Professional Documents
Culture Documents
NETWORK
1
Assignment Cover Sheet
Learner declaration
I certify that the work submitted for this assignment is my own and research sources are fully
acknowledged.
Marks Awarded
First assessor
IV marks
Agreed grade
FEEDBACK FORM
INTERNATIONAL COLLEGE OF BUSINESS & TECHNOLOGY
2
Strong features of your work:
Marks Awarded:
Task 1
It is important for any organization with a network infrastructure that consists of
Routers or layer 3 switches to choose an appropriate routing protocol. The main
purpose of a Routing protocol is to enable networking devices to learn and forward
packets to the remote networks.
3
I. Describe the main functions of a layer three device.
Task 2
Enhanced Interior Gateway routing Protocol (EIGRP) was a Cisco proprietary
protocol and is known for fast convergence and flexibility. If a Network Engineer is
responsible for implementing EIGRP on networking devices. He/she should also be
aware of how EIGRP works so that any misconfigurations or protocol failures can be
resolved.
I. EIGRP is a distance vector protocol. Discuss how it avoids routing loops.
II. Configure EIGRP on the given network diagram (Network Diagram 01) using
cisco Packet tracer. (all routers share network prefix of 221.X.Y.0/24 where X
is student number and Y is mentioned in the diagram)
a. Name the 3 tables maintained by EIGRP
b. Use CLI commands to show neighbor table of R1, Topology table on
R2, Routing table on R3. (attach screenshots for each table)
III. What is meant by load balancing and what type of load balancing does
EIGRP?
(20 marks)
4
Task 3
Implementing Variable length subnet mask (VLSM) helps to reduce address wastages
on the LAN. With VLSM, subnet masks can have different lengths for different
interfaces. Figure 1 shows a network topology with number of networks. Following
table shows number of devices connected to each LAN.
Local Area Network Number of host devices
LAN 1 100
LAN 2 31
LAN 3 14
LAN 4 50
LAN 5 50
IP block of 10.X.0.0 /16 has been used where X is your student number. Your goal is
to implement a VLSM design for the following network that will aim to reduce the IP
address wastage
5
Task 4
OSPF is a link-state routing protocol widely adopted in large networks. Unlike
EIGRP, OSPF routers exchange link state advertisements and build their link state
database. OSPF routers have a complete map of the network. Assume that you are a
junior Network Engineer and your job role is to configure OSPF on routers and make
sure all routers have identical topology information.
i. What is ABR and ASBR in OSPF?
ii. Briefly describe link state advertisements
iii. Explain why and how the designated router and the backup designated router
is elected.
iv. What types of authentication does OSPF support and what is the purpose of
authentication (20
marks)
Task 5
Securing a network is one of the main responsibilities of a network administrator.
Discuss on following in terms of router security.
i. What is the purpose of the ‘enable secret’ command and briefly explain the
MD5 or SHA
ii. What methods can be used to connect to a Cisco router and how can you
secure the
The access to the router.
(20 marks)
6
Student guidance for report writing
All citation should be given as per "Harvard Referencing Style" for Text,
Tables and Figures
Late submission will be penalized
Please refer to the ICBT HND student handbook for further details
Improper report structure will lead to maximum of 15% reduction in the
total marks.
Note: Any kind of copying and plagiarized text will lead to automatic Re-
submission
7
Marking Scheme
8
Identified load balancing with related to the
given network diagram.
Marks Marks
Criteria Available Obtain
Poor /4
0-4
Poor network IP selection
Satisfactory
Selected a proper IP block 5-8 /4
Calculated IP blocks with miner errors
Good
Proper VLSM calculation /7
9-15
Assigned the proper IP to all available
interfaces
Excellent
15-20
Followed a logical order when assigning IPs /5
9
Task-5 contains 20 marks
Criteria Marks Marks
Available Obtain
Poor /4
0-4
Poor understanding of router basic security
Satisfactory
Identified possible ways a router can be /4
5-8
accessed
Identified the usage of password secret
Good
Brief explanation of either MD5 or SHA
Identified usage of above given algorithms and
applications
Identified the usage of using a logon banner 9-15 /7
Identified security mechanisms between
different access levels
Stated how a router physical access can be
controlled
Excellent
Identified support authentication types which /5
OSPF supports 15-20
Identified proper usage of route updates and
ways router updates can be secured.
10
ICBT
NETWORK
11
Acknowledgement
I would like to take this opportunity to express my thanks and appreciation to the
supervisor,(Mrs./MS.) Dinushi Wickramasinge for the continuous guidance given to
me in completing my research and he has been a tremendous mentor for me.
Last but not least. I also take the opportunity to thank my parents who gave me their
fullest support to make this successfully.
This task would not have been without your help and support.
Thank you,
Sahan deminda
12
13
14
15
16
17