CSI6201 Networking Technologies – Assignment 2
| Marks: Due Date: Objectives |
Worth 30% of the total unit marks 2:00PM AWST Wednesday 20th May (Week 12) |
The objective of this assignment is to assess your understanding of fundamental networking structure and
network design concepts and apply them to practical comprehensive exercises using a tool.
Learning Outcomes
On completion of this assignment students should be able to:
1) Plan and evaluate network implementations.
2) Analyse and evaluate data communication technologies.
3) Discuss the importance of network models based on layers and the role of network standards.
Task Details
You have been given the final high level design which was approved by the tender process and have been
hired to implement that into a low level design. In this submission, you should take the requirements given
and implement them using Packet Tracer. The network is to be implemented in the following three phases:
1) Phase 1 requires planning of layer 2 switching networks with an understanding of how virtual LAN can be
used to provide various subnets with limited hardware resources.
2) Phase 2 includes evaluating how layer 3 devices such as routers can connect various LANs via
understanding the concept of ARP with various scenarios.
3) Phase 3 implements a network combined with those two phases and shows the differences between
layers 2 and 3. It helps to understand how layer 2 networks can connect to layer 3 devices with various
options.
Preparation
1) This assignment requires video recording equipment such as a notebook equipped with a camera, as well as
the software Panopto (in Blackboard). If required, you can borrow a laptop from the library
(https://askus2.ecu.edu.au/s/article/000002383).
2) You should be familiar with Panopto in Blackboard and Packet Tracer for this assignment. It is
recommended that you thoroughly follow the Panopto instruction when submitting your work. It is your
responsibility to submit a video and a Packet Tracer (pkt) file correctly following the instructions. For
example, ‘Panopto Student Video Submission’ option must be selected. Otherwise, it won’t be submitted to
the grading folder’ as shown below
IMPORTANT: if you submit your video via the wrong option it may delay the marking of your assessment
and/or lead to late penalties. It is incumbent on students to watch these video instructions thoroughly and
follow them closely. You can submit multiple times until the due date.
3) It is recommended that you prepare all the phases including testing connectivity and scenarios. Open 3
different packet tracer files including those 3 phases of network topologies for quick switching for each
phase. Include a slide for phase 2 answers as well as the introduction with your name and student ID. You
also need to prepare a few slides to support your presentation in an effective way. Aside from addressing
each phase (outlined below), your slides need to include:
• An introduction and outline (with your name, student number, and a viewing of your student ID card)
• A conclusion with lessons learned/ recommendations
4) Practice recording a few times to keep within the time limit (under 10 minutes), using the rubric to guide
you.
Tasks and Requirements:
Phase 1: VLAN planning for various departments
1) Prepare a video recording using ‘picture in picture’ function. Exercise and be familiar with the tools prior to
your recording. The video must be recorded with your own voice and face.
2) Configuration: VLAN tagged (Figure 1 in Appendix)
a) Design and allocate IP addresses for hosts to include 3 VLANs in each switch. The remaining hosts are
regarded as untagged.
b) Design 3 virtual LANs so that each VLAN belongs to a department. For example, Vlan10 for marketing,
Vlan 20 for HR etc. Remember that a host IP should be in the same subnet with other hosts in the
same VLAN.
c) Configure VLAN interfaces from switches to hosts. There should be 3 x VLAN allocated across the
network, e.g. vlan10, vlan20, vlan30 in each switch.
d) Configure untagged hosts and interfaces so that they can be verified by native vlan.
e) Configure trunk interfaces between switches. This will provide redundancy between switches. For
example, when the interface between switch 1 and 2 is broken, switch 3 can be used to reach the other
networks. (To avoid loop, it is assumed that spanning tree protocol is automatically configured by the
switch. STP allows only one route to a destination to avoid a loop.)
f) Verify the connectivity as to whether they have been correctly configured or not. Ping should be
successful only within the same VLAN. Verify that the ping fails to other network hosts.
g) Disable the interface between switch 1 and switch 2.
h) Repeat step d)
i) The result should be the same, because switch 3 is used to reach between switch 1 and switch2 hosts.
j) Now, activate the interface between switch1 and switch2.
k) Repeat step d) after deactivating the interface between switch 1 and switch 3.
l) The result should be the same (but a different path) because switch 2 is used to reach between switch 1
and switch3 hosts.
Figure 1 Phase 1 Layer 2 network topology
Phase 2: Basic Routing configuration and ARP evaluation
1) Prepare a video recording using ‘picture in picture’ function. Exercise and be familiar with the tools prior to
your recording. The video must be recorded with your own voice and face.
2) Configuration
a) Design and configure the network using Packet Tracer as per Figure 2.
b) Verify the connectivity of all the subnetworks. Remember that Packet Tracer has a simulation function
which can show visible events including ARP.
c) Evaluate and answer the following questions and justify your answers.
1. Q1a: Consider sending an IP datagram from Host E to Host F. Will Host E ask router R1 to help
forward the datagram?
2. Q1b: Why?
3. Q1c: In the Ethernet frame containing the IP datagram, what are the source and destination IP and
MAC addresses?
4. Q2a: Suppose E would like to send an IP datagram to B, and assume that E’s ARP cache does not
contain B’s MAC address. Will E perform an ARP query to find B’s MAC address?
5. Q2b: Why?
6. Q2c: In the Ethernet frame (containing the IP datagram destined to B) that is delivered to router R1,
what are the source and destination IP and MAC addresses?
7. Q3a: Suppose Host A would like to send an IP datagram to Host B, and neither A’s ARP cache
contains B’s MAC address nor does B’s ARP cache contain A’s MAC address. Further suppose that the
switch S1’s forwarding table contains entries for Host B and router R1 only. Thus, A will broadcast an
ARP request message. What actions will switch S1 perform once it receives the ARP request
message?
8. Q3b: Will router R1 also receive this ARP request message?
9. Q3c: If so, will R1 forward the message to Subnet 3?
10. Q3d: Once Host B receives this ARP request message, it will send back to Host A an ARP response
message. But will it send an ARP query message to ask for A’s MAC address?
11. Q3e: Why?
12. Q3f: What will switch S1 do once it receives an ARP response message from Host B?
Figure 2 Phase 2 Layer 3 network topology
Phase 3: Integrated Layer 2 & 3 network implementation
1) Prepare a video recording using ‘picture in picture’ function. Exercise and be familiar with the tools prior to
your recording. The video must be recorded with your own voice and face.
2) You are allowed to customise the basic topology with addition of devices and servers, e.g. firewall, DMZ,
printers etc.
3) Design device names including your name, interfaces and IP addresses for hosts and interfaces of routers.
Do not use the names shown in the topologies but use your own design.
4) In this phase, you reconfigure 2 VLANs for each LAN (switch) and the remaining hosts as untagged.
5) Reconfigure your network from phase 1 to match the network depicted in Figure 3. You will need to remove
some devices and interfaces and add new devices and hosts. Phase 2 devices can be used with
reconfiguration of 2 routers and 3 switches. You need to consider redesign the IP addressing for each
subnet.
a) Configure interfaces between R8 and Switch2. This can be done in a few ways. For example, subinterfaces can be configured on the router interface, or you may configure with additional interfaces for
accommodating various VLANs such as interface f0/1 for Vlan10, f0/2 for Vlan20 etc. Remember that a
host should be able to ping its own default gateway.
b) Configure interfaces between R9 and Switch3. Note that each VLAN requires a separate default gateway
at a router interface. You can use a trunk interface (e.g. multiple sub interface configuration on a
physical interface) or multiple physical interfaces for each VLAN of a switch.
c) Verify connectivity of ALL hosts. Everyone in the network should be able to ping every other host.
6) How many subnets do you see in Figure 3? Explain why. In lecture (Week5), we discussed several different
options that could be used here.
7) Submit the procedure with analysis and lessons learned and/or recommendations in a video presentation
with a Packet Tracer file that you have worked on. The file name should include your name, e.g. ‘Firstname
Lastname Assignment 2’. You must show the evidence of connectivity verification of ALL relevant scenarios,
e.g. untagged, same VLAN, different VLAN hosts.
Figure 3 Layer 2/3 combined network topology
Rules:
1) Phase 1 and 2 topologies cannot be altered, however phase 3 can be changed including the basic topology
given for practical design. In this case, you need to justify the modification.
2) Layer 2 VLAN networks, hosts should be in the same VLAN and same Subnets.
3) Use private IP addresses for hosts and router interfaces.
4) Each host must be able to ping its own default gateway of the router interface.
5) You may need to modify the topology to resolve the interface issues, e.g. untagged traffic.
6) Video length must be 10 minutes or less. No content beyond 10 minutes will be marked.
a) Only videos submitted via the Panopto Student Video Submission will be marked.
b) The video needs to encompass the student’s voice and face above the shoulders. The student must also
hold their student card up close to the camera (so it is easily viewable to the marker) at the beginning of
the recording to verify their identity. If students have specific issues with the latter requirement please
contact the unit coordinator to discuss this requirement.
Submission Instructions
All submissions must be viewable in the latest version of Packet Tracer (7.2.2 or later version).
1) Provide a video including all phases demonstration, i.e. 1x video file
2) Provide Packet Tracer configuration files for phase 3 only, i.e. 1x pkt file
Video presentation:
Create a video of your presentation to your customer as if you were at a meeting in response to the tender
contract. You are presenting your solution to convince the client who may or may not proceed to the next
step. Upload the video file to the Panopto student submission link within the Blackboard assignments section.
Make sure you follow the Panopto student submissions steps carefully, to ensure successful and timely
submission.
Visit the Panopto for Students intranet site for more resources https://intranet.ecu.edu.au/learning/learningtechnologies/panopto-lecture-capture/panopto-for-students, and watch the video in the submission folder
paying particular attention to the right Mashup tool for submission.
The marking allocation for this assignment is at the end of this document. If there are any points which are
unclear, ensure you contact your lecturer prior to the assignment due date.
Academic Integrity
Please ensure that you have you completed the Academic Integrity Module in Blackboard and that you
understand the expectations of the university in terms of citing external sources and ensuring all individual
work is yours and yours alone. It is always assumed that once you hit the Submit button on your
assignment, you understand and have abided by all university expectations around Academic Integrity.
Your assignment is marked as such.
Rubric (Total 30 marks)
Refer to Blackboard>Assessment>My Grades
• Phase 1 (8 marks)
• Phase 2 (8 marks)
• Phase 3 (8 marks)
• Demonstration (6 marks)
The post CSI6201 Networking Technologies appeared first on My Assignment Online.