Site hosted by Angelfire.com: Build your free website today!

Networking:  Application Assignment 1
Chapters 1-5


Submission Instructions

This is a TEAM ASSIGNMENT which must be completed with a team of two or three students. Team members may be students in any of Mr. Moats' CGS 1550 classes. However, they must be students, and they must participate equally in completing the assignment. Team members MAY NOT participate on any other team.

Assignments completed individually are not acceptable and will not be graded.

EACH and EVERY team member MUST SUBMIT the assignment. This is the only method by which WebCT permits the entry of a grade.

Prior to attempting an Application Assignment submission, please practice with the Practice Assignment. You have only ONE submission attempt allowed. You cannot submit a second attempt so be careful and follow the directions.

Complete the following exercise and submit your answers as follows.

  1. Save this file to your computer by selecting "FILE" then "Save As" on the browser menu bar and then selecting a destination on your computer. If using a College computer save to removable media (floppy disk or Zip disk).
    Do not save to the hard drive of a College computer. It will be deleted automatically when the computer is rebooted.
  2. Open an HTML page editor like Word97/2000, Wordperfect 7/8, FrontPage, or Netscape Composer.
  3. Open the saved file by selecting "FILE OPEN" and browsing until you find the saved the file.
  4. Search for answers and then answer the questions on this page. Be sure answers appear as RED text.
  5. Enter the following information here:

    1) STUDENT NAME: Stanley Calloway
    SECTION NUMBER: CGS1550TTH800Spring

    2) STUDENT NAME: Antone Vick
    SECTION NUMBER: CGS1550TTH800Spring

     

  6. Save the edited file as "assign-1.htm".
  7. Be certain to select "Save As File Type .... HTM/HTML or Webpage" (may vary depending upon the options available).
  8. Return to WebCT and select "Submit Application Assignments".
  9. Select "Application Assignment 1".
  10. Follow the directions to select, upload and submit the completed file.
  11. Note that improperly completed and/or improperly identified mail WILL NOT be graded.


Assignment

As a network consultant for Network-ology Associates, you have been called to provide help to MedMal & Associates in the design, installation, and implementation of a computer network in their new office building. MedMal & Associates is a small but up-and-coming law firm specializing in medical malpractice cases. They are now expanding into a new office.

They presently have two lawyers, two paralegals, an investigator, and a receptionist/secretary.  Their computer equipment includes one computer for each employee, one large laser printer connected to the secretary's computer (via parallel port), one laser printer on the senior lawyer's computer (via parallel port) and one small color inkjet printer connected to the investigator's computer (also via parallel port).

As a law firm, their typical computer use is in generating legal documents, letters and other correspondence, billing, and internal file notes to each other about the case. As a medical malpractice firm, they tell you they take and scan many high-resolution photographs of clients to show injuries and pre/post-surgery situations. Internet access is not an initial concern but will be added in the phase two expansion when they open a second office.

In general, remember that all networking installations must remain within a budget and require consideration of the most cost-efficient solutions. That means cost is always an object of concern. Always remember to justify decisions when requested.
 

1. Name at least three advantages (specific to this firm) that might be achieved if they network. (Be specific.)

Answer: All employees will be able to share their printers, files and folders, and they will be able to communicate.

   

2. What type network would be best initially: peer-to-peer or server-based?

Answer: server-based

   

Why? (Explain your reasons.)

Answer:

The best network that would suit this firm would be server-based because with future expansion and the growth company a server would be suited better than peer-to-peer(ing) 15 ppl.

   

3. With your recommended installation, is a Network Operating System (NOS) needed?

Answer:yes

   

Why?

Answer:Because its the software that controls the network. With it you will be able to run the the software on the server and on the client.

4. What additional equipment would need to be purchased to accomplish the network installation regardless of which design/topology is used (other than what is already in place)?

Answer:hub/router

   

5. What topology will you use?

Answer:hierarchical

 

Why?

Answer

:  

6. If a star topology is installed, what additional equipment is needed (other than what is already in place, or listed above)?

Answer:

 

7. What is the easiest and most cost-effective method for all users to share the printers? Be specific - more than just stating "to network them". Explain how you would network them.

Answer: have each

   

8. Explain the similarities and differences between the Network/IP address and the MAC/Data Link Layer address.

Answer:A mac address is permenament and burned into the nic. network/ip addresses are assigned, can be changed, and can be obtained automatically.

  

9. Comparing 10BaseT or 100BaseT system, which would you use?

Answer:10BaseT.

   

Explain at least three reasons why.

Answer:

1.To few employees to need the 100BaseT's amount of data transfer.

2..10BaseT would be cheaper overall.

3.The maximum range for both cabels are the same so you wouldnt get any more use out of the 100BaseT than you would the 10BaseT

   

10. What transmission media and connectors will you use? (Be specific.) 

Answer:Cat5 RJ45

   

11. What type NIC will you use?  (Be specific.) 

Answer:Standard 10/100 mbp ethernet card..

   

12. If John, the investigator, has his computer turned off or otherwise inaccessible to the rest of the network, how could the other staff in the office to continue to access John's files? 

What security is provided to facilitate this?  (Be specific.)  

Answer: The other employess would be able to access johns files that he saved to the server. The security that would be used would be to have john specify which users have what priveledges and rights to the files saved to the server (they wont have access to johns files on his computer, only the ones on the server).

   

13. What two methods exist for assigning IP addresses?

Answer:

   

14. What names are given for these two types of IP addresses?

Answer:

   

15.  What software/service must be installed to enable all machines to get an IP address when powered on? Give the full name.

Answer:

   

16.  The network will use IP addresses starting at 192.168.1.1. How many nodes/hosts are possible with this specific class of IP address?

Answer:

   

17.  Given the format of the IP addresses for this network - 192.168.a.b - will all the machines have the same number for the third octet, "a" in this example?

Answer:

   

What will the number (or range of numbers) be?

Answer:

   

18.  Will all the machines have the same number for the fourth octet - 192.168.a.b - "b" in this example? 

Answer:

   

What will the number (or range of numbers) be?

Answer:

   

19.  Based on the IP addresses above, complete the network's subnet mask by replacing the Xs with the appropriate numbers.

Answer:     255.X.X.X

 

20. What network protocols would be required?  Why?

Answer:

   

Before submitting please be sure that all parts of questions are sufficiently answered and explained and all team members' names are listed above.