Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Table 1 below must be used to help students in investigating the optimal network media solution ( in terms of cost vs . performance )

Table 1 below must be used to help students in investigating the optimal network media solution (in
terms of cost vs. performance)
TASKS
1- Investigate what technologies, protocols, communication media, and devices should be used in
the hidden area 1, area 2, and area 3 considering the geographical distances, cost effectiveness,
security, and performance efficiency (minimum data-rate required).
2- Students are expected to use their proposed devices, technologies, and protocols to achieve
connectivity from the RAO officer and the student to the Web server.
3- Students are required to write a report (with a minimum of 800 words), containing, as sections,
the following: a- Introduction b- Problem statement c- Proposed technologies, protocols, and
devices d- Justification of using the proposed technologies, protocols, and devices.
Use a table (or tables) in this section, a not real example, may not work: Table
e- Based on table 1, what will be the chosen communication media used between all buildings?
f- Justify your answer in point (e) using numbers (data-rate required vs. cost vs. distance) You
must use a table (tables) based on the previous table (in point d) in this section, a not real
example, may not work (Please note that costs, maximum length and data-rate can be
found in table 4 at the end of this report: foble 2 Somple Solution
g- Final topology. Redraw the topology after inserting the new devices and media. (Screenshot)
h- Addressing and Subnetting tables for each building (IT dept., Systems Engineering Dept.
RAO campus, and students accommodation)
i- Verification of connectivity (Screenshots of pings between RAO officer, the student, and the
web server) j- Protocols used, a not real example, may not work:
Table 3 Sample Solution
k- Security threats: what are the possible security threats in this scenario, and in your opinion
what devices or mechanisms you should use in order to prevent such security threats.
I- Conclusion: you should mention the reasons why a certain device worked or did not work,
limitations of certain technologies or devices that did not achieve connectivity, and
challenges you may have faced during working with the topology. Table 4 Types of media that can be used (Some are dummy data)
\table[[\table[[Type of communication],[media]],\table[[Range (in],[meters)]],Max. Data Rate,\table[[Cost (OMR],[per meter)]]],[Cat 5 UTP,Up to 100,Up to 100 Mbps,1],[Enhanced Cat 5 UTP,Up to 100,Up to 1000 Mbps,1.2],[Cat 6 UTP,Up to 100,Up to 10 Gbps,1.5],[Coaxial Cables,200-500,Up to 10 Mbps,1.3],[\table[[Shielded Foil Twisted],[Pair]],Up to 100,Up to 100 Mbps,1.4],[\table[[Cat 7 Shielded-],[Screen Twisted Pair]],Up to 100,Up to 15 Gbps,2.2],[Fiber Optic Cables,2000-100,000,100 Mbps -1 Gbps,5]]
Note: You may need to use a repeater for distances bevond the maximum length of a certain cable, the cost of each repeater is 15 OMR
m- Assuming you have given the 192.168.30.0/24 network address to subnet the above topology. Determine the number of networks needed and then design the appropriate addressing scheme (include the addressing table below)
How many subnets are there?
How many bits should you borrow to create the required number of subnets?
How many usable host addresses per subnet are in this addressing scheme?
What is the new subnet mask in dotted decimal format?
How many subnets are available for future use?TOPOLOGY
The RAO officer at RAO camp and the student at the Marine Engineering Dept. are trying to access the
Web Server in the IT Department through the network above.
There are missing technologies, protocols, devices, and connections in the hidden areas 1,2 and 3. Your
task is to investigate the possible technologies, protocols, devices, and communication media that should
be placed in the missing areas in order to achieve connectivity and security.
Additionally, while choosing the possible media to use, you must consider their effectiveness and cost for
the given distances and required data rates.
Moreover, security is very important in the above network, therefore you also need to investigate
security threats imposed by the attacker and how to protect the network from those threats.
There can be any devices and communication media hidden inside each area. e.g. switches, routers,
hubs, access points, UTP cables, optical fiber cables, etd..
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions