PROJECT OVERVIEW - Fort Hays State University

advertisement
Tiger Net Challenge
Computer Networking Competition Project
CAPSTONE 2013
FINAL PROJECT
SUBMITTED BY:
Yusuf Hashem
Brittany Kaup
Abdulrhman Almutiry
Ali Asire
TABLE OF CONTENTS
PROJECT OVERVIEW................................................................
3
TROUBLESHOOTING SEGMENT.................................................3-14
Part one (novice):
Troubleshooting part one (novice)
Damaging the network
Part two (intermediate)
Troubleshooting part two (intermediate)
Damaging the network
Part three (advanced)
Troubleshooting part three (advanced)
Damaging the network
DESIGN A NETWORK SEGMENT……………………………………………15
WEBSITE...................................................................................
17
PRIZES.............................................................................. 17
LEARNING EXPERIENCES......................................................... 18
PROJECT OVERVIEW
TigerNet Challenge is a team of Information Networking and Telecommunications (INT) seniors
that are currently enrolled at Fort Hays State University. The team consisted of Yusuf Hashem,
Brittany Kaup, Abdulrhman Almutiry, Ali Asire, and Abulelah Alawdan. In January 2013, the
team was assigned to put together a networking challenge that would have participants test their
skill sets when it came to computer networking, as part of the team’s capstone project. In fact,
the challenge tests participants not only in their computer networking skills, but also their project
management, decision making, and budgeting skills. The team’s goal was to come up with a two
computer networks that was designed in Packet Tracer. Packet Tracer is a Cisco program that
simulates computer networks in order to train and educate potential IT majors and employees.
The TigerNet Challenege was announced to 14 different states by our sponsor, Kevin Shaffer.
The team put together two different computer networking segments. The first segment consisted
of a troubleshooting module, and the second segment consisted of design a network module.
The troubleshooting segment of the TigerNet Challenge consisted of a small network built in
Packet Tracer. It was designed with three different difficulty levels. The levels are Novice,
Intermediate, and Advanced. A written scenario was put together in a Microsoft Word document
in order to explain the segment. The troubleshooting part had participants go through a number
of issues that was created by the team in the Packet Tracer. The participants should have a
minimum to intermediate knowledge of computer networking skills in order to have completed
this segment.
In addition to the troubleshooting segment, the create a network segment was included into the
challenge. This segment was designed in a way to give competitors an idea of how a real life
company would expand their network. The network design segment had the team come up with
a scenario that included a fake company that wanted to expand their computer network in
according to their requirements. This means that competitors had the freedom to expand the
network in any way they saw fit as long as they followed the rules put by the team. The rules
were presented to the competitors in a Microsoft Word document. The document explained the
requirements that the company sought after in an expansion for their network.
TROUBLESHOOTING SEGMENT
The troubleshooting network was put together mainly by Abdulrhman Almutiry. The team met
with Professor Kevin Shaffer to go over the architecture of the network that would later on be
used for the challenge. We have come to an agreement to design it in a way that it would
incorporate three different levels of difficulties. Each difficulty would incorporate different
computer networking concepts that contenders must solve. The three levels are novice,
intermediate, and advanced. The instructions were written in a Microsoft Word document and
distributed through our website (http://www.dzblaster.com/). The contenders would download
the instructions along with the trouble shooting segment built in Packet Tracer versions 5.3.3.
The instructions were written as a scenario in a help desk for PC troubleshooting. The idea was
that a group of amateur networkers were hired in order to put together a computer network for a
company. They did a very poor job and it is the job of the participant to correct the mistakes that
was done by these amateurs.
Part one (novice):
In this part of the troubleshooting segment, the network was composed of a 2620XM router
(router 1) that was cabled to a 2950-24 switch with a straight through cable on interface Fa0/0
with an IP address of 192.168.0.1/24. The switch was then cabled with a straight through cable
to the three PCs. Each PC had the following information:
Hosts
IP address
Subnet Mask
Default Gateway
PC 10
192.168.1.3
255.255.255.0
192.168.1.2
PC 11
192.168.1.4
255.255.255.0
192.168.1.2
PC 12
192.168.1.5
255.255.255.0
192.168.1.2
Troubleshooting part one (novice):
After putting the novice network together, we decided to damage the network and make it unable
to communicate with each other or any other device on the network. This part of the challenge
had the participants fix the following issues on the network with accordance to the TigerNet
Challenge’s scenario. This is an example taken from the troubleshooting segment explanation
file.
The Company has reported the following:

The hosts on the network are unable to ping each other.

The hosts are unable to ping the default gateway.

Fix the issue so that these hosts are able to ping each other and the router.

There seems to be a password on router 1, console and enable, figure it out and mention it
in your written report.
Damaging the network:
The TigerNet Challenge team has performed the following in order to damage the network so
that the participants may troubleshoot the network.

The router was secure with a password that can be answered through reading the banner
of the day message.
o
Q. So you want to access the router do you know the port number for HTTP. If
you know that, for privileged EXEC Mode, you should know the HTTPS port
number?

Answer 80 for EXEC mode access.

Answer 443 for Privileged EXEC Mode access.

The interface Fa0/0 from router to switch was shut down and the cable was exchanged
with a crossover cable.

The cables from the switch to the three PCs were all exchanged with cross over cables.

On PC 10, the subnet mask was exchanged with a 255.255.255.252, and the default gate
way was exchanged with 192.168.1.1.

On PC 11, the subnet mask was exchanged with a 255.255.255.252, and the default gate
way was exchanged with 192.168.1.9.

On PC 12, the subnet mask was exchanged with a 255.255.255.252, and the default gate
way was exchanged with 192.168.1.4.
The team used a 255.255.255.252 subnet mask that only accommodates two useable IP
address on a network. The competitors needed to subnet the addresses successfully in order
to find out the right subnet address for the hosts. The default gateway address can be found
on the router that is connected to the switch.
The participants must put the network back together in order for the hosts to ping the router.
Also, they must write a detailed report of any change they have conducted on this part of the
troubleshooting network.
Part two (intermediate):
In this part of the troubleshooting segment, the network was composed of a 2811 router (router6)
that was cabled to a 2950T-24 (switch4) switch with a straight through cable on interface Fa0/0
with an IP address of 192.168.10.1/28. The switch was then cabled with a cross-over cable to
another 2950T-24 switch (Switch3). Switch4 is connected to 4 PCs using a straight through
cable. Switch3 is connected to 3 PCs using a straight through cable as well. VLAN 10 and 15
were created in both switches. VLAN Trunking Protocol (VTP) was implemented in both
switches to share the VLAN database between switches. Lastly, we placed a 2620XM router
(router2) to connect the Intermediate network to the global network on Serial 1\2. For this to
happen, RIPv2 was used in both router6 and router2 to fully connect the Intermediate LAN to the
global network.
To make the two VLANs work, we had to configure router6 and the switches with proper
configuration. First, in order to make the two VLANs able to ping each other, we had to use
InterVLAN (Router-on-A-Stick) concept. Therefore, we created sub-interfaces on router6 Fa0/0
interface to serve as the VLANs gateway. Second, we configured router6 to be the DHCP server
for both VLANs. Third, we changed the encapsulation protocol for the trunk link between
router6 and Switch4 to be dot1q. For InterVLAN to work properly, links between switch and
router or switch must be trunk link. Therefore on Switch4 and Switch3, we set the links in
between to be Trunk and member of the Native VLAN (VLAN 1). Also, we created VLAN 10
and assigned Fa0/3 - Fa0/5 interfaces to it, while Fa0/2 was assigned to be member of VLAN 15.
Further, we established VTP protocol on Switch4 and made it the server for the VTP domain to
share the VLAN information with Switch3. On Switch3, we assigned Fa0/2 - Fa0/3 interfaces to
be member of VLAN 15, while Fa0/1 was assigned to be member of VLAN 10. Also, VTP was
established for Switch3 in a client mode to receive VLAN information from the VTP server
(Switch4). For addressing purpose, we set Router6 to be the DHCP server to allocate IP
addresses for every PC in the network.
Each PC had the following information:
Hosts
VLAN
IP address
Subnet Mask
Default
Gateway
PC 1
10
192.168.10.x*
255.255.255.240
192.168.10.1
PC 2
15
192.168.15.x
255.255.255.240
192.168.15.1
PC 3
15
192.168.15.x
255.255.255.240
192.168.15.1
PC 0
15
192.168.15.x
255.255.255.240
192.168.15.1
PC 7
10
192.168.10.x
255.255.255.240
192.168.10.1
PC 8
10
192.168.10.x
255.255.255.240
192.168.10.1
PC 9
10
192.168.10.x
255.255.255.240
192.168.10.1
* IP addresses were dynamically assigned by the DHCP server.
Troubleshooting part two (intermediate):
After putting the intermediate network together, we decided to damage the network and make
VLANs unable to communicate with each other. This part of the challenge had the participants
fix the following issues on the network with accordance to the TigerNet Challenge’s scenario.
This is an example taken from the troubleshooting segment’s explanation file.
The Company has reported the following:

HELP DESK needs the two VLANs, 10 and 15, to be able to ping each other. The
amateur group has setup the VLANs on the switches, however, VLANs weren’t able to
ping each other. Actually, PCs on the same VLAN but different switches are not able to
ping each other too!

PCs in both VLANs were setup using static IPs. Please setup router6 to be the DHCP
server to provide the network addressing dynamically.

While using DHCP, Please reserve the first usable IP in the subnet for the gateway
interface.

Use the most practical routing protocol on router 2 and router6 so the intermediate
network is fully connected to router 2.

Fix the issue so that these hosts are able to ping each other and both router 2 and 6.
Damaging the network:
The TigerNet Challenge team has performed the following in order to damage the network so
that the participants may troubleshoot the network.

The router2 was secure with a password that can be answered through reading the banner
of the day message.
o
Q. So you wanna access the router ;) do you know the port number for FTP. if
you know that, for privileged EXEC Mode, u should know TELNET port number

Answer 21 for EXEC mode access.

Answer 23 for Privileged EXEC Mode access.

The interface Fa0/0 from router6 to switch was changed to be encapsulated with ARPA
protocol instead of dot1q encapsulation.

The sub-interfaces were replaced with one main interface.

Fa0/0 on router6 was assigned with 192.168.10.1 IP address.

Fa0/1 on Switch4 that is going to router6 was assigned to VLAN 10 and set to be access
port.

Fa0/6 on Switch4 that is going to Switch3 was set to be access port.

Fa0/4 on Switch3 that is going to Switch4 was set to be access port.

PCs were assigned addresses statically instead of using router6 as the DHCP server.

All PCs were assigned 192.168.10.1 as their defult gateway address.

RIPv2 was removed from router2 and replaced with RIPv1 with no other routing
information.

RIPv2 was removed from router6 completely.
The participants must put the network back together in order for the hosts in different
VLANs to ping each other and both router2 and router6. Also, they must write a detailed
report of any change they have conducted on this part of the troubleshooting network.
Part three (advanced):
In this part of the troubleshooting segment, the team decided to implement a DSL connection in
Packet Tracer. We decided that this would be a great idea, because we wanted to give
participants a more visual feeling of accomplishment. When working with routers and switches,
the idea is to get all hosts connected and communicating with each other. What we did with the
DSL connection, was to add a host (PC) that wanted to open a website on its web browser. The
site that we decided to go with was a fake https://www.google.com/ put together on a DNS
server in Packet Tracer. If the participants were able to fully troubleshoot the advanced network,
they had to go into the host PC, open the web browser, and type in https://www.google.com/. If
they succeed, they will see a small HTTP page pop up.
The network was composed of a 1841 (router 3) router that was cabled to a 2950-24 switch with
a straight through cable on interface Fa0/1 with an IP address of 192.168.1.254/24. The switch
was then cabled with a straight through cable to another router that acted as an ISP (internet
service provider) from the switch’s Fa0/2 interface to the ISP’s Fa0/1 with an IP address of
192.168.1.1/30. The ISP router was then cabled to a server (Server 0) with a straight through
cable on interface Fa1/0. We decided to use a Vlan 10 on interface Fa1/0 with an IP address of
10.10.10.1/24 to confuse the participants. The team decided to add a password on the ISP router
to give participants a sense of security when it comes to accessing routers of this importance to a
network. on the ISP router, the team added the following commands to insure a connection to
the server and the Cloud:



on the ISP router:
o
ip dhcp excluded-address 1.1.1.1
o
ip dhcp pool Internet_Users.
o
network 1.1.1.0 255.255.255.0
o
default-router 1.1.1.1
o
dns-server 10.10.10.2
Interface FastEthernet0/0:
o
ip address 1.1.1.1 255.255.255.0
o
duplex auto.
o
speed auto.
o
ipv6 ospf cost 1.
o
no cdp enable.
Interface FastEthernet0/1:
o
ip address 192.168.1.1 255.255.255.252
o
duplex auto.
o
speed auto.


Interface FastEthernet1/0:
o
switchport access vlan 10
o
switchport mode access
o
spanning-tree portfast
Interface Vlan10:
o

IP address 10.10.10.1 255.255.255.0
Passwords:
o
line con 0

password 01100001
We then decided to add a Cloud (Cloud 0) to the ISP’s router through Fa0/0 with an IP address
of 1.1.1.1/24 while using a straight through cable between the ISP and the Cloud. the cloud
used will emulate the internet in packet tracer in order to have the participants reach the fake
Google website. from the Cloud, the team has connected two DSL Modems. The Cloud has the
modems cabled with a standard copper phone cable connected to the Cloud’s modem interfaces.
Modem 4, is then connected to a 1841 router (Home router) with a straight through cable on
interface Fa0/0 with an IP address of 1.1.1.2/24. The Home router is then connected to a host
(PC 13) through the Home router’s Fa0/0/0 interface with a Vlan 20 and IP address of
192.168.0.1/24. The team added the following commands on the Home router to insure an
internet connection to the Cloud:


On the Home Router:
o
IP dhcp excluded-address 192.168.0.1
o
IP dhcp pool users
o
network 192.168.0.0 255.255.255.0
o
default-router 192.168.0.1
o
dns-server 10.10.10.2
Interface FastEthernet0/0:
o
ip address dhcp
o
ip nat outside
o
duplex auto
o
speed auto

o
ip nat inside source list 1 interface FastEthernet0/0 overload
o
access-list 1 permit 192.168.0.0 0.0.0.255
interface Vlan20
o
ip address 192.168.0.1 255.255.255.0
o
ip nat inside
The host (PC 13) will pull a DHCP address from the the Home router in order to add more hosts
to the network. This emulates a real life connection to the internet when people constantly add
new devices and their devices are given IP addresses through DHCP from their ISP provider.
Troubleshooting part three (advanced):
After putting the advanced network together, we decided to damage the network and make it
unable to communicate with each other or any other device on the network. We also made sure
that the participants were not able to browse the fake Google website that was served on the
DNS server (10.10.10.2). This part of the challenge had the participants fix the following issues
on the network with accordance to the TigerNet Challenge’s scenario. This is an example taken
from the troubleshooting segment’s explanation file:
The Company has reported the following:

The amateurs have constructed a failed DSL connection. Your job is to re connect these
devices and make them working again.

The amateurs have put passwords on the routers, they were nice enough to leave hints in
the message of the day of the router.

The routers should be the DHCP server.

There seems to be issues with the vlan 10 between the router and the server.

The ISP router is not able to connect the internet between Server0 and the Cloud0.

ISP router should be a DHCP server with a DHCP pool called Internet_Users.

There also seems to be trouble with the server, the web page is not being served to the
clients.

The home_rtr needs a DHCP pool known as Users

You will also need to expand the network through modem 5 with one router and a host.
The router should be similar to the home_rtr.

Your goal is to make the PCs extract DHCP from the routers and open the website
www.google.com from the host PCs.
Damaging the network:
The TigerNet Challenge team has performed the following in order to damage the network so
that the participants may troubleshoot the network:
First Step:

The ISP router was secure with a password that can be answered through reading the
banner of the day message.
o
Q. So, you want to access the route? You will need to know the binary number
that represents a lower case letter a:


Answer 01100001 for EXEC mode access.
ISP Router to Server0 through interface Fa1/0:
o
ISP(config)#int fa1/0
o
ISP(config-if)#shutdown
o
ISP VLan 10 shutdown between Server0 and ISP Router
o
ISP(config)#int vlan 10
o
ISP(config-if)#shutdown
o
Removed DHCP fromt the ISP Router
o
ISP(config)#no ip dhcp pool Internet_Users
Second Step:

Server0
o
Power off
o
Removed :

IP address:
10.10.10.2

Subnet mask:
255.255.255.0

Default gateway:

DNS server:
Third step:

ISP Router to Cloud0 Fa0/0:
10.10.10.1
10.10.10.2
o
Shutdown the ISP int fa0/0 port down

ISP(config)#int fa0/0

ISP(config-if)#shutdown

Turned off cloud

Cloud modem 4 removed under DSL

Cloud modem 5 removed under DSL

Interface Ethernet 6 switched from DSL to Cable
Fourth step:

DSL Modem:
o
Shutdown modem
Fifth step:

Home router
o
Password console on Home router, the ASCII code that represents the capital
letter W


Shut down vlan20 from 0/0/1 to 0/0/3
o
Home_rtr(config)#int fa0/0


Home_rtr(config-if-range)#shutdown
Shut down vlan 20
o
Home_rtr(config)#int vlan 20


Home_rtr(config-if)#shutdown
Home_rtr(config)#int range fa 0/0/1 - 3
o

Answer: 01010111
Home_rtr(config-if)#shutdown
Shutdown int fa0/0/0
o
Home_rtr(config)#int fa0/0/0

Home_rtr(config-if)#shutdown

Removed DHCP
o
Home_rtr(config)#no ip dhcp pool users
o
Removed cable
o
Removed Ethernet port.
Sixth step:

PC
The advanced part of the troubleshooting segment was built so that the competitors had to solve
each problem correctly in order to have the host PC open the fake Google website on the web
browser. If one of the command lines were not entered correctly, the network would still flash
green in Packet Tracer. This indicates that there is a connection between two or more physical
devices, but if the host is not able to ping the other devices on the network then the participant
has not put the network back together correctly.
Trouble shooting segment example
DESIGN A NETWORK SEGMENT
The design a network segment was put together by the TigerNet Challenge team in order to
encourage participants to put their current knowledge of computer networking to the test. It is
designed mainly by the team’s leader, Yusuf Hashem. The segment is composed of a network
put together in Packet Tracer. The team decided to come up with another scenario that would
explain to the participants what was required from them in order to complete the segment. The
scenario was based on a fake company that was located in Kansas city, KS. The company
sought to expand its computer network in order to accommodate for an expansion in the
company’s buildings. The company wanted to expand its research and development department,
as well as its financial department. Each expansion of these departments, challenged the
participants in these areas:

Topology

Devices

Connections

Expansion
The company required that each expansion needed to meet a certain number of rules. These
rules challenged the participant’s knowledge of expansion and hardware capabilities when it
came to expanding the company’s network.
The objectives of expanding the network:
Objectives for the new R&D department:






A class B IP address (172.18.X.X) that will accommodate 300 hosts
Expand the network 400 meters (1312 feet) east of the company
5 PCs, two of these PCs must have audio capabilities (hearing and speaking)
An access point with 4 devices on it (an IP phone, a wireless printer with 2.4GHZ
wireless connection, a Tablet, and a laptop connected wirelessly )
Enable practical routing protocols.
Explain your work in a Word File or PDF.
Objectives for the new financial department:






A class B IP address (172.19.X.X) that will accommodate 1023 hosts
Expand the network 400 meters (1312 feet) east of the company
Simulate a DSL connection in the department.
5 PCs, two of these PCs must have audio capabilities (hearing and speaking)
An access point with 4 devices on it (an IP phone, a wireless printer with 2.4GHZ
wireless connection, a Tablet, and a laptop)
Enable practical routing protocols.

Explain your work in a Word File or PDF.
Each participant will also have to research each device, cable, protocol used, and price of
whatever they did to expand the network. This part challenges them to put their research skills to
the test in order to grasp an understanding of financial planning in a company. It will teach them
to be cost efficient and become more economical when it comes to growing and expanding a
company’s communication department. A participant must think before using any device to
expand the network.
They must make sure to follow these steps and explain them in great detail to the company:







Type of Ethernet cabling used between cabled devices.
The advantages of the cable you chose over the others available.
The devices you used to expand the network.
The advantages of the devices you chose over other possible devices.
A personal statement to the company how to better expand their company.
A budget explaining how much it cost you to expand this network.
Show your work for the subnetting that you performed
Design a network segment example
WEBSITE
The website to the project Tiger net Challenge was designed by Brittany Kaup made up of
different varieties such as PHP, CSS, and HTML. It should be noted that the majority of the site
was made by scratch and with a clean slate by Brittany. The template was the first thing that
needed to be made. She started off by using Notepad ++ to write out the building blocks for the
code. The CSS page was made to handle such items in the page like tables, charts, pictures, and
the wrapper. Those items were essential to the essence of the page.
The next part of the site that was important to make was the Logos, as logos are important to any
part and page of the website. The logos were hand made on Paint and Dreamweaver. They were
made to incorporate the FHSU logo along with the name of the challenge that was being
presented. The photos were found by running various searches on the internet and were used
with permission by the owners. One photo was placed on every page to make the page stand out
and not look boring and drab.
The next thing she had to consider was whether or not to change the font color. When it comes
to website, she decided to go for the black and yellow and keep the colors set mainly to the
FHSU colors. There are places where the color is set to red or green. The red font is for
announcements that were vital for the contestants to know and the green color was for the
winners.
The sign up page was made for the contestants to sign up for the challenge so that the group can
know who is participating and where they are from. Even though Brittany has knowledge in
PHP she doesn’t have a very strong skill to it. Since the site needed to be done quickly, we had
to hire our friend Tony Anthony so that the PHP could be done in a quick and efficient way. He
made that part of the site for us.
The final site looked great and was quickly launched into the World Wide Web. The feedback to
the site has been positive.
PRIZES
In order to have people take our challenge, we had to offer something in return. We decided to
have four different prizes for people whom took our challenge.
The prizes were as follow:

1st place would receive a $50 gift card to Wal-Mart and a plaque

2nd place would receive a $25gift card to Wal-Mart and a plaque

3rd place would receive a plaque.

All other participants would receive a certificate of participation.
LEARNING EXPERINCES
Tiger Net challenge was a success in the eyes of the team. We couldn’t have worked without
each other’s different skill set. Each person on the team brought their own knowledge and
experiences to help put together a great competition that others would enjoy taking to show off
their networking skills. We approached this competition in a professional way by meeting two to
three times a week at minimum. Each group meeting would last at least 4 to 5 hours. The group
would also work individually at an estimated 3 to 5 hours extra weekly. In each group meeting,
all of us would learn something new when it came to web design and computer networking
LEARNING EXPERIENCES THROUGHT THE PROJECT
In the first two weeks of the Cap Stone class, our team was clueless what project to tackle. We
then decided to go with Tiger Net Challenge that was held before us by another group of
computer networkers at Fort Hays State University. We were very confident in taking on this
role of being the latest team to design the competition. Our team learned that we should assign
each person a designated role towards the challenge in order to keep things tidy and neat. The
members with the most knowledge in computer networking would take on the designing of the
troubleshooting and design a network segment, while members who had better web skills would
design the website. Other members acted as liaisons between our sponsors in order to gain
guidance from them to make our competition more professional. We decided to have one or two
of the members meet with our sponsors so that they could have an easier time relating with a
familiar face rather than having to restate the same information to another person at each
meeting. Doing this helped the group reach a better understanding with our sponsor, Kevin
Schaffer.
The team found it better to communicate with one another through cell phones and
Facebook.com. it was the best way to start communicating because within Facebook, we were
able to initiate a group and post our findings, important dates, files, questions, and other useful
information that the group could utilize at the same time. Later on, we had to use another
method of communication in order to incorporate files on to our website to allow participants to
download the files needed to take the challenge. We used http://www.mediafire.com to upload
the instruction and Packet Tracer files to our website. We found it easier and more practical to
use this method since it did not require more coding on our website. Not everyone was familiar
with this file sharing site at the beginning of the project, but we quickly adapted to it and learned
to use it more productively.
TROUBLESHOOTING
This segment of the project gave us a lot of experience working with packet tracer. In the
beginning, only a couple of us were proficient enough to use this program. But after using it
over and over again, we have some of our team members have become very proficient in using
this program and have gone beyond the teachings within the curriculum taught at the university.
Packet Tracer gave us an emulated experience in building networks from scratch. It is not as
good as real head on equipment experience, but it gives us the joy to deal with equipment that
otherwise we might have never had the pleasure of working with in real life. The
troubleshooting segment allowed the team to gain more experience in the following concepts:






Network architecture
Topology
Designing
Cabling hardware
Using new equipment with familiar ones
Using different protocols in accordance with one another.
It was a joy for us to see our network built up in Packet racer, the difficult part was trying to
make the damage repairable. It was easy to go in Packet Trace and rip out the cables and
exchange them with incompatible ones, or use DHCP on a router and then have it removed. The
real challenge was in wording these concepts in a scenario that would allow competitors to fully
understand what was needed from them to complete the segment. It took a lot of research in
order for us to use the certain aspects of each of the three levels that was put into this segment.
Each part was thought ought carefully and tested numerous times before implementing it into the
challenge. We ran the test by ATSO in Fort Hays State University before sending it out. We
received pretty much negative feedback and had to scrap what we had and start over. After that,
we had a stronger and more professional looking network that competitors mostly ranked as a
challenging competition.
DESIGN A NETWORK
This part of the challenge taught the team more than just computer networking. It taught us the
value of business and how companies think, we learn more about requirements that are set forth
by a company when they are looking to expand their network. The team also learned that when
expanding, it will cost money to do so. We had to look up prices of devices that we dealt with in
an emulated environment that we didn’t know how much it would actually cost. It was shocking
to learn how expensive some of the equipment actually was. It made us think more economical
and green when it came to expanding a network of this size. We learned that each expand
demand a number of equipment and protocols that needed to go together in order to have the
company satisfied with the final result. It was also a way to educate the competitors about how a
real company would ask for a blueprint of their thoughts before actually starting the expansion.
It was a useful method to teach us new skills when it came to budgeting, and financial skills
while still keeping a consistent network through expansion.
Download