within this network assignment have been shown:
13. 12
Through VLAN’s 3 PC4 by pinging to ISP router the testing has been done. With the
ISP, all the devices are communicating successfully as indicated below:
14. 13
Configuration of Access-list:
The access of R@3 router should block from R@2 router because it belongs to the
sales department. The picture below shows the successful communication before
access-list configuration.
In the picture, the following commands indicate the configuration on R@3. From
specific departments, it blocks access.
15. 14
This picture shows that ping to accountant network in sales department PC6 is not
able.
The sales department cannot access or connect with the accounting department.
The access of another network can quickly identify by PC9. This also indicates the
successful communication between each device.
17. 16
3.5 Server Configuration:
Through IP address, the networks can connect n number of devices that makes the
function faster.
The configuration setup of DHCP Server's as shown below:
To PCO, by DHCP server dynamic IP allocation is successful.
18. 17
4. Timeline and Budget Estimation
The schedule followed for completing this project is presented with the help of the
Gantt chart [4]. By making the most use of different resources, the performance of
the project is shown approximately:
4.1 Project timeline
The project is displayed with the help of MS Office Project software, it is completed
with the timetable, and phases followed. Users can be able to understand the
resources that are utilized for deploying the network with the help of the timeline [5]:
19. 18
4.2 Human resources
The screenshot below portray the supplies along with the standard rate that acquires
to implement the system:
4.3 Hardware requirements
The table illustrated in this network assignment is showing all the hardware devices
costs that needed to arrange the network for the IT Company:
Device
Type
Device
Model
Manufacturer No. of
devices
configured
Cost
(Individually)
Total
Layer 2
Switch
Cisco
Catalyst
2960
Cisco 6 $550 $3300
Router Cisco
2911
Cisco 4 $2001 $8004
Server Cisco ASA
5506-X
Cisco 1 $1200 $1200
PC C0028IN HP 20 $635 $12700
Total Estimation $25204
20. 19
4.4 Cable used
4.5 PCs specifications
The following table is showing the specification of the PC that suggested
implementing in the network:
Brand HP
Colour Black
Item Height 19 Centimetres
Item Width 9.8 Centimeters
Screen Size 21.45 Inches
Maximum Display Resolution 1920x1080
Item Weight 7.76 Kg
Product Dimensions 23.6 x 9.8 x 19 cm
Item model number AIO 22-C0028IN
Processor Brand Intel
Processor Type Core i3
RAM Size 4 GB
Memory Technology DDR4
Maximum Memory Supported 4 GB
Hard Drive Size 1 TB
Hard Disk Technology Hybrid Drive
Speaker Description Integrated Stereo Speakers
Graphics Coprocessor Integrated Graphics
Connectivity Type Wi-Fi, Bluetooth-V4.2
Wireless Type 801.11ac
Number of USB 2.0 Ports 2
Number of USB 3.0 Ports 2
Number of HDMI Ports 1
Number of Audio-out Ports 1
Number of Ethernet Ports 1
Number of Microphone Ports 1
Operating System Windows 10 Home
Cable Type Series Length Price Total
Ethernet Cables Cat 5 Cable 2500m $3/meter $7500
21. 20
Included Components AIO Desktop, Wireless Keyboard, Wireless Mouse, AC Adapter,
User Guide and Manuals
4.6 Server Specifications
The table below shows the details of the server:
Brand Name Cisco
Series CISCO ASA 5506-X WITH FIREPOWER
SERVICE
Item model number ASA5506-K9=
Item Weight 6 pounds
Product Dimensions 9 x 2 x 8 inches
Item Dimensions L x W x H 9 x 2 x 8 inches
Processor Count 1
Flash Memory Size 50
Voltage 240 volts
5. Summary
In this network assignment, it is stated that the configuration of different devices that
are performed by using commands can be utilized to implement the network. The
22. 21
installation of a system is for IT Company, for increasing the growth of the business of
the new branch office that is planned to be open. The branch office network will
comprise of switches, PCs, constitute routers and server. Cisco tracer tool is utilized
for the simulation of the system, and by running different commands, it provides the
different number of devices to connect and configure. DHCP server deploys to
support IP addressing allocation process. It assigns an IP device when it is requesting
the network to access the tools. By configuring access-list, the security measures are
implemented, in which it blocks access to the sales department of the accountant
department. In the IT Company, the discussion of the timeline it also discusses and
follows to deploy the desired network.
23. 22
References
[1] A. M. Rahmani et al., “Smart e-Health Gateway: Bringing intelligence to
Internet-of-Things based ubiquitous healthcare systems,” in 2015 12th Annual IEEE
Consumer Communications and Networking Conference, CCNC 2015, 2015.
[2] A. Y. Ding, J. Crowcroft, S. Tarkoma, and H. Flinck, “Software defined
networking for security enhancement in wireless mobile networks,” Comput.
Networks, 2014.
[3] B. D. Allen, A. C. Singer, and E. S. Boyden, “Principles of designing interpretable
optogenetic behavior experiments,” Learning and Memory. 2015.
[4] A. G. Fiks et al., network assignment “Comparative effectiveness research
through a collaborative electronic reporting consortium,” Pediatrics, 2015.
[5] N. Kratzke and P. C. Quint, “Investigation of impacts on network performance in
the advance of a microservice design,” in Communications in Computer and
Information Science, 2017.
[6] B. Camburn et al., “A Systematic Method for Design Prototyping,” J. Mech. Des.
Trans. ASME, 2015.
[7] T. El-Diraby, T. Krijnen, and M. Papagelis, “BIM-based collaborative design and
socio-technical analytics of green buildings,” Autom. Constr., 2017.