Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Table 1 below must be used to help students in investigating the optimal network media solution ( in terms of cost vs . performance )
Table below must be used to help students in investigating the optimal network media solution in terms of cost vs performance TASKS Investigate what technologies, protocols, communication media, and devices should be used in the hidden area area and area considering the geographical distances, cost effectiveness, security, and performance efficiency minimum datarate required Students are expected to use their proposed devices, technologies, and protocols to achieve connectivity from the RAO officer and the student to the Web server. Students are required to write a report with a minimum of words containing, as sections, the following: a Introduction b Problem statement c Proposed technologies, protocols, and devices d Justification of using the proposed technologies, protocols, and devices. Use a table or tables in this section, a not real example, may not work: Table e Based on table what will be the chosen communication media used between all buildings? f Justify your answer in point e using numbers datarate required vs cost vs distance You must use a table tables based on the previous table in point d in this section, a not real example, may not work Please note that costs, maximum length and datarate can be found in table at the end of this report: foble Somple Solution g Final topology. Redraw the topology after inserting the new devices and media. Screenshot Addressing and Subnetting tables for each building IT dept., Systems Engineering Dept. RAO campus, and students accommodation i Verification of connectivity Screenshots of pings between RAO officer, the student, and the web server j Protocols used, a not real example, may not work: Table Sample Solution k Security threats: what are the possible security threats in this scenario, and in your opinion what devices or mechanisms you should use in order to prevent such security threats. I Conclusion: you should mention the reasons why a certain device worked or did not work, limitations of certain technologies or devices that did not achieve connectivity, and challenges you may have faced during working with the topology. Table Types of media that can be used Some are dummy data tabletableType of communicationmediatableRange inmetersMax. Data Rate,tableCost OMRper meterCat UTP,Up to Up to MbpsEnhanced Cat UTP,Up to Up to MbpsCat UTP,Up to Up to GbpsCoaxial Cables,Up to MbpstableShielded Foil TwistedPairUp to Up to MbpstableCat ShieldedScreen Twisted PairUp to Up to GbpsFiber Optic Cables, Mbps Gbps Note: You may need to use a repeater for distances bevond the maximum length of a certain cable, the cost of each repeater is OMR m Assuming you have given the network address to subnet the above topology. Determine the number of networks needed and then design the appropriate addressing scheme include the addressing table below How many subnets are there? How many bits should you borrow to create the required number of subnets? How many usable host addresses per subnet are in this addressing scheme? What is the new subnet mask in dotted decimal format? How many subnets are available for future use?TOPOLOGY The RAO officer at RAO camp and the student at the Marine Engineering Dept. are trying to access the Web Server in the IT Department through the network above. There are missing technologies, protocols, devices, and connections in the hidden areas and Your task is to investigate the possible technologies, protocols, devices, and communication media that should be placed in the missing areas in order to achieve connectivity and security. Additionally, while choosing the possible media to use, you must consider their effectiveness and cost for the given distances and required data rates. Moreover, security is very important in the above network, therefore you also need to investigate security threats imposed by the attacker and how to protect the network from those threats. There can be any devices and communication media hidden inside each area. eg switches, routers, hubs, access points, UTP cables, optical fiber cables, etd..
Table below must be used to help students in investigating the optimal network media solution in
terms of cost vs performance
TASKS
Investigate what technologies, protocols, communication media, and devices should be used in
the hidden area area and area considering the geographical distances, cost effectiveness,
security, and performance efficiency minimum datarate required
Students are expected to use their proposed devices, technologies, and protocols to achieve
connectivity from the RAO officer and the student to the Web server.
Students are required to write a report with a minimum of words containing, as sections,
the following: a Introduction b Problem statement c Proposed technologies, protocols, and
devices d Justification of using the proposed technologies, protocols, and devices.
Use a table or tables in this section, a not real example, may not work: Table
e Based on table what will be the chosen communication media used between all buildings?
f Justify your answer in point e using numbers datarate required vs cost vs distance You
must use a table tables based on the previous table in point d in this section, a not real
example, may not work Please note that costs, maximum length and datarate can be
found in table at the end of this report: foble Somple Solution
g Final topology. Redraw the topology after inserting the new devices and media. Screenshot
Addressing and Subnetting tables for each building IT dept., Systems Engineering Dept.
RAO campus, and students accommodation
i Verification of connectivity Screenshots of pings between RAO officer, the student, and the
web server j Protocols used, a not real example, may not work:
Table Sample Solution
k Security threats: what are the possible security threats in this scenario, and in your opinion
what devices or mechanisms you should use in order to prevent such security threats.
I Conclusion: you should mention the reasons why a certain device worked or did not work,
limitations of certain technologies or devices that did not achieve connectivity, and
challenges you may have faced during working with the topology. Table Types of media that can be used Some are dummy data
tabletableType of communicationmediatableRange inmetersMax. Data Rate,tableCost OMRper meterCat UTP,Up to Up to MbpsEnhanced Cat UTP,Up to Up to MbpsCat UTP,Up to Up to GbpsCoaxial Cables,Up to MbpstableShielded Foil TwistedPairUp to Up to MbpstableCat ShieldedScreen Twisted PairUp to Up to GbpsFiber Optic Cables, Mbps Gbps
Note: You may need to use a repeater for distances bevond the maximum length of a certain cable, the cost of each repeater is OMR
m Assuming you have given the network address to subnet the above topology. Determine the number of networks needed and then design the appropriate addressing scheme include the addressing table below
How many subnets are there?
How many bits should you borrow to create the required number of subnets?
How many usable host addresses per subnet are in this addressing scheme?
What is the new subnet mask in dotted decimal format?
How many subnets are available for future use?TOPOLOGY
The RAO officer at RAO camp and the student at the Marine Engineering Dept. are trying to access the
Web Server in the IT Department through the network above.
There are missing technologies, protocols, devices, and connections in the hidden areas and Your
task is to investigate the possible technologies, protocols, devices, and communication media that should
be placed in the missing areas in order to achieve connectivity and security.
Additionally, while choosing the possible media to use, you must consider their effectiveness and cost for
the given distances and required data rates.
Moreover, security is very important in the above network, therefore you also need to investigate
security threats imposed by the attacker and how to protect the network from those threats.
There can be any devices and communication media hidden inside each area. eg switches, routers,
hubs, access points, UTP cables, optical fiber cables, etd..
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started