Internal network address to incorporate variable length sub

Assignment Help Computer Networking
Reference no: EM13906256

Suppose the image below is your company’s network diagram after a merger and you have recently added access controls to your network. The CSO would like to:

·Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol.

·Set up all of the accountants on a separate VLAN.

·Create a VPN connection to allow accountants to access the accounting database from their home.

Write a two to three (2-3) page paper in which you:

1.Re-create the diagram provided in the assignment summary using VLSM, through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. (The starting address is 172.16.0.0.) Note: The graphically depicted solution is not included in the required page length. 

2.Specify the commands that you would use to set up the routers to use EIGRP.

3.Outline the requirements to set up a VLAN and VPN access for the accountants.

4.Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to eliminate loops. 

Your assignment must follow these formatting requirements:

·Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

·Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

·Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

·Describe and implement Virtual Local Area Networks (VLANs) on a computing network.

·Compare and contrast dynamic routing, distance vector routing, and link-state routing protocols.

·Use technology and information resources to research issues in Internetworking.

·Write clearly and concisely about basic internetworking using proper writing mechanics and technical style conventions.

 

 

Reference no: EM13906256

Questions Cloud

The distribution of excess profits amounting : Suppose that management and labor are bargaining over the distribution of excess profits amounting to $200 per worker. Suppose that failure to reach an agreement an agreement reduces management's share of the surplus by 5 percent per round and reduce..
Source code of the existing software : The development team of SoftSols Inc. analyzes the source code of the existing software and notes the following observations:
Determine the input power required at shaft 1 : Design a gear train which satisfies the above criteria. Use a sketch to illustrate your design, label the gears A, B, C, etc. from the driver to the driven gear, and state the number of teeth on each gear.
Compliance with generally accepted accounting principles : Lauren Corporation was formed two years ago to manufacture fitness equipment. it has been profitable and is growing rapidly. it currently has 150 shareholders and 90 employees; most of the employees own at least a few shares of Lauren's stock. Explai..
Internal network address to incorporate variable length sub : Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol. Set up all of the accountants on a separate VLAN. Create a VPN connection to allow accountants to access the accounting database from..
The firms in a perfectly competitive industry : "When the firms in a perfectly competitive industry are just able to cover their cost of production, economic profit is zero. Therefore, if demand falls, causing prices to go down even a little bit, all of the firms in the industry will immediately s..
Define assets-liabilities and equity : Define [a]assets, [b] liabilities, and [c] equity. Which financial statement is sometimes called the statement of financial position. During the year, Able Co. purchased $39,600 worth of supplies, at the end of the year, the balance sheet showed a ba..
Find pin dynamic forces and torque : Find: Pin dynamic forces and T (torque applied on link 2 ) to generate the required input velocity following requested output velocity of 25rpn Please note that for kinetic analysis
Indicate extent to which the payments are taxable income : Indicate the extent to which these payments are taxable income to Jeremy this year if Jeremy is (1) a cash-method taxpayer and (2) he is an accrual-method taxpayer.

Reviews

Write a Review

Computer Networking Questions & Answers

  Remote network implementation plan

Remote Network Implementation Plan

  What is a distance-vector routing protocol

What is a distance-vector routing protocol. What are the advantages and disadvantages of distance-vector protocols

  Wireless and mobile technologies

Wireless and Mobile Technologies

  You were tasked to handle the urgent delivery

You were tasked to handle the urgent delivery of 10TB of data from your company in Washington, D.C to a subsidiary in San Francisco, CA (2,815 miles away).

  Snmp securitybullsnmpv1 is the most commonly used version

snmp securitybullsnmpv1 is the most commonly used version of snmp even though it provides little support for security.

  Determine the bandwidth-delay product r tprop

Assume two hosts, A and B, are separated by 20,000 kilometers and are connected by direct link of R = 1 Mbps. Determine the bandwidth-delay product, R * Tprop?

  Process of routers and switches

Do you think that one day, routers and switches will not be needed? Why?

  What is use of the mac and ip for vlan 1 in a cisco switch

Implement the network topology using Packet Tracer - How many MAC does the 24 port Cisco switch used in the Packet Tracer - How many MAC does the 24 port Cisco switch used in the Packet Tracer has and what is the use of the MAC and IP for VLAN 1 in ..

  Explain all potential security threats on personal computer

Computer security is not the issue for organizations alone. Anyone whose personal computer is connected to the network or Internet faces the potential risk of attack.

  How long does b takes to acknowledge

Assume that no packet or acknowledgement are dropped. Assume that A sends a packet to C and waits for its acknowledgement to come back from C. How long does it take until A gets that acknowledgement?

  Write the new technology developments in areas of generic

list the new technology developments in the areas of generic and networked computing and web-based systems. what are

  Describe network in file transfer and without file transfers

Observe reply time before and during file transfer. Write down short description of network response time during file transfers and without file transfers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd