Network diagram says eigrp

Assignment Help Basic Computer Science
Reference no: EM131055213

Lab - Frame Relay Lab

ANSWERS DOCUMENT

Your Name:

Follow the directions in the Lab #2 assignment document titled "Packet Tracer - Configuring Frame Relay Point-to-Point Subinterfaces" to implement the lab network.

There are 2 places where the instructions are slightly different than the network diagram. In these cases, you must follow the instructions and not the diagram. They are:

  1. Network diagram says "EIGRP", but instructions are to use OSPF.
  2. Network diagram shows subinterface numbers as ".1", ".2" or ".3", but instructions say that the DLCI numbers ".102", ".103", etc, should always be used as the subinterface numbers.

When lab is complete, answer questions below. You can enteryour answers into this document or create a separate one.  When complete, saveanswers file as PDF and submit for your Lab #2assignment on D2L.

All results must show the complete output from the command (that is, it should not say "-More-" at the bottom). 

1. On PC, ping to Laptop.  Paste results here.

2. On PC, tracert to Laptop.  Paste results here.

3. On PC, tracert to 209.165.200.226.  Paste results here.

4. On R1, execute show ipinterfaces brief and paste here.

5. On R1, execute show iproute and paste here.

6. On R2, execute show frame-relay map and paste here.

7. On R2, execute show frame-relay pvc and paste here.

8. On router R3, show running configuration (show run) and paste here.

9. You are done!!

Reference no: EM131055213

Questions Cloud

What would be the total return of the bond in percentage : A 8.9 percent coupon bond with 11 years left to maturity is priced to offer a 6.95 percent yield to maturity. You believe that in one year, the yield to maturity will be 8.0 percent. What would be the total return of the bond in dollars? What would b..
Explain the java programming concept of inheritance : Explain the Java programming concept of inheritance. Do all programming languages have Inheritance, and why or why not? Discuss and state how it relates to inheritance. Identify a situation where inheritance behavior would be absolutely crucial.
Write a summary about the article apples supply-chain secret : Write a summary paper about the article "Apple's Supply-Chain Secret? Hoard Lasers". What's apple doings? How apple breaks the rules?
Compute the taxable equivalent yield and yield to maturity : A 4.40 percent coupon municipal bond has 16 years left to maturity and has a price quote of 105.50. The bond can be called in eight years. The call premium is one year of coupon payments. Compute the bond’s current yield. Compute the taxable equivale..
Network diagram says eigrp : Network diagram says "EIGRP", but instructions are to use OSPF. Network diagram shows subinterface numbers as ".1", ".2" or ".3", but instructions say that the DLCI numbers ".102", ".103", etc, should always be used as the subin..
Use the protective list system to protect work of licensee : You must have a corporation or LLC business structure to be a “Brokerage” and hold a real estate broker license. Regulation and oversight of real estate activities in Minnesota is done by the Commissioner of Commerce. The State of Minnesota does not ..
What are the characteristics of ethical leadership : Give an example of ethical leadership. What are the characteristics of ethical leadership? And why do you think ethical leadership is important?
About the lease and buy : Reynolds Construction needs a piece of equipment that costs $350. Reynolds either can lease the equipment or borrow $350 from a local bank and buy the equipment. If the equipment is leased, the lease would not have to be capitalized. In either case, ..
What conclusions can you draw about the ethical issues : What conclusions can you draw about the ethical issues facing business leaders? How would you explain the role of leadership in corporate culture, leadership styles, and how they affect ethical decision making?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find some articles or research on project management

Do the same for key points that make project management easier for an Agile project.

  Based on the readings and your personal experience,

Based on the readings and your personal experience, are social network threats taken too lightly by organizations?

  Role of confusion and diffusion in design of block cipher

Explain the roles of confusion and diffusion in the design of a block cipher.

  Define two primary approaches in developing signatures

Identify and briefly describe the two primary approaches to developing signatures for network-based IDS tools. Is one technique preferred over the other? Explain why.

  Describe the use of the remote network monitoring

Describe the use of the Remote Network Monitoring (RMON) protocol and its relationship to SNMP.

  Computer program that inputs a degree

Write a computer program that inputs a degree of difficulty and seven judges' scores, and outputs the overall score for that dive. The program should ensure that all inputs are within the allowable data ranges

  Prepare grade stars

Only single grade letters, upper or lower case, are considered valid. Input exceeding a single character is invalid and should cause an Error JOptionPane dialog, complete with the appropriate icon and title of "Error" at the top of the window. (No..

  What emerging it/is do you think will be popular

What current IT/IS do you think will still be relevant ten years from now?What current popular IT/IS do you think will still be obsolete ten years from now?What emerging IT/IS do you think will be popular and widely adopted in the future?

  Develop a structure chart with a main module

Develop a structure (hierarchy) chart with a main module, submodules, the parameter variables, and reference in the reference variables in the parentheses as needed.

  What is the asymptotic time complexity of algorithm

Suppose an algorithm has two parts. The first part involves sorting and takes (10 nlog n) steps, where n is the input size. What is the asymptotic time complexity of the overall algorithm, in Big Theta notation?

  What factors are involved in selecting architecture

Under what architecture would you classify technologies such as virtualization, cloud computing, and Web-based applications? Last, what factors are involved in selecting the architecture that is right for your organization?

  Design interface for government for identifying terrorists

As part of the design team on a major government defense project, it is time to create your first mock-up of this terrorist identification and tracking user interface.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd