Question: Subject: homework for Instructions for Designing a Comprehensive Network Topology for a University Using Cisco Packet TracerDear Students,showcase your networking skills through the design and
Subject: homework for Instructions for Designing a Comprehensive Network Topology for a University Using Cisco Packet TracerDear Students,showcase your networking skills through the design and implementation of a sophisticated network topology for a University. This large educational institution, with two campuses, encompasses various faculties, including IT Business, Engineering, and more.Overview: large institution with two campuses, requires an optimized network topology to cater to the diverse needs of its students and staff across college of IT Your task is to design and configure a network topology that supports the following main components:Main Campus Topology: Building A: Engineering Staff and Computer Center Admin staff PCs are distributed in the building offices with an expectation of shared networking equipment. The Server Room hosts the University Web server and other critical servers Building B: Faculty of IT Students' Labs, and IT Department Separate floors accommodate staff and students' labs.Project Requirements: a Topology Design: Create a network topology that ensures endtoend connectivity and access to internal and external servers. Separate IP networks should be assigned to each departmentfloor Implement appropriate VLANs and security settings on switches.b Device Configuration: Configure core devices and a selection of end devices to facilitate endtoend connectivity. Utilize OSPFEIGRP to provide internal network routing and external server routing. Ensure switches are configured with VLANs and optimal security settings.c IP Addressing: Building A devices should acquire dynamicstatic IP addresses.Submission Guidelines: Submit your homework as Cisco Packet Tracer file report in PDF format, attached them by Moodle Evaluation Criteria: Assessment will be based on the completeness and accuracy of the topology design, effective device configurations, and adherence to best practices in network security and routing.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
