Assign suitable ip addresses to each device of your choice

Assignment Help Computer Network Security
Reference no: EM132540857

#question..

ITNE1001 Network Architecture - Victorian Institute of Technology

Activity 1

1. Open the packet tracer software interface and get familiar with it using the help menu
2. Place three node PCs and one laptop within the work area
3. Connect them using a hub (hub 1). What is the suitable connection type?
4. Similarly, connect another three PCs nodes using a switch (switch 1) on the same workspace
5. Is it possible to connect the hub 1 to switch 1? Connect the two network segments using minimum resources and call it ‘Subnet 1'
6. Now, create a different ‘Subnet 2' by connecting 3 PCs to another switch (switch 2)
7. Now you are asked to connect these two subnets by connecting switch 1 and switch 2 using a suitable network device. Confirm from your selection by asking the instructor
8. It is required to assign IP addresses to these devices in order to enable networking among them. Assign suitable IP addresses to each device of your choice.
To assign IP address click on the network device and go to the ‘config' tab. Then click the ‘FastEthernet' button under ‘Interface' to get the IP config wizard as shown below
9. Now try to communicate with different nodes using the ‘ping' command

Activity 2:

1. Create the following network on Packet Tracer interface. When connecting the router to switches make sure the Switch0 is connected to FastEthernet0/0 interface and Switch1 is connected to FastEthernet0/1 interface of the router

2. As shown in the figure above assign the IP addresses 192.168.1.1 and 192.168.2.1 to the nodes PC0 and PC1

3. What is the class that these IP addresses are belonged? What is the subnet mask?

4. Are PC0 and PC1 are in the same network? Explain the reasons for your answer

5. Click on PC0 and use its ‘Command prompt' to ping from PC1. Is your ping successful? If not explain the reasons for that

6. Now we are going to configure the router. Click on the router and go to ‘CLI' tab.

7. You'll see the dialogue ‘Continue with configuration dialog? [yes/no]:' at the bottom. Type ‘yes' and hit enter.

8. Then give a suitable router name and give a password when ‘Enter enable secret:' is asked. Use the password ‘password' for this.

9. The enable password is used when you do not specify an enable secret password, with some older software versions, and some boot images. When ‘Enter enable password:' is asked assign the password ‘pwd'.

10. For ‘Enter virtual terminal password:' give ‘vpwd' for the password and hit enter

11. When it says "Enter interface name used to connect to the management network from the above interface summary:" type ‘FastEthernet0/0' and hit enter as shown below. This allows you to configure the router's interface to Switch0.

12. Then assign the following IP configurations to ‘FastEthernet0/0'

13. Then select option 2 in from the following message.

14. Then use the ‘enable' command and the password ‘password' to get into Privileged EXEC mode. This will appear in with ‘#' symbol

15. Then type ‘config t' command to get the configuration terminal.

16. Then use the command "interface FastEthernet0/1" to configure other interface of the router.

17. Then type (config-if)# ip address 192.168.2.254 255.255.255.0 to assign an ip address to this interface. And then use "no shutdown" command to turn the interface on. Then type ‘exit'.

18. Then use the following two commands to configure routing. This will enable packet forwarding

Router(config)#ip route 192.168.2.0 255.255.255.0 fastEthernet 0/1
Router(config)#ip route 192.168.1.0 255.255.255.0 fastEthernet 0/0

19. Then type ‘exit' and use "copy running-config startup-config" command to save configurations.

20. Now your network is up and running. Now try to ping from PC0 to PC1 and comment on your results.

Attachment:- Network Architecture.rar

Reference no: EM132540857

Questions Cloud

Real cost of hedging the eur payables for firm : What was the real cost of hedging the EUR payables for this firm?
Contingency plan to mitigate those unexpected challenges : Give suggestions on what might be added to the organization's contingency plan to mitigate those unexpected challenges.
Journal entries need be prepared for salinas corporation : Journal entries need be prepared for Salinas Corporation for 2020 and 2021, assuming Phelps is not able to exercise significant influence over
How much factory overhead will blackwelder factory allocate : How much factory overhead will Blackwelder Factory allocate to small lamp production if actual direct hours for the period is 178,000?
Assign suitable ip addresses to each device of your choice : Assign IP addresses to these devices in order to enable networking among them. Assign suitable IP addresses to each device of your choice
What effective annual interest rate has the investor earned : What effective annual interest rate has the investor earned, explain the results?
What amount of gain or loss would it record on the sale : If the company sold the equipment on December 31, 2019 for $14,000 what amount of gain or loss would it record on the sale
Expected eps under both financing options : Find out the expected EPS under both financing options at the given EBIT levels of Rs. 2 crores and Rs. 7.5 crores. What should be choice of the company
What would a schedule of cost of goods manufactured for year : Kookabuka Company during the most recent year, What would a schedule of cost of goods manufactured for the year look like?

Reviews

len2540857

6/10/2020 3:41:44 AM

I need 2 activities to be done. And my budget is only80-100$ AUD. So plz quote the price accordingly. Plz quote the price in AUD. Thanx

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd