Identify different subnets according to network requirements

Assignment Help Computer Networking
Reference no: EM13729289

A small business, Smart Office Services Pty Ltd, has its central office (HQ) and two branch offices (BRANCH 1 and BRANCH 2) linked via serial leased lines using routers. The network topology is given as follows. It is required that:

a) You will be assigned a single IP to configure this network.

b) You must e-mail your lecturer to request an IP address. Once you have received your allocated IP address you need to reply with a confirmation e-mail.

Study the network topology, examine the network requirements, set up the network in Packet Tracer and complete all five sub-questions.

Keep in mind that IP addresses will be needed for each of the LAN interfaces.

Question 2.1:

Identify the different subnets according to network requirements. Please analyse and design the best IP addressing scheme.

Create a table which lists the following information: Router Interfaces/ IP Address (Highest)/ IP Address (Lowest)/ Subnet Mask/ Default Gateway). Please show working out.

Note: The lowest IP addresses of each subnet should be given to the PCs. The highest IP addresses of each subnet are given as the default gateway.

Question 2.2:

Set up the required network in Packet Tracer software. Select one router in the topology, type the command "show version" in the CLI interface. What is the version number of IOS? What are the sizes of RAM, Flash and NVRAM?

Question 2.3:

Configure the three (3) routers:

- name the routers and label them as HQ, BRANCH 1 and BRANCH 2
- set the secret password as ‘class' on all routers
- configure interfaces/ PCs
- configure TELNET on the HQ router with a password of ‘xyz123' and (a suitable) MOTD
- Verify basic configuration and router operations

Question 2.4:
Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers.

"Show ip route" check and screen shot each router's routing table.

Question 2.5:

PING from PC6 in LAN6 to PC4 in LAN4 (checked in Packet Tracer file). What protocol is used by PING? What are the names of two PING messages?

Record the information flow in EVENT LIST of simulation and explain the PDU information such as TYPE and involved layers in each stage

Reference no: EM13729289

Questions Cloud

Allowance for children and teens : 1) Which of the following is the smartest way to handle allowance for children and teens?
Describe the evaluation and measurement procedures : Describe the evaluation and measurement procedures to be used to monitor overall performance of the action plan, including quantitative measures and allowable time frames
What is the firms free cash flow of that year : A firm has $ 3 million market value and it sells preferred stock with a par value of $100. If the coupon rate on the preferred stock is 9% and the preferred stock trades at $85, what is the cost of preferred stock financing? A firm reports that in a ..
Identify two types of budgets from the five budget types : Identify two types of budgets from the five budget types, Line-Item, PerformanceBased, Program, Lump-Sum, and ZeroBased.
Identify different subnets according to network requirements : Identify the different subnets according to network requirements - Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers.
Growth coupled with heightened volatility : Please read the questions carefully before writing your responses. There is no ‘model' or ‘unique' answer to the discussion questions. The questions require brief, considered, responses. A premium will be placed on cogent, well-reasoned responses...
Summarize quality management and assurance concepts : Summarize quality management and assurance concepts along with the participation of major contributors to the quality field.
Compute weighted average cost of capital if firms tax rate : Sirom Scientific Solution has $10 million of outstanding equity and $10 million of bank debt. The bank debt costs 7% per year. The estimated equity beta is 2. IF the market risk premium is 8%, and the risk -free rate is 5%, compute the weighted avera..
Calculate the value index for each car : You have just graduated from college and are looking to buy your first car. Money is tight right now, so you are concerned with initial cost as well as ongoing expenses. Which car provides you with the greatest value? Use formulas to calculate the ..

Reviews

Write a Review

Computer Networking Questions & Answers

  How many addresses are left

Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses.

  Part- aduring the labs we used the national vulnerability

part- aduring the labs we used the national vulnerability database. select a recent vulnerability from that database

  If you had an enterprise organization

If you had an enterprise organization of 1000 users, and had to set up an intranet web server, which web server would you use? Please explain your answer. (I just need one good paragraph).

  List the networking and commination devices required

List the networking and commination devices required, including the IP addresses, product numbers, the cost of each and the approximate total cost.

  Derive general expression for width of bit propagation speed

Derive a general expression for the width of a bit in terms of the propagation speed s, the transmission rate R, and the length of the link m.

  Role of project managers and telecommunications managers

Describe in scholarly detail "technical jargon" and describe the role of project managers and telecommunications managers.

  Relationship-individual characteristics and job satisfaction

What is the relationship between individual characteristics and job satisfaction?

  Assume that you can access the caches in the local dns

suppose you can access the caches in the local dns servers of your department. can you propose a way to roughly

  Volatility plugins and ida

Describe Volatility plugins and IDA

  Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names are required?

  Potential risks associated with remote access

Question 1: Why are users considered the weakest link in implementing policies? Question 2: What are potential risks associated with remote access?

  Explain ethics of developing type of system

Number of citizens and their actions. Clearly this has privacy, implications. Explain the ethics of developing this type of system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd