إعـــــــلان

تقليص
لا يوجد إعلان حتى الآن.

حلول واجب t325 spring 2016

تقليص
X
 
  • تصفية - فلترة
  • الوقت
  • عرض
إلغاء تحديد الكل
مشاركات جديدة

  • حلول واجب t325 spring 2016

    whatsapp:00966554873382
    whatsapp:00966551597560

    Part I (40 marks)


    Web servers often provide their users with secure access to the hosted web applications in order to gain more trust and protect the different transactions from potential attacks. Web servers use digital certificates for this purpose.
    In this part, you will select any secure web site (using https protocol) and download the web server certificate for further analysis. You shall follow the below steps:
    1- Select a secure website of your choice (you should provide the URL of the website in your report)(2 marks)
    2- Download the digital certificate of the server hosting the website using your browser(3 marks)
    3- List the following about the certificate
    a. Certificate version(1 mark)
    b. Certificate holder information(2 marks)
    c. Certificate issuer information(2 marks)
    d. Validity date (2 marks)
    e. Certificate usage: for what purpose the public key included in the certificate can be used(4 marks)
    4- As you can notice, the certificate includes a number of extensions.
    a. Identify five extensions in the certificate(5 marks)
    b. Explain each extension and how it can be used(10 marks)
    5- The web browser needs to make sure that a certificate is valid before using it. Explain three aspects that indicates whether a certificate is valid or not(9 marks)

    The deliverables of this part (part I) are:
    1- A report that explains how you generate each certificate
    o you should take screenshots of each step that clearly shows the inputs.
    o The screenshot should be clear and at the same time you should not use a very high resolution in order to keep the size of the TMA file reasonable.
    o You should explain the choices you have taken in each step in particular regarding the choice of extensions for each certificate.
    2- The certificateof the secure server you have selected. The question will not be validated if the file is not uploaded along with the TMA



    Part II (60 marks)

    In this part, you will generate the certificate hierarchy illustrated in Figure 2. A quick internet search can easily show the availability of several tools for creating and managing CAs (sometimes referred to as Public key infrastructure management tools). In this TMA, you will be using a simple CA tool named xCA[1] [1].
    In order to construct the CA hierarchy, the following steps needs to be followed:
    1- Generation of a self-signed certificate for the Root CA (HQ CA)
    2- Generation of a certificate for the CA of the AOU branch. This certificate is signed by the root CA certificate.
    3- Generation of a certificate for the the ITC department CA at the AOU branch. This certificate is signed by the CA of the AOU branch.
    4- Generation of a certificate for your self to be used by the SSL client in your browserfor financial transactions. This certificate is signed by the the the ITC department CA at your AOU branch.
    The generation of a certificate consists of the following steps:
    1- Generation of a key pair (public/private)
    2- Generation of certificate signing request (CSR) that includes all the necessary information about the certificate subject (the entity requesting the certificate) in addition to further information, in particular the requested certificate extensions.
    3- Signature of the certificate by the certification authority (or self-signature in the case of root CA)
    While doing the abovementioned steps, the following shall be taken into account:
    1. The public key algorithm is RSA
    2. The key sizes should be at least 4096 bits for the root CA, 2048 bits for the intermediate CA and 1024 for users.
    3. The information for each certificate shall be clear and significant; for instance, use appropriate common names for the certificate subject information (e.g., CA-HQ as a common name for the root CA)
    4. The extensions for each certificate shall be carefully selected for the certificate usage; certificate extensions might differ between root certification authority, intermediate certification authorities and user certificates.
    5. All the certificates shall be exported and saved in DER format with file extension (.crt)
    6. The naming for the certificate shall be done as follows:
    a. Root CA certificate: CA-AOU-ROOT-(StudentName)-(StudentID) where (StudentName) and (StudentID) needs to be replaced by your name and your ID
    b. AOU branch CA: CA-AOU-(BranchName)-(StudentName)-(StudentID) where (BranchName) should be replaced by the short name of the country of the AOU branch in which you are enrolled (KSA, LB, OM, KW, BH, EG, JO)
    c. AOU ITC department CA: CA-AOU-(BranchName)-ITC-(StudentName)-(StudentID)
    d. Your certificate: (StudentName)-(StudentID)


    [1]xCA user’s manual can be found at : http://xca.sourceforge.net
    التعديل الأخير تم بواسطة aou tma2016; الساعة 22-03-2016, 09:59 PM. سبب آخر: اضافه جمل

  • #2
    Part I (40 marks) Web servers often provide their users with secure access to the hosted web applications in order to gain more trust and protect the different transactions from potential attacks. Web servers use digital certificates for this purpose

    اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759068

    تعليق


    • #3
      Part II (60 marks) In this part, you will generate the certificate hierarchy illustrated in Figure 2. A quick internet search can easily show the availability of several tools for creating and managing CAs (sometimes referred to as Public key infrast

      whatsapp:00966554873382
      whatsapp:00966551597560
      اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759069

      تعليق


      • #4
        Part I (40 marks) Web servers often provide their users with secure access to the hosted web applications in order to gain more trust and protect the different transactions from potential attacks. Web servers use digital certificates for this purpose

        whatsapp:00966554873382
        whatsapp:00966551597560
        اضغط على الصورة لعرض أكبر. 

الإسم:	12884443_1152369934782128_39293382_n.jpg 
مشاهدات:	4 
الحجم:	15.8 كيلوبايت 
الهوية:	10759070

        تعليق


        • #5
          حلول واجب t216b

          اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759071

          Faculty of Computer Studies
          Course Code: T216B
          Course Title:Cisco Networking (CCNA) part B

          Tutor Marked Assignment


          Cut-Off Date:April 30, 2016 Total Marks: 100

          Contents
          Question 1 (13marks)……………..………………………………………..……… 2
          Question 2 (14marks)……………………..………………..……………………… 2
          Question 3 (67 marks)………………………..………………..…………………… 3
          Question 4(6 marks)……………………..………………..………………………17

          Plagiarism Warning:
          As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person's work in your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations.

          Declaration of No Plagiarism by Student (to be signed and submitted by student with TMA work):
          I hereby declare that this submitted TMA work is a result of my own efforts and I have not plagiarized any other person's work. I have provided all references of information that I have used and quoted in my TMA work.

          Name of Student:
          Signature:
          Date:
          Introduction

          This assignment has 4 questions.This assignment covers: all chapters of CCNA 3 “R&S Scaling networks”and Chapters 1 to 3 of CCNA 4 “R&S Connecting Networks. You should submit your completed assignment through the AOU's Learning Management System (AOULMS).
          Few important points about this assignment:
          • Write your name, your personal identifier and the assignment number at the top of every sheet.
          • You should submit the packet tracer file if required.
          • The weighting of this assignment is 20%.
          • The cut-off date is: April 30, 2016


          Question 1 (13 marks)
          The marks of this question are based on the scores you obtain in the Cisco Scaling networkschapters’ exam; these exams are found in the Cisco Academy website.

          There are 9 chapter exams for this question; all the exams have the same weight and are over 100. The tutor will download the grade of the exams from the Cisco website after the cut-off date.


          Note 1: The average score is over 13
          Note 2: Use This table is for your own information; you can use the following formula to calculate your own average score for this question:[∑tests/900]*13
          ∑tests = test1+ test2+…+test9

          Test 1 Test 2 Test 3 Test 4 Test 5 Test 6 Test 7 Test 8 Test 9 Average score
          over 13
          Question 2 (14 marks)
          The mark for this question is based on the score you obtain in the Cisco Scaling networksfinal exam.

          The tutor will download the grade of the exams from the Cisco website after the cut-off date

          Note: The average score is over 14
          Note2: Use the following formula to calculate your average score: [test/100]*14



          Question 3 (67 marks)

          This question allows you to demonstrate your ability to program a network of Cisco switches using packet tracer. The Packet tracer file for this question is T216BFA15TMA01Q3.pkt will be found on the AOULMS (Moodle).

          Configuration
          Configure your network as shown in figure 1 using (Command Line Interface) instructions. Your configuration should be complete as possible.

          Topology Diagram

          Learning Objectives

          To complete this question:
          · Configure Device Basic Settings
          · Configure LAN Redundancy and Link Aggregation
          · Configure EIGRP Dynamic Routing Protocol
          · Verify Network Connectivity and HSRP Configuration
          · Document the configuration

          Scenario
          This question tests your skills and knowledge that you learned in CCNA level 3. You are asked to configure the switches to support IPv4 connectivity and LAN redundancy. You will then an LCAP EtherChannel, verify connectivity and document the configuration.

          Addressing Table

          Device Interface IP Address Subnet Mask Default Gateway
          R1_xxxxxx G0/1 192.168.5.1 255.255.255.0 N/A
          S0/0/0 142.42.0.1 255.255.255.252 N/A
          Lo1 172.27.1.1 255.255.255.0 N/A
          Lo2 172.27.2.1 255.255.255.0 N/A
          Lo3 172.27.3.1 255.255.255.0 N/A
          R2_xxxxxx S0/0/0 142.42.0.2 255.255.255.252 N/A
          S0/0/1 142.42.0.5 255.255.255.252 N/A
          Lo0 209.165.200.225 255.255.255.248 N/A
          R3_xxxxxx G0/1 192.168.5.3 255.255.255.0 N/A
          S0/0/1 172.27.123.6 255.255.255.252 N/A
          Lo4 172.27.4.1 255.255.255.0 N/A
          Lo5 172.27.5.1 255.255.255.0 N/A
          Lo6 172.27.6.1 255.255.255.0 N/A
          S1_xxxxxx VLAN 1 192.168.5.11 255.255.255.0 192.168.5.2
          S2_xxxxxx VLAN 1 192.168.5.12 255.255.255.0 192.168.5.2
          S3_xxxxxx VLAN 1 192.168.5.13 255.255.255.0 192.168.5.2
          PC-A NIC 192.168.5.21 255.255.255.0 192.168.5.2
          PC-B NIC 192.168.5.22 255.255.255.0 192.168.5.2
          PC-C NIC 192.168.5.23 255.255.255.0 192.168.5.2
          Table A

          Note: XXXXXX is your ID (6 digits)
          Note2: the interfaces of the PCs and the servers are already configured.
          Part 1. Configure Device basic setting. (12 marks)
          Configure routers and switches according to the following guidelines:
          · Configure the hostname* (the hostname of the switch should be as follow R1_XXXXXX for
          router R1 where XXXXXX is your AOU short ID)
          · Disable DNS lookup.
          · Configure an encrypted privileged EXEC password. "A216B_XXXXXX”
          · Configure a valid* message-of-the-day banner for example: “Only authorized personnel are allowed to access the device” or “This is a secure system. Authorized Access only” or “Legal action will be pursued for any unauthorized use”.
          · Configure a password for console connections. “salking@
          · Configure synchronous logging.
          · Configure a password for auxiliary connections. “he7lo
          · Configure a password for vty connections. “partible#

          * the router or switches should include your ID, for example: for Switch1: S1_120567; for Router1 R1_120567

          List in the beneath tables the commands you used for each devices (routers and switches).

          The commands should include the command prompt as seen on the router for example:
          · S1_123456(config-if)#ip address 192.168.0.2 255.255.255.0 (this is correct)
          · ip address 192.168.0.2 255.255.255.0 (this is incorrect)

          Step 1: Configure Router R1.(2 marks)
          Router R1
          Tasks Command(s)
          Configure the hostname* (as mentioned in table A)
          Disable DNS lookup.
          Secure the privileged EXEC access using the following password “A216B_XXXXXX
          Configure a valid* message-of-the-day banner
          Configure a password for console connections. “salking@
          Configure synchronous logging
          Configure a password for auxiliary connections. “he7lo
          Configure a password for vty connections. “partible#
          Note: Save the running configuration to the startup configurationusing the following command:
          “copy running-configstartup-config”


          Step 2: Configure Router R2.(2 marks)
          Router R2
          Tasks Command(s)
          Configure the hostname* (as mentioned in table A)
          Disable DNS lookup.
          Secure the privileged EXEC access using the following password “A216B_XXXXXX
          Configure a valid* message-of-the-day banner
          Configure a password for console connections. “salking@
          Configure synchronous logging
          Configure a password for auxiliary connections. “he7lo
          Configure a password for vty connections. “partible#
          Note: Save the running configuration to the startup configurationusing the following command:
          “copy running-configstartup-config”



          Step 3: Configure Router R3.(2 marks)

          Router R3
          Tasks Command(s)
          Configure the hostname* (as mentioned in table A)
          Disable DNS lookup.
          Secure the privileged EXEC access using the following password “A216B_XXXXXX
          Configure a valid* message-of-the-day banner
          Configure a password for console connections. “salking@
          Configure synchronous logging
          Configure a password for auxiliary connections. “he7lo
          Configure a password for vty connections. “partible#
          Note: Save the running configuration to the startup configurationusing the following command:
          “copy running-configstartup-config”





          Step 4: Configure Switch S1.(2 marks)
          Switch S1
          Tasks Command(s)
          Configure the hostname* (as mentioned in table A)
          Disable DNS lookup.
          Configure a secure the privileged EXEC access using the following password “A216B_xxxxxx
          Configure a valid* message-of-the-day banner
          Configure a password for console connections. “salking@
          Configure synchronous logging
          Configure a password for vty connections. “partible#
          Encrypt password display
          Note: Save the running configuration to the startup configurationusing the following command:
          “copy running-configstartup-config”




          Step 5: Configure Switch S2.(2 marks)
          Switch S2
          Tasks Command(s)
          Configure the hostname* (as mentioned in table A)
          Disable DNS lookup.
          Configure a secure the privileged EXEC access using the following password “A216B_xxxxxx
          Configure a valid* message-of-the-day banner
          Configure a password for console connections. “salking@
          Configure synchronous logging
          Configure a password for vty connections. “partible#
          Encrypt password display
          Note: Save the running configuration to the startup configurationusing the following command:
          “copy running-configstartup-config”



          Step 6: Configure Switch S3.(2 marks)
          Switch S3
          Tasks Command(s)
          Configure the hostname* (as mentioned in table A)
          Disable DNS lookup.
          Configure a secure the privileged EXEC access using the following password “A216B_xxxxxx
          Configure a valid* message-of-the-day banner
          Configure a password for console connections. “salking@
          Configure synchronous logging
          Configure a password for vty connections. “partible#
          Encrypt password display
          Note: Save the running configuration to the startup configurationusing the following command:
          “copy running-configstartup-config”


          Part 2. Devices Interface configuration (15marks)
          List in the beneath tables the commands you used for each router

          Step 1. Configure R1 interfaces (3.25 marks)
          Router R1
          Configuration Item or Task Specification Command(s)
          Interface G0/1 · Set the description
          · Set the Layer 3 IPv4 address. Refer to Table A for IPv4 address information.
          · Activate interface
          Interface S0/0/0 · Set the description
          · Set the Layer 3 IPv4 address. Refer to Table A for IPv4 address information.
          · Set a clocking rate of 800000.
          · Activate interface
          Interface Lo1 Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information.
          Interface Lo2 Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information.
          Interface Lo3 Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information.


          Step 2. Configure R2 interfaces (2.75 marks)
          Router R2
          Configuration Item or Task Specification Command(s)
          Interface S0/0/0 · Set the description
          · Set the Layer 3 IPv4 address. Refer to Table A for IPv4 address information.
          · Activate interface
          Interface S0/0/1 · Set the description
          · Set the Layer 3 IPv4 address. Refer to Table A for IPv4 address information.
          · Set a clocking rate of 800000.
          · Activate interface
          Interface Lo0 (Simulated Internet connection) Set the description.
          Set the Layer 3 IPv4 address to 209.165.200.225/29.
          Default route Configure a default route out Lo0.


          Step 3. Configure R3 interfaces (3 marks)
          Router R3
          Configuration Item or Task Specification Command(s)
          Interface G0/1 · Set the description
          · Set the Layer 3 IPv4 address. Refer to Table A for IPv4 address information.
          · Activate interface
          Interface S0/0/1 · Set the description
          · Set the Layer 3 IPv4 address. Refer to Table A for IPv4 address information.
          · Activate interface
          Interface Lo4 Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information.
          Interface Lo5 Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information.
          Interface Lo6 Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information.



          Step 4. Configure S1 virtual interface(2 marks)
          Switch S1
          Configuration Item or Task Specification Command(s)
          Assign an IPv4 address to the default SVI Refer to table A for IPv4 address information.
          Use VLAN1 as a virtual interface
          Assign the default-gateway. Refer to table A
          Force trunking on all interfaces connected to S2 and S3. Use VLAN 1 as the native VLAN.
          Note: you can use the "interface range" command to avoid repetition
          Disable the Dynamic Trunking Protocol (DTP) on all other ports. (ports should be in access mode) Make sure ports are configured as access ports.
          Note: you can use the "interface range" command to avoid repetition
          Shutdown all unused ports. Make sure that all unused ports are shut down.
          Note: you can use the "interface range" command to avoid repetition

          Step 5. Configure S2 virtual interface(2 marks)
          Switch S2
          Configuration Item or Task Specification Command(s)
          Assign an IPv4 address to the default SVI Refer to table A for IPv4 address information.
          Use VLAN1 as a virtual interface
          Assign the default-gateway. Refer to table A
          Force trunking on all interfaces connected to S1 and S3. Use VLAN 1 as the native VLAN.
          Note: you can use the "interface range" command to avoid repetition
          Disable the Dynamic Trunking Protocol (DTP) on all other ports. (ports should be in access mode) Make sure ports are configured as access ports.
          Note: you can use the "interface range" command to avoid repetition
          Shutdown all unused ports. Make sure that all unused ports are shut down.
          Note: you can use the "interface range" command to avoid repetition


          Step 6. Configure S3 virtual interface (2 marks)
          Switch S3
          Configuration Item or Task Specification Command(s)
          Assign an IPv4 address to the default SVI Refer to table A for IPv4 address information.
          Use VLAN1 as a virtual interface
          Assign the default-gateway. Refer to table A
          Force trunking on all interfaces connected to S1 and S2. Use VLAN 1 as the native VLAN.
          Note: you can use the "interface range" command to avoid repetition
          Disable the Dynamic Trunking Protocol (DTP) on all other ports. (ports should be in access mode) Make sure ports are configured as access ports.
          Note: you can use the "interface range" command to avoid repetition
          Shutdown all unused ports. Make sure that all unused ports are shut down.
          Note: you can use the "interface range" command to avoid repetition



          Part 3. Configure IPv4 addresses on PCsand connectivity verification (4 marks)

          You should use the following command in the command prompt section to configure the Ethernet interfaces of the PCs and laptops:

          Ipconfigip_addresssubnet_maskdefault_gateway_address

          Example: ipconfig192.168.10.10 255.255.255.0 192.168.10.1

          Include the print screen of the configuration for each PC and the result of the ping (1/2 mark per print screen)




          · Configure IPV4 addresses on PCs and connectivity verification
          Configuration Item or Task Specification
          Configure static IPv4 address information on PC-A. Refer to table A for IPv4 address information.
          From PC-A ping the router R1 interface g0/1. Refer to table A for IPv4 address information
          Configure static IPv4 address information on PC-B Refer to table A for IPv4 address information.
          From PC-B ping the switch S1 virtual interface. Refer to table A for IPv4 address information.
          From PC-B ping the switch S2 virtual interface. Refer to table A for IPv4 address information.
          Configure static IPv4 address information on PC-C Refer to table A for IPv4 address information.
          From PC-C ping the router R3 interface g0/1. Refer to table A for IPv4 address information.
          From PC-C ping the switch S3 virtual interface. Refer to table A for IPv4 address information.

          Part 4. Configure LAN Redundancy and Link Aggregation (14 marks)
          Step 1. Configure Spanning tree on S1 (3 marks)
          Switch S1
          Configuration Item or Task Specification Commands
          Configure Rapid PVST+. cf chapter 2, CCNA3
          Configure as secondary root bridge for VLAN 1. cf chapter 2, CCNA3
          Configure PortFast and BPDU Guard on the interface connected to PC-A. cf chapter 2, CCNA3


          Step 2. Configure Spanning tree on S2 (2 marks)

          Switch S2
          Configuration Item or Task Specification Commands
          Configure Rapid PVST+. cf chapter 2, CCNA3
          Configure PortFast and BPDU Guard on the interface connected to PC-B. cf chapter 2, CCNA3




          Step 3. Configure Spanning tree on S3 (3 marks)
          Switch S3
          Configuration Item or Task Specification Commands
          Configure Rapid PVST+. cf chapter 2, CCNA3
          Configure as primary root bridge for VLAN 1. cf chapter 2, CCNA3
          Configure PortFast and BPDU Guard on the interface connected to PC-C. cf chapter 2, CCNA3


          Step 4. Configure HSRP on R1(3 marks)
          Router R1
          Configuration Item or Task Specification Commands
          Configure the HSRP virtual IP address on interface G0/1. Group: 1
          Virtual IP address:192.168.5.2
          cf chapter 2.4.3.3, CCNA3
          Make this the primary HSRP router. cf chapter 2.4.3.3, CCNA3
          Configure so this router becomes the primary HSRP router on a reboot. cf chapter 2.4.3.3, CCNA3


          Step 5. Configure HSRP on R3 (1 mark)
          Router R3
          Configuration Item or Task Specification Commands
          Configure the HSRP virtual IP address on interface G0/1. Group: 1
          Virtual IP address: 192.168.5.2
          cf chapter 2.4.3.3, CCNA3




          Step 6. Configure an LACP EtherChannel between S1 and S3 (2 marks)
          Configuration Item or Task Specification Commands
          On S1, configure an LACP EtherChannel on interfaces connected to S3. Use group 1 and enable LACP unconditionally.
          cf. chapter 3, CCNA3
          On S3, configure an LACP EtherChannel on interfaces connected to S1. Use group 1 and enable LACP only if a LACP device is detected.
          cf. chapter 3, CCNA3


          Part 5. Configure EIGRP Dynamic Routing Protocol (14.5 marks)

          Step 1. Configure EIGRP on R1 (5.5 marks)
          Router R1
          Configuration Item or Task Specification Commands
          EIGRP Process ID 20
          Advertise directly connected networks. Use classless network addresses.
          Set all LAN and Loopback interfaces as passive.
          Set the bandwidth on S0/0/0. 800 Kb/s


          Step 2. Configure EIGRP on R2 (3.5 marks)
          Router R2
          Configuration Item or Task Specification Commands
          EIGRP Process ID 20
          Advertise directly connected networks. Use classless network addresses.
          All connected networks should be assigned to Area 0 except the Lo0 network.
          Set the bandwidth on all serial interfaces. 800 Kb/s



          Step 3. Configure EIGRP on R3 (5.5marks)
          Router R3
          Configuration Item or Task Specification Commands
          EIGRP Process ID 20
          Advertise directly connected networks. Use classless network addresses
          Assign S0/0/1 and G0/1 interfaces to Area 0
          Assign Loopback interfaces to Area 3
          Set all LAN interfaces as passive.
          Set the serial interface bandwidth. 128 Kb/s


          Part 6. Verify Network connectivity and HSRP configuration (3marks)

          Step 1. Verify end to end connectivity (1.5marks)
          From Command To Expected Results
          PC-A ping Default Gateway Ping should be successful.
          PC-A ping 209.165.200.225 Ping should be successful.
          PC-A tracert 209.165.200.225 Trace should route through R1.

          Step 2. Verify HSRP is working as expected (1.5marks)
          Issue the shutdown command on R1 G0/1, and issue the following commands to verify that HSRP is working as expected:

          From Command To Expected Results
          PC-B ping Default Gateway Ping should be successful.
          PC-B ping 209.165.200.225 Ping should be successful.
          PC-B tracert 209.165.200.225 Trace should route through R1.





          Part 7. Documenting Device configuration (4.5 marks)

          Step 1. Router R1 (0.75 marks)
          Include router 1 configuration

          Step 2. Router R2 (0.75 marks)
          Include router 2 configuration

          Step 3. Router R3 (0.75 marks)
          Include router 3 configuration

          Step 4. Switch S1 (0.75 marks)
          Include switch 1 configuration

          Step 5. Switch S2 (0.75 marks)
          Include switch 2 configuration

          Step 6. Switch S3 (0.75 marks)
          Include switch 3 configuration


          Important notes

          · You need to document each task or subtask by mentioning the commands used
          · The Packet Tracer file should be returned with your answer.
          · The packet tracer “configuration function” has been disabled so you will have to configure the routers through the CLI as if you were accessing them via the console interface or via telnet.



          Question 4 (6 marks)
          The marks of this question are based on the scores you obtain in the Cisco Accessing the WAN chapters 1 to 3; these exams are found in the Cisco Academy website.

          There are 3 chapter exams for this question; all the exams have the same weight and are over 100. The tutor will download the grade of the exams from the Cisco website after the cut-off date.

          Note 1: The average score is over 9
          Note 2: table is for your own information; you can use the following formula to calculate your own average score for this question: [∑tests/300]*6
          ∑tests = test1+ test2+test3


          Test 1 Test 2 Test 3 Average score
          over 6

          End of Question

          تعليق


          • #6
            Question 1 (13 marks) The marks of this question are based on the scores you obtain in the Cisco Scaling networkschapters’ exam; these exams are found in the Cisco Academy website. There are 9 chapter exams for this question; all the exams have the

            اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759072

            تعليق


            • #7
              Question 2 (14 marks) The mark for this question is based on the score you obtain in the Cisco Scaling networksfinal exam. The tutor will download the grade of the exams from the Cisco website after the cut-off date Note: The average score is over

              اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759073

              تعليق


              • #8
                Question 3 (67 marks) This question allows you to demonstrate your ability to program a network of Cisco switches using packet tracer. The Packet tracer file for this question is T216BFA15TMA01Q3.pkt will be found on the AOULMS (Moodle). Configur

                اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759074

                تعليق


                • #9
                  Question 4 (6 marks) The marks of this question are based on the scores you obtain in the Cisco Accessing the WAN chapters 1 to 3; these exams are found in the Cisco Academy website. There are 3 chapter exams for this question; all the exams have th

                  اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759075

                  تعليق


                  • #10
                    حلول واجب tu170

                    TU170
                    Tutor-marked Assignment – Spring 2015-2016
                    Cut-off date: April 25, 2016
                    Total marks: 40
                    Submitting your work
                    This TMA should be submitted to your tutor electronically through the LMS system before the
                    cut-off date indicated above. Please note that it is your responsibility to ensure that your work is
                    submitted in the correct format. Anything submitted after the midnight deadline will not count
                    for assessment purposes.
                    The TMA is marked out of 20, for the continuous assessment grade.
                    It consists of 4 questions. The total marks for each question are shown at the beginning of each
                    question. The marks allocated to each part of a question are indicated in the margin.
                    Plagiarism Warning:
                    As per AOU rules and regulations, all students are required to submit their own TMA work and
                    avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection.
                    You must provide all references in case you use and quote another person's work in your TMA.
                    You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
                    Important note: Before you start working with this assignment, you need to refer to the
                    plagiarism tutorial posted in LMS.
                    By submitting the TMA through the LMS system, you are declaring that this submitted TMA work
                    is a result of your own efforts and you have not plagiarized any other person's work.
                    Arab Open University
                    Faculty of Computer Studies
                    TU170 Computing Essentials
                    Page 2 / 4
                    Part 1 [10 marks]
                    Use the common forum in LMS, in TU170 page, to initiate a discussion and to share your ideas with your classmates about one of the following topics:
                    Social Network risks·
                    Internet history·
                    Blended Learning·
                    You should provide screenshots (NOT copy and paste) of all the thread messages in your solution for this part. The thread must contain at least ten messages; five of them should be yours.
                    Part 2 [8 marks]
                    1. What are the three categories of operating systems? Give an example of each. [4 marks]
                    2. What are Wikis, and how they can enhance the process of working in groups? [4 marks]
                    For each question you must use your own words, within the range of 80-120 word count.
                    Part 3 [6 marks]
                    In your LMS use the e-library, or search engines, to search about privacy or email spams.
                    For this part you are required to:
                    Copy at least two paragraph from any source selected. [1 mark]-
                    Provide the reference of your source. It must be a link directing the user to the source. [1 mark]-
                    Provide two screenshots of:-
                    List of hits (the result that contains the keyword). [2 mark]·
                    The source you have selected. [2 mark]·
                    Page 3 / 4
                    Part 4 [8 marks]
                    1. Use MS Excel and the values in figure 1 to create two charts:
                    - A column chart representing the number of mobile phone users against each country.
                    - A line graph representing the number of smartphone users against each country.
                    For this part, you need to provide ONLY screenshots of the two charts. You may refer to Lab2 tutorials to provide informative charts. [4 marks]
                    Figure 1: Number of mobile phones and smartphones users in 2013.
                    2. Open your email (if you don’t have an email account, you can create a new one using one of the webmail providers such as Hotmail, Yahoo or Gmail). Send an email to your tutor’s email address describing what are the computer essentials, knowledge, skills that you gained from studying the course TU170. You should use your own words.
                    For this question, you should provide one screenshot of the email sent to your tutor. [4 marks]
                    Notes:
                    Sending an email to your tutor without providing a screenshot will not be counted when marking this question.·
                    You should use your email account to send the email.·
                    Minimum word count required for this part is 80.·
                    TMA presentation [8 marks]
                    The TMA word document must satisfy the following:
                    Header contains student’s name and id-
                    Page 4 / 4
                    Page numbering-
                    Page borders-
                    No grammar and spelling mistakes-
                    How to submit the TMA
                    Submit ONLY one word file contains your full solution for this TMA·
                    اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759076

                    تعليق


                    • #11
                      Part 1 [10 marks] Use the common forum in LMS, in TU170 page, to initiate a discussion and to share your ideas with your classmates about one of the following topics: Social Network risks• Internet history• Blended Learning• You should provide scr

                      اضغط على الصورة لعرض أكبر. 

الإسم:	12596327_1153391381346650_1244219067_n.jpg 
مشاهدات:	9 
الحجم:	16.7 كيلوبايت 
الهوية:	10759077

                      تعليق


                      • #12
                        Part 2 [8 marks] 1. What are the three categories of operating systems? Give an example of each. [4 marks] 2. What are Wikis, and how they can enhance the process of working in groups? [4 marks] For each question you must use your own words, within t

                        اضغط على الصورة لعرض أكبر. 

الإسم:	12884443_1152369934782128_39293382_n.jpg 
مشاهدات:	4 
الحجم:	15.8 كيلوبايت 
الهوية:	10759078

                        تعليق


                        • #13
                          Part 3 [6 marks] In your LMS use the e-library, or search engines, to search about privacy or email spams. For this part you are required to: Copy at least two paragraph from any source selected. [1 mark] Provide the reference of your sourc

                          اضغط على الصورة لعرض أكبر. 

الإسم:	12884443_1152369934782128_39293382_n.jpg 
مشاهدات:	4 
الحجم:	15.8 كيلوبايت 
الهوية:	10759079

                          تعليق


                          • #14
                            Part 4 [8 marks] 1. Use MS Excel and the values in figure 1 to create two charts: - A column chart representing the number of mobile phone users against each country. - A line graph representing the number of smartphone users against each country. Fo

                            اضغط على الصورة لعرض أكبر. 

الإسم:	12884443_1152369934782128_39293382_n.jpg 
مشاهدات:	4 
الحجم:	15.8 كيلوبايت 
الهوية:	10759080

                            تعليق


                            • #15
                              وين الحل

                              تعليق

                              يعمل...
                              X