ICTNWK517 DETERMINE BEST-FIT TOPOLOGY FOR A WIDE AREA NETWORK ASSESSMENT TASK 1 FEEDBACK COVER SHEET STUDENT NAME STUDENT ID ASSESSOR NAME EVIDENCE COLLECTED BENCHMARK REQUIREMENTS MET 1st Attempt 2nd...

1 answer below »
..


ICTNWK517 DETERMINE BEST-FIT TOPOLOGY FOR A WIDE AREA NETWORK ASSESSMENT TASK 1 FEEDBACK COVER SHEET STUDENT NAME STUDENT ID ASSESSOR NAME EVIDENCE COLLECTED BENCHMARK REQUIREMENTS MET 1st Attempt 2nd Attempt 3rd Attempt 1. Answers to Knowledge Questions ☐ ☐ ☐ OUTCOME ☐Satisfactory ☐Not Satisfactory ☐Satisfactory ☐Not Satisfactory ☐Satisfactory ☐Not Satisfactory DATE / / 20 / / 20 / / 20 ASSESSOR INITIAL FEEDBACK TO STUDENT ASSESSOR SIGNATURE DATE of FINAL OUTCOME Task 1: Knowledge Questions Assessment tasks To achieve competency in this unit you need to successfully complete all assessment tasks: · Task 1: Knowledge Questions · Task 2: WAN Specification Project Submission details All tasks are to be submitted electronically via Canvas, with any required evidence attached. Performance Objective You will demonstrate knowledge you applied to determine best-fit topology for a wide area network. Assessment task description For this task, you will answer a series of questions on the general topic of determining best-fit topology for a wide area network. Assessment task introduction The project includes two main sections: Procedure and Specifications. You are required to understand the difference between these sections: · Procedure - this section describes all the requirements that are needed to be submitted step by step. You DO NOT need to answer in this part. · Specifications - this section specifies what the student MUST include as part of the project. You are required to insert an object (a document) under each of the requirements. To be deemed ‘Satisfactory’ for this project, all the requirements under the Specifications need to be submitted and completed in accordance with Skills Australia Institute’s ‘Student Handbook’ (under ‘Training and Assessment’ section). Procedure 1. You are required to answer all the questions correctly to be deemed ‘Satisfactory’ for this part of the project. Write your own words for every question. Specifications You must submit the answers to the following questions: Q1: Summarise two (2) typical network topologies that are applicable for each of the following networks. 1 2 Small LAN (less than 20 computers) Large LAN (enterprise network) WAN VPNs VLAN (1 trunk link and 1 access link) WLAN Q2: WANs require the use of both hardware (modems, routers etc) components and software components (routing protocols, switching techniques etc) to be able to transmit information over a large geographical area. Explain the concept of how modems operate including their function in a WAN. Q3: Describe two (2) types of modems. Q4:Explain the purpose of internet protocol (IP) addressing in a WAN and identify the components of an IP addressing scheme. Q5: The internet is the largest packet switched WAN in the world connecting many smaller LANs and metro networks. Explain how packet switching works within a WAN. Q6: Explain how routers operate in packet switched WANs. Q7: Explain the following routed protocols: Internet Protocol (IP) IPX AppleTalk Q8: Explain the following routing protocols used in WAN routers: RIP EIGRP OSPF Q9: Describe how the layer 4 protocol TCP/IP is used in data transmission in a WAN. Q10: Explain the concept of double data rate (DDR). Q11: Microwave and satellite transmission systems make use of electromagnetic spectrum frequencies to transmit information. i) Explain how point to point (P2P) microwave links are used to establish networks, include the frequencies used. ii) Explain the typical components of a star topology C band satellite communication network, include the frequencies used. i) ii) Q12: Explain the difference between Synchronous Transmission and Asynchronous Transmission. Give one (1) example of the application of each in a telecommunications network. Q13: Describe two (2) constraints associated with establishing a WAN, including an explanation of how the constraints affect network design. Q14: Telecommunications has over the years seen a revolution with legacy analogue equipment and networks increasingly being replaced with newer digital technologies. This has seen a sharp rise in the quality and performance of communication services delivered. i) Explain the key features in terms of infrastructure of digital and analogue networks ii) Give two (2) key differences between each. i) ii) Q15: Explain how network audit statistics can be used by a network manager to forecast network growth and plan future network capacity or optimisation. Q16: Explain two (2) considerations for a business when deciding on whether to opt for low or high speed links and give one (1) example of each type of network. Q17: Explain two (2) considerations in terms of the factors affecting the choice of routing protocols to be configured on enterprise or customer edge equipment when setting up a WAN. Q18: Network reliability is one of the most critical measures of the quality of a WAN. i) Explain two (2) important factors to consider selecting or creating redundancy paths for a private enterprise WAN ii) Give one (1) example of a legislative reliability requirement for public networks. i) ii) Q19: Describe how response time and reliability affect businesses in a WAN such as the internet. Q20: Explain two (2) security considerations every business must make when connecting their network or systems to a public WAN such as the internet. Q21: Network management systems allow ISPs and businesses to monitor and analyse their network traffic load and traffic flow patterns. Explain why it is important to continually monitor, measure and analyse traffic load and to analyse and assess network traffic flow patterns. Q22: Explain why it is important to assess the type of network users and expected network applications when establishing a WAN. Q23: i)Describe how a business scope of operation affects how the business sets up their WAN. ii)Give an example of two (2) types of business operations that would require two completely different types of WAN setups. i) ii) This is the end of the document Document Name: ICTNWK517 AT1 Knowledge Questions RTO Code: 52010 CRICOS Code: 03548F Version: 1.1 Approved on: 02 Oct 2020 Review Date: 02 Oct 2022 Page 1 of 1
Answered 29 days AfterMay 26, 2021ICTNWK517Training.Gov.Au

Answer To: ICTNWK517 DETERMINE BEST-FIT TOPOLOGY FOR A WIDE AREA NETWORK ASSESSMENT TASK 1 FEEDBACK COVER SHEET...

Kshitij answered on Jun 01 2021
148 Votes
ICTNWK517 DETERMINE BEST-FIT TOPOLOGY FOR A
WIDE AREA NETWORK
ASSESSMENT TASK 1
    FEEDBACK COVER SHEET
    STUDENT NAME
    
    STUDENT ID
    
    ASSESSOR NAME
    
    EVIDENCE COLLECTED
    BENCHMARK REQUIREMENTS MET
    
    1st Attempt
    2nd Attempt
    3rd Attempt
    1. Answers to Knowledge Questions
    ☐
    ☐
    ☐
    OUTCOME
    ☐Satisfactory
☐Not Satisfactory
    ☐Satisfactory
☐Not Satisfactory
    ☐Satisfactory
☐Not Satisfactory
    DATE
     / / 20
     / / 20
     / / 20
    ASSESSOR INITIAL
    
    
    
    FEEDBACK TO STUDENT
    
    ASSESSOR SIGNATURE
    
    DATE of FINAL OUTCOME
    
Task 1: Knowledge Questions
Assessment tasks
To achieve competency in this unit you need to successfully complete all assessment tasks:
· Task 1: Knowledge Questions
· Task 2: WAN Spe
cification Project
Submission details
All tasks are to be submitted electronically via Canvas, with any required evidence attached.
Performance Objective
You will demonstrate knowledge you applied to determine best-fit topology for a wide area network.
Assessment task description
For this task, you will answer a series of questions on the general topic of determining best-fit topology for a wide area network.
Assessment task introduction
The project includes two main sections: Procedure and Specifications. You are required to understand the difference between these sections:
· Procedure - this section describes all the requirements that are needed to be submitted step by step. You DO NOT need to answer in this part.
· Specifications - this section specifies what the student MUST include as part of the project. You are required to insert an object (a document) under each of the requirements. To be deemed ‘Satisfactory’ for this project, all the requirements under the Specifications need to be submitted and completed in accordance with Skills Australia Institute’s ‘Student Handbook’ (under ‘Training and Assessment’ section).
Procedure
1. You are required to answer all the questions correctly to be deemed ‘Satisfactory’
for this part of the project. Write your own words for every question.
Specifications
You must submit the answers to the following questions:
    Q1: Summarise two (2) typical network topologies that are applicable for each of the following networks.
    
    1
    2
    Small LAN (less than 20 computers)
    Bus - In bus topology Local Area Networks all the nodes are connect with single the help of cable called backbone network.
    Hybrid - In hybrid network topology more than one or two differing network topologies are might be present. These topologies could be combination of bus, mesh, ring, star, tree topology.
    Large LAN (enterprise network)
    Hybrid - In hybrid network topology more than one or two differing network topologies are might be present. These topologies could be combination of bus, mesh, ring, star, tree topology.
    Bus - In bus topology Local Area Networks all the nodes are connect with single the help of cable called backbone network.
    WAN
    Full mesh – software defined WAN (SD-WAN) implementation happen in full-mesh. All sites of a user’s connected to each other through GRE and GRE_IPsec overlay tunnels. GRE_IPsec is default overlay tunnel encapsulation.
    Dual homed – Primary and secondary servers involved, when one server fails other in operations called Dual-Homing
    VPNs
    Full mesh – software defined WAN (SD-WAN) implementation happen in full-mesh. All sites of a user’s connected to each other through GRE and GRE_IPsec overlay tunnels. GRE_IPsec is default overlay tunnel encapsulation.
    Extranet topologies – For VPN network Intranet uses mostly topologies are physical and logical. In this type of call extranet topologies, implementation requirements are security of the Virtual Private Network, which could be implemented with a number of different other topologies, either with the overlay or peer-to-peer VPN model.
     VLAN (1 trunk link and 1 access link)
    Tree – Like a Brach of trees tree topology works. Nodes are connected like that. In a tree topology hierarchy created like parent and child, as connection there is only one between two nodes.
    Bus/Line Topology - In bus topology Local Area Networks all the nodes are connect with single the help of cable called backbone network.
    WLAN
    Infrastructure mode - In 802.11 Infrastructure mode device communicate with each other with Access Point (AP). In wire network infrastructure mode device communicate with physical medium and wireless devices with access points, small cells. If one Access Point (AP) connected to wired network, set of wireless stations it is referred to as a Basic Service Set (BSS).
    Independent Basic Service Set (IBSS) - IEEE standard 802.11 wireless local area networking (LAN) standards including Wireless-Fidelity, share a service set identifier (SSID) is a set of service group of wireless network devices.
    Q2: WANs require the use of both hardware (modems, routers etc) components and software components (routing protocols, switching techniques etc) to be able to transmit information over a large geographical area. Explain the concept of how modems operate including their function in a WAN.
    SOHO router, WAN contains leased circuits, MPLS as routing protocol (MPLS), Layer 2 VPNs, Layer 3 VPNs, Packet switching technique. Router comes after modem in connectivity. Internet service provider connected to modem (DSL/ISDN or analog modem). Internet send analog signal through router, switches with all ISO layers operations to Digital subscriber line Access Multiplexer (SLAM), carrier mixed with digital signal modulated and send to wall jack connected to slitter connected to MODEM. MODEM receive analog signal, MODEM converted back in digital and send to inform of Becon to access device.
    Q3:     Describe two (2) types of modems.
    1. Internal Modem/ dial-up modem – Inside the computer in the form of PCI card also called dial-up modem. v.92 protocol for communicating over copper telephone lines. It operates on telephone line. Max speed 56kbps. Cable Modem – Use co-axial cable as carrier, speed 30mpds. V.32 modem operates 9600 bits/sec
2. External Modem- Some types of external modem are USB, Cable, DSL, External wireless Modem- ADSL- if you want large capacity of down load, ADSL used. SDSL- Requirement of both Upload and download in large capacity.
    Q4:    Explain the purpose of internet protocol (IP) addressing in a WAN and identify the components of an IP addressing scheme.
    There are two type of IP address in WAN: public address and private address, router have two types of interfaces internal interfaces and external interfaces. In WAN internal interface LAN IP and external interface WAN IP, Public IPs used. Static means IP address never changes, stay with same ISP. Dynamic - IP address changes with specific time. Public – NATing used to convert public to Private. Private - If IP reach within same network called private IP. Shared IP – IPs used is shared manner. Dedicated IPs - no one else uses specific IP the range of IP address – Class’ A’ range 0 to 127 default mask of IP 255.0.0.0; Class ‘B’ range 128 to 191 mask of 255.255.0.0, class ‘C’ range 192 to 223 default mask of 255.255.255.0, Class D, Class E - 248 – 255. IPV6 – Multicast, unicast, anycast.
    Q5: The internet is the largest packet switched WAN in the world connecting many smaller LANs and metro networks. Explain how packet switching works within a WAN.
    WAN is connectivity of LAN, Routers, switches, wireless and wireline devices. In Cisco there are three modes in Packet Switching- process, Fast switching and Cisco Express Forwarding (CEF). When perform routing the packet, router remove packet’s layer two header, examines layer three addressing and decide how forward the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here