Calculate two subnets in order to provide the ip

Assignment Help Computer Networking
Reference no: EM131305204

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ).

The branches need to be interconnected to the Headquarter; you have been assigned a design for this work. The assignment needs you to implement the following network design as per instructions and guidelines provided below. You need to put attention to the details of the requirement, marks will be deducted for any missing component or item. This is an individual assignment, therefore, this must be your own work. Please refer to the following Network Diagram (Figure 1), which reflects ail the connectivity details, customers per site as well as both IPV4 and IPV6 Address blocks that you need to use for IP subnetting and IP Addressing.

2112_Figure.png

You will be assessed on the following skills:

- Configuration of initial IOS device settings
- Design and calculation of IPv4 and IPV6 addressing
- Configuration of IOS device interfaces including IPv4 and IPv6 addressing when appropriate
- Addressing of network hosts with IPv4 and IPv6 addresses Enhancing device security, including configuration of the secure transport protocol for remote device configuration
- Configuration of a switch management interface

Requirements by devices:

HQ-R1, BR1-R1 and BR2-R1 routers:
- Configuration of initial router settings
- Interface configuration as well as IPv4 and IPv6 addressing
- Device security enhancement or "device hardening"
- Secure transport for remote configuration connections as covered in the labs.
- Backup all of the configuration file to a TFTP server
- IPV4 and IPV6 routing with Default & Static routes

All the switches Switch:
- Enabling basic remote management by Telnet

PC and Server hosts:
- IPv4 full addressing
- IPv6 addressing
Network Connectivity:
- Test and confirm end-to-end connectivity

Step 1:

Design an 113v4 addressing scheme and complete the Addressing Table based on the following requirements.

a. Subnet the IPV4 network to provide 190 hosts addresses for HQ, 55 hosts for BR1 and 26 hosts for BR2 while wasting the fewest addresses. Also calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page.

b. In HQ, assign first available IP address to the router interface as gateway and the last available address to the TFTP Server.

c. On BR1 and BR2, assign the first network host address in the respective subnet to the G0/0 interface of the routers.

d. Assign the second to the last address (the second highest) in this subnet to the VLAN 1 interface of the Switches.

e. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 2:

Design an IPv6 addressing scheme and complete the Addressing Table based on the following requirements.

a. Subnet the IPV6 network to provide 190 hosts addresses for HQ, 55 hosts for BR1 and 26 hosts for BR2 while wasting the fewest addresses. Please show your calculation works in a separate page.

b. Calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page.

c. In HQ, assign first available IPV6 address to the router interface as gateway.

d. On BR1 and BR2, assign the first network host address in the respective subnet to the G0/0 interface of the routers.

e. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 3: Configure and Backup the Routers

a. Configure HQ-R1, BR1-RI and BR2-R1 routers with all initial configurations that you have learned in the course so far:
Configure the router hostnames

Protect device configurations from unauthorized access with the encrypted password. Secure all of the ways to access the router using methods covered in the course and labs.

Newly-entered passwords must have a minimum length of 10 characters.

Prevent all passwords from being viewed in clear text in device configuration files.

Configure the router to only accept in-band management connections over the protocol that is more secure than Telnet, as was done in the labs. Use the value 1024 for encryption key strength.

Configure user authentication for in-band management connections.

b. Configure the Gigabit Ethernet interfaces using the lPv4 addressing values you calculated and the IPv6 values provided in the addressing table.

- Reconfigure the link local addresses as was practiced in the labs. The IPv6 link-local Interface ID should match the IPv6 unicast Interface ID as is practiced in the labs.

Label and document the interfaces in the configuration file.

- Complete the configuration of the TFTP server using the IPv4 addressing values from Step 1 and the values in the addressing table.

- Backup the running configuration of all routers to the TFTP Server. Use the default file name. Backup will be done after completion of the LAB.

Step 4: Configure the Switches

a. Configure all the switches for remote management.

b. Configure IPV4 Addresses and Default-Gateway to all switches

c. Test remote access to all the switches

Step 5: Configure and Verify Host Addressing [is MARKS]

a. Configure necessary static and default routes in order to make end-to-end connectivity.

b. Use the IPv4 addressing from Step 1 and the IPv6 addressing values provided in the addressing table to configure all host PCs with the correct addressing.

c. Use the router interface link-local addresses as the IPv6 default gateways on the hosts.

d. All hosts should be able to ping each other over IPv4 and IPV6.

Verified Expert

The solution files are prepared in packet tracer and MS word. The word file contains the IP address scheme for the network which contain IPv4 and IPv6 subnet mask address. This file also contains the configuration commands which are executed in packet tracer. the second solution is design the network in packet tracer and configure the network which includes the IP address for all host,routers and switches.

Reference no: EM131305204

Questions Cloud

Determine the boundary of b : Determine the boundary of B
The euros slide and the reliance of countries : What is the connection between the euro's slide and the reliance of countries that use the euro on foreign demand to help their economies?
How you perceive yourself professionally : A brief overview of how you perceive yourself professionally. You may include a photo. A description of attributes which contribute to professionalism in your chosen field such as professional attire, communication, and behavior.
Explain three contributions that kohlberg made : Explain three contributions that Kohlberg made to our understanding of moral development.
Calculate two subnets in order to provide the ip : ISCG 5337: Introduction to Networks - Calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page - Configure addresses on the hosts using any of the remaini..
What are real exchange rates between dollar and yen : If the exchange rates are $1.50 = £1 and ¥100 = $1, what are the real exchange rates between the dollar and the yen and the dollar and the pound?
Provide analysis of how the information contained in article : Provide an analysis of how the information contained in the article relates to strategic alliance or value opportunities for your current or former organization, using specific examples.
What is affirmative action as a social policy : What is Affirmative Action as a social policy?What were the goals of Affirmative Action? Has it been successful?What are the basic arguments for Affirmative Action and what are those against it? Which side do you find the most convincing and why?
Difference between spot transaction and forward transaction : What does it mean to describe the foreignexchange market as an "over-the-counter market"?- What is the difference between a spot transaction and a forward transaction in the foreignexchange market?

Reviews

inf1305204

12/10/2016 6:05:55 AM

I TRIED TO MAKE THE PAYMENT BUT SOMETHING WRONG WITH WEBSITE BECAUSE I TRIED DIFFRENT CARDS.WHAT SHULD I DO In which version of packet tracer have to configure network ? Cisco Packet Tracer 6.1 for Windows (no tutorials) -Student version.exe

Write a Review

 

Computer Networking Questions & Answers

  Summarize the benefits of application-level gateways

xplain how a worm propagates itself. Summarize the benefits of application-level gateways. Explain why intrusion detection is necessary in terms of the known good state

  Illustrate direct mapping and address bits for tag field

The main memory of a computer is organized as 128 blocks, with a block size of 16 words. The cache has eight block frames. Illustrate direct mapping and address bits that recognize the tag field, the block number, and the word number.

  Let''s find the ip address that goes along with a domain name

Let's see how a ping works. Type in ping www.independent.ie - copy and submit the result. How can the good and bad guys use a ping?

  Give an example of a situation or scenario in which an

speculate on the primary concerns of deploying ad rms in a corporate environment. recommend a strategy that you might

  Impact of a particular trend in technology

Analyze the impact of a particular trend in technology on education and analyses of various authors on innovations and technological transformations in education and in other fields.

  Functional architecture for network monitoring configuration

The functional role of network monitoring by various areas in this week. You are also familiar with the pieces of information that are gathered and collected for the purpose of providing information on the network activity. Illustrate the function..

  Network infrastructure vulnerabilities

Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.

  Tool that is used in the closure of contracts

Identify and briefly describe at least one tool that is used in the closure of contracts. Use an example from an IT project. Your response should be at least 75 words in length

  What do you look for in the trace file you were sent

Based on the data you have in this scenario, state a possible explanation for the cause of the problem.

  Evaluating a web-based source for academic research

What information or topic in this course was most useful to you in either your professional, personal, or academic development?

  Design a high-level conceptual view of a data warehouse dw

design a high-level conceptual view of a data warehouse dw for huffman trucking using microsoftreg visioreg that shows

  What are common carriers and local exchange carriers

What are common carriers, local exchange carriers, and interexchange carriers? - Who regulates common carriers and how is it done?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd