程序代写 FIT3165/FIT4165 Assignment: Network Plan and a Design. Semester 1 – 2022 – cscodehelp代写

Revision Status
FIT3165/FIT4165 Assignment: Network Plan and a Design. Semester 1 – 2022
Marking Guide
Dr. Lecturer, Faculty of IT

Copyright By cscodehelp代写 加微信 cscodehelp

Email: © 2022, Monash University
April 25, 2022

version 1: April 2022 by
An Enterprise Network Design
1) Title Page, Table of Contents, List of figures, Tables & Abbreviations
2) Executive Summary
3) Introduction
4) Requirements Analysis
A detailed list of the required tasks to be completed and proposed equipment derived from the Objectives and Scope of Work section of the RFP.
5) Wired, Wireless Lan and WAN Design:
a) Explain LAN, WLAN, Backbone, and WAN design logic including the choices of equipment (e.g., switches, routers, APs etc.) and structured cabling. You must propose specific devices from a particular vendor (i.e., CISCO, Juniper, etc).
b) Explain methods used to estimate the required performance of devices and links (i.e., max network traffic per floor, per building etc.). Report all the assumptions made in your network design.
c) Justify switch and wireless AP locations, horizontal and vertical cable paths, and lengths between the floors. Explain the routers, switches, and APs functional specifications.
d) Propose an IPv4 address plan for the new buildings with proper subnetting and minimal unused addresses.
6) Recommendations & Conclusions: An overall summary of your recommendations with a statement of justification.
7) Bibliography, References & Appendices
A Network design implementation
Provide IP address range for each network including point to point links.
a) Network Address, b) Broadcast address and c) Usable IP address Range *No working zero marks
Implement the network using CORE
a) Include correct devices
b) Add connections between devices
c) Set UP IP addresses to the devices and interfaces wherever required
Configure the router RC to provide DHCP for the subnet NET C and set IP addresses of all other devices in the network static.

a) Correct DHCP configuration in RC to match with the IP plan provided in part 2.1.1
b) Configure Devices in NET C as DHCP clients.
Configure static routing for subnet NET C and dynamic routing using RIP for other networks.
a) Configure static routes
b) Configure dynamic routes correctly in Routers to use RIP and add
configuration code to the correct places
c) Set default routes correctly if required.
Many possible configurations. Any design works properly without any errors or issues and satisfies the specification will receive full marks.
**No imn file is provided – zero marks for the Part 2
A video explaining the operation of CORE network design.
a) How you have configured the router RC to provide DHCP for subnet NET C. You are required to show how you configured the DHCP by going into the configuration panels.
b) How you have configured static and dynamic routing within the network by showing corresponding configuration panels.
c) How you have configured devices in the subnet NET C as DHCP clients.
d) How do you start your CORE network simulation?
e) Show the IP address obtained by one of the PCs in the network
where DHCP is configured. Use the ifconfig command.
f) Show routing information of each router using ip route show
g) Demonstrate full network connectivity using ping commands.
***No video file is provided – zero marks for the Part 2

Academic integrity, plagiarism, and collusion
Monash University is committed to honesty and academic integrity. There are serious consequences for plagiarism and collusion, but there’s much more to academic integrity. It’s about the value of integrity beyond your time at university.
A Checklist: What Constitutes Plagiarism?
Plagiarism includes, but is not limited to:
1. Copying and pasting text from online media, such as encyclopedias or journal articles without attribution.
2. Copying and pasting text from any website without attribution
3. Transcribing text from any printed material, such as books, encyclopedias, newspapers,
journal articles, and magazines, without attribution.
4. Simply modifying text from any of the above sources without proper citations. This includes
lifting portions of another source and using them as your own work.
5. Replacing a few selected words using a thesaurus or just using words from your own head
to get synonyms.
6. Using photographs, videos, or audio without permission or acknowledgement.
7. Using another student’s work and claiming it as your own, even with the other student’s
permission. The latter is an act of collusion in which both students are plagiarizing.
8. Acquiring work from commercial sources, including buying papers off the web or paying
someone to do the work.
9. Translation from one language to another without citations.
10. Submitting an essay or paper that was written for another class or another purpose without
the consent of the current instructor.
11. Using your previous work in any way as a basis for new assignments without citing the
original work in the bibliography.
Ref Link: https://www.monash.edu/students/admin/policies/academic-integrity

程序代写 CS代考 加微信: cscodehelp QQ: 2235208643 Email: kyit630461@163.com

Leave a Reply

Your email address will not be published. Required fields are marked *