Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
• Study carefully the following network diagram. You will be assigned TWO IP addresses to configure this network. You need to e-mail the lecturer to request the two IP addresses. The first IP address given will be used for the WAN links. The second IP will be used for the LANs. You need to reply with a confirmation e-mail once you have received your allocated IP address. Use VLSM to configure the given network LAN and the WAN links. VLSM must be used in the MOST efficient way to subnet the LAN and the WAN links. All the links between routers are WAN links. Assessment is covered by 4 stages, each stage has various tasks to complete. Stage 1 of this assignment: Subnet the IP address State the subnet mask Choose an IP address for PC1(in LAN2), PC2(in LAN 6) and default gateway. The LOWEST IP addresses of each subnet should be given to the two PCs. The HIGHEST IP addresses of each subnet are given as the default gateway. Stage 2 of this assignment: Configure the four routers. Naming the routers as Router 1, Router 2, Router 3 and Router 4. Setting the secret password as 'class' on all routers. Configuring interfaces/PCs; Configuring TELNET on the Router 3 with a password of 'xyz123' and (a suitable) MOTD; Saving changes on the routers; Verifying basic configuration and router operations; Stage 3 of this assignment: Ping from the PC1(in LAN2) to PC2(in LAN 6). Stage 4 of this assignment (Routing Protocols configuration): Set up EIGRP (AS number = 20) on all routers. The clock-rate on the routers should be set to the values shown in the figure above. The following is the submission requirement: SECTION A: 1. Write down the two IP addresses that you were allocated (including the masks) ___________________________________________________ 2. What are the Subnet IDs for Router 1 (and masks) ? ____________________________________________________ 3. What are the Subnet IDs for Router 2 (and masks) ? _____________________________________________________ 4. What are the Subnet IDs for Router 3 (and masks) ? ___________________________________________________ 5. What are the Subnet IDs for Router 4 (and masks) ? ___________________________________________________ 6. What are the subnet IDs for the WAN links (and the masks) between Routers? ______________________________________________________ 7. What are the IP addresses (and masks) for the interfaces of Router 1? (a) Ethernet (b) Wan link 8. What are the IP addresses (and masks) for the interfaces of Router 2? (a) Ethernet (b) Wan link 9. What are the IP addresses (and masks) for the interfaces of Router 3? (b) Ethernet (b) Wan link 10. What are the IP addresses (and masks) for the interfaces of Router 4? (b) Ethernet (b) Wan link 11. For PC1 (on Router 2) what is the IP address/mask and default gateway? (a) IP address (b) Default gateway 12. For PC2 (on Router 3) what is the IP address/mask and default gateway? (a) IP address (b) Default gateway 13. From your allocated IP address answer the following: How many useful IP addresses in total are left in the original diagram for (a) the WAN links, (b) the LAN after you configure the IP addresses in the above diagram. Show working! 14. Copy and paste the router table for Route 3 here: 15. What is the cost/metric to the PC2 on Router 3? How to check it? 16. Justify this metric by showing how the router calculated it! 17. Being able to successfully PING from one PC1 on Router 2 to the other PC2 on Router 3. (checked in Packet Tracer) SAVE THIS PACKET TRACER FILE as "your CSU ID".pkt eg 12345678.pkt SECTION B. 1. On all the routers change the EIGRP Administrative Distance to 150. 2. Backup the router configurations. 3. Reboot all four routers. 4. Copy and paste the router table for Router 3 below, and comment on any differences between this router table and the one above (14.) and explain why. Rationale The aim of this assignment is to evaluate your capabilities to: - design a subnet plan for a small company network including several routers and subnets; - discuss routing problems that can occur in complex networks; - correctly identify and discuss the functionality and limitations of different devices used in computer networks; - perform basic router configuration of security passwords and interfaces; - implement simple routing; - evaluate network performance;
How does the EU directive on the protection of personal data impose requirements on organizations in non-EU countries?"
Go to IBM.COM discover all company's business intelligence (BI) products and services Explain their process in minimum of half page to full page.
In the example of deriving required logging information for the Chinese Wall model, it is stated that the time must be logged.Why? Explain.
What is infrastructure? In what was do hardware and system software qualify as infrastructure? What basic strategic planning questions should be addressed with respect to infrastructure?
Select a topic that most interests you from Service Strategy or Service Design and then write a paper around that topic. Try to use as much of your own creativity and originality when writing the paper.
Differentiate between computer data represented by the state of a computer's electrical switches and the meaningful information that is displayed to the user.
Why do RISC machines operate on registers? Which characteristics of RISC systems could be directly implemented in CISC systems.
How do components of computer system interact within system? What improvements or additions to system do you believe would benefit you or make system more user-friendly?
How would implementing new forms of computer-mediated technology influence your organization's communication? What is the significane of managers selecting suitable channel for message distribution in Information Age?
Discuss strategies you will use to dilute this manager's anger. Discuss how you will get them both to support your recommendations.
Describe relative benefits and disadvantages of at least three different measures used to protect operating systems.
Will action alter or destroy any historical, scientific, or archaeological site? New engineering building project doesn't have any reported historical, scientific.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd