Benefits of using a layered model for computer networks

Assignment Help Computer Networking
Reference no: EM13923893

Question 1: What are the benefits of using a layered model for computer networks?

Question 2: The three network topologies shown below are all valid Ethernet networks.

a) How many collision domains and broadcast domains are there in each topology?

b) Explain which topology is preferred.

286_img2.png

Question 3: Explain why 60.61.62.63/26 is not a valid host IP address.

Question 4: In the following network topology, assume static routes are set and the routers are working properly. Explain why PC A can talk to PC C but PC B cannot talk to PC D.

654_img4.png

Question 5: USQ has allocated 172.17.0.0/16 to 6 PC laboratories in Wonderland campus. Each laboratory will have a subnet of its own. The number of hosts in each laboratory is as follows:

 

Lab 1 Subnet A

Lab 2 Subnet B

Lab 3 Subnet C

Lab 4 Subnet D

Lab 5 Subnet E

Lab 6 Subnet F

Number of Hosts

2

47

532

6

39

125

The hosts in each laboratory are linked together using switches. The six laboratories are linked together using a router with six Ethernet interfaces as shown below. In the topology, only two hosts in each laboratory are shown. For each subnet, the gateway will use the first host IP address. The two PCs (for example, PC_B1 and PC_B2) in each subnet shown will be using the second available host IP address and the last available host IP address respectively.

642_img5.png

a) Taking into account of possible expansion of laboratory facilities in the future, we have to pack the subnets so that they use minimal IP address space. With this in mind, please assign IP addresses to the PCs and router Ethernet interfaces (gateways) using the table below:

Device

IP

Gateway

Broadcast IP

Subnet IP

PC_A1

 

 

 

 

PC_A2

 

PC_B1

 

 

 

 

PC_B2

 

PC_C1

 

 

 

 

PC_C2

 

PC_D1

 

 

 

 

PC_D2

 

PC_E1

 

 

 

 

PC_E2

 

PC_F1

 

 

 

 

PC_F2

 

b) Implement the network using Packet Tracer 6.0.1 subject to the following conditions:

1. Use one Cisco 2811 router with added Ethernet interfaces.
2. Use one Cisco 2960 24 port switch for each laboratory assuming other access switches can be added later on.
3. The router Ethernet interfaces use the first host IP address of the corresponding subnet assigned to the laboratory.
4. The two PCs shown in the topology should have the second available host IP address and the last available address of the subnet assigned.

c) When a TCP/IP packet travels from PC_A1 to PC_F1, we can capture the packets on their way using simulation mode. Use a Packet Tracer screen capture of the packets to explain where inside a packet/frame you can find:

1) Source MAC address and destination MAC address;
2) Source IP address and destination IP address.

Reference no: EM13923893

Questions Cloud

Type of neuron that receives a stimulus : Which of the following is a type of neuron that receives a stimulus and transmits it to the central nervous system?
Cordova leather liabilities : 1.  At December 31, 2014, Cordova Leather's liabilities include the following:
How would you define the target market of polaris products : Identify and describe the strategies used in Polaris' marketing mix.With the Indian Motorcycle, specifically, what is the unique selling proposition (USP)?How would you define the target market of Polaris products?
The projects net present value : Calculate the NPV for a 25 year project with an initial investment of 40000 and a cash inflow of 6000 per year. Assume that the firm has an opportunity cost of 18% . Comment on the acceptability of the project
Benefits of using a layered model for computer networks : What are the benefits of using a layered model for computer networks? The three network topologies shown below are all valid Ethernet networks. How many collision domains and broadcast domains are there in each topology
Identify the beta listed for a company called elxsi? : Identify the beta listed for a company called ELXSI, stock symbol ELXS. According to Yahoo!Finance, what is ELXI's beta?
Walmart analysis assignment : Perform a vertical and horizontal analysis of Wal-Mart Stores, Inc.'s income statements and balance sheets as of January 31, 2015. In performing this analysis, consider any notable trends or changes that you observe that may provide useful informa..
What is the NPV break-even level of sales : Modern Artifacts can produce keepsakes that will be sold for $70 each. Nondepreciation fixed costs are $2,300 per year, and variable costs are $35 per unit. The initial investment of $6,000 will be depreciated straight-line over its useful life of 5 ..
Journey from the testicles to the fallopian tubes : The following is a list of methods by which human conception can be postponed. Which one blocks sperm on its journey from the testicles to the fallopian tubes?

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe the impact that each standards organization

The networking field, to include wireless networking, defines many standards to govern network and wireless network operations.

  Communication with the server

Design an Ethernet network to connect a single client PC to a single server. The two devices are 410 feet apart. They need to communicate at 800 Mbps.

  Give an illustration of a software system for which

question 1 give an example of a software system for which developing a prototype would result in saving a significant

  Social media and networking technologies

Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking

  Operating systems

The figure below shows a tunnel going through a mountain and two streets parallel to each other-one at each end of the tunnel. Traffic lights are located at each end of the tunnel to control the cross flow of traffic through each inter¬section.

  Single dsl router

if an office had two computers connected via Ethernet layer 2 switch,  sharing a single dsl router connected to the internet, which error detection scheme would be more suitable for this scenario?

  Organization of wlans

Assume you are the IT manager for an organization tasked with evaluating whether or not to deploy internal wireless access for employees.

  Consider this scenario.a new three level building

Consider this scenario. A new three level building will be built to accommodate three computer labs. It will be a separate building from the existing one. Each level will accommodate one lab. 50 personal computers (PCs) and a shared printer will b..

  Multi-network access

Imagine that you are the manager of a small business computing center. List at least three techniques that you would use to convince a busy, reluctant night operator to perform regular backups. Explain the best and worst possible technique to assu..

  Complete one paper summarizing the actions steps tools etc

complete one paper summarizing the actions steps tools etc. of the hacking techniques used to execute the attack on the

  Plan to provide secure access control methods

A plan to provide secure access control methods for all user access and A viable password policy, which includes complexity, duration, and history requirements

  Fiction corporation a large national retail chain of 10000

fiction corporation a large national retail chain of 10000 employees and 500 retail outlets is migrating its one

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd