Calculate two subnets in order to provide the ip

Assignment Help Computer Networking
Reference no: EM131305204

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ).

The branches need to be interconnected to the Headquarter; you have been assigned a design for this work. The assignment needs you to implement the following network design as per instructions and guidelines provided below. You need to put attention to the details of the requirement, marks will be deducted for any missing component or item. This is an individual assignment, therefore, this must be your own work. Please refer to the following Network Diagram (Figure 1), which reflects ail the connectivity details, customers per site as well as both IPV4 and IPV6 Address blocks that you need to use for IP subnetting and IP Addressing.

2112_Figure.png

You will be assessed on the following skills:

- Configuration of initial IOS device settings
- Design and calculation of IPv4 and IPV6 addressing
- Configuration of IOS device interfaces including IPv4 and IPv6 addressing when appropriate
- Addressing of network hosts with IPv4 and IPv6 addresses Enhancing device security, including configuration of the secure transport protocol for remote device configuration
- Configuration of a switch management interface

Requirements by devices:

HQ-R1, BR1-R1 and BR2-R1 routers:
- Configuration of initial router settings
- Interface configuration as well as IPv4 and IPv6 addressing
- Device security enhancement or "device hardening"
- Secure transport for remote configuration connections as covered in the labs.
- Backup all of the configuration file to a TFTP server
- IPV4 and IPV6 routing with Default & Static routes

All the switches Switch:
- Enabling basic remote management by Telnet

PC and Server hosts:
- IPv4 full addressing
- IPv6 addressing
Network Connectivity:
- Test and confirm end-to-end connectivity

Step 1:

Design an 113v4 addressing scheme and complete the Addressing Table based on the following requirements.

a. Subnet the IPV4 network to provide 190 hosts addresses for HQ, 55 hosts for BR1 and 26 hosts for BR2 while wasting the fewest addresses. Also calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page.

b. In HQ, assign first available IP address to the router interface as gateway and the last available address to the TFTP Server.

c. On BR1 and BR2, assign the first network host address in the respective subnet to the G0/0 interface of the routers.

d. Assign the second to the last address (the second highest) in this subnet to the VLAN 1 interface of the Switches.

e. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 2:

Design an IPv6 addressing scheme and complete the Addressing Table based on the following requirements.

a. Subnet the IPV6 network to provide 190 hosts addresses for HQ, 55 hosts for BR1 and 26 hosts for BR2 while wasting the fewest addresses. Please show your calculation works in a separate page.

b. Calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page.

c. In HQ, assign first available IPV6 address to the router interface as gateway.

d. On BR1 and BR2, assign the first network host address in the respective subnet to the G0/0 interface of the routers.

e. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 3: Configure and Backup the Routers

a. Configure HQ-R1, BR1-RI and BR2-R1 routers with all initial configurations that you have learned in the course so far:
Configure the router hostnames

Protect device configurations from unauthorized access with the encrypted password. Secure all of the ways to access the router using methods covered in the course and labs.

Newly-entered passwords must have a minimum length of 10 characters.

Prevent all passwords from being viewed in clear text in device configuration files.

Configure the router to only accept in-band management connections over the protocol that is more secure than Telnet, as was done in the labs. Use the value 1024 for encryption key strength.

Configure user authentication for in-band management connections.

b. Configure the Gigabit Ethernet interfaces using the lPv4 addressing values you calculated and the IPv6 values provided in the addressing table.

- Reconfigure the link local addresses as was practiced in the labs. The IPv6 link-local Interface ID should match the IPv6 unicast Interface ID as is practiced in the labs.

Label and document the interfaces in the configuration file.

- Complete the configuration of the TFTP server using the IPv4 addressing values from Step 1 and the values in the addressing table.

- Backup the running configuration of all routers to the TFTP Server. Use the default file name. Backup will be done after completion of the LAB.

Step 4: Configure the Switches

a. Configure all the switches for remote management.

b. Configure IPV4 Addresses and Default-Gateway to all switches

c. Test remote access to all the switches

Step 5: Configure and Verify Host Addressing [is MARKS]

a. Configure necessary static and default routes in order to make end-to-end connectivity.

b. Use the IPv4 addressing from Step 1 and the IPv6 addressing values provided in the addressing table to configure all host PCs with the correct addressing.

c. Use the router interface link-local addresses as the IPv6 default gateways on the hosts.

d. All hosts should be able to ping each other over IPv4 and IPV6.

Verified Expert

The solution files are prepared in packet tracer and MS word. The word file contains the IP address scheme for the network which contain IPv4 and IPv6 subnet mask address. This file also contains the configuration commands which are executed in packet tracer. the second solution is design the network in packet tracer and configure the network which includes the IP address for all host,routers and switches.

Reference no: EM131305204

Questions Cloud

Determine the boundary of b : Determine the boundary of B
The euros slide and the reliance of countries : What is the connection between the euro's slide and the reliance of countries that use the euro on foreign demand to help their economies?
How you perceive yourself professionally : A brief overview of how you perceive yourself professionally. You may include a photo. A description of attributes which contribute to professionalism in your chosen field such as professional attire, communication, and behavior.
Explain three contributions that kohlberg made : Explain three contributions that Kohlberg made to our understanding of moral development.
Calculate two subnets in order to provide the ip : ISCG 5337: Introduction to Networks - Calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page - Configure addresses on the hosts using any of the remaini..
What are real exchange rates between dollar and yen : If the exchange rates are $1.50 = £1 and ¥100 = $1, what are the real exchange rates between the dollar and the yen and the dollar and the pound?
Provide analysis of how the information contained in article : Provide an analysis of how the information contained in the article relates to strategic alliance or value opportunities for your current or former organization, using specific examples.
What is affirmative action as a social policy : What is Affirmative Action as a social policy?What were the goals of Affirmative Action? Has it been successful?What are the basic arguments for Affirmative Action and what are those against it? Which side do you find the most convincing and why?
Difference between spot transaction and forward transaction : What does it mean to describe the foreignexchange market as an "over-the-counter market"?- What is the difference between a spot transaction and a forward transaction in the foreignexchange market?

Reviews

inf1305204

12/10/2016 6:05:55 AM

I TRIED TO MAKE THE PAYMENT BUT SOMETHING WRONG WITH WEBSITE BECAUSE I TRIED DIFFRENT CARDS.WHAT SHULD I DO In which version of packet tracer have to configure network ? Cisco Packet Tracer 6.1 for Windows (no tutorials) -Student version.exe

Write a Review

Computer Networking Questions & Answers

  Maturation of industry impact your business strategy

How would the maturation of the industry worldwide impact your business strategy?

  The impact of a catastrophic failure can be the difference

the impact of a catastrophic failure can be the difference between making and breaking an organization. many government

  Process of interpreting a sender''s message into thought

In this print ad, the source of the advertising message is: the Tennessee Department of Tourist Development.

  How will forest functional levels be implemented

How will Forest Functional Levels be implemented? How will cross-forest trusts be implemented? How will replication be handled? Read-Only Domain Controllers - how will they be used?

  Solving networking and security issues

Assume you have been hired through a big restaurant called Habibi's. Habibi's has a small network of 20 consumer workstations and a Windows Server 2003.

  Data validation refers to checking the content

Data validation refers to checking the content of data to ensure that it satisfies certain rules, known as constraints. For example, the employee name should never be omitted in the employee table, and the delivery date should be after (greater th..

  What you expect the subject of standard 1.2.840.113549 to be

Where in the tree would a new Microsoft file format for a new product be placed?

  What is network intrusion detection system

What is Network Intrusion Detection System? Goals and Strategies of NIDS Architecture and Working of NIDS What happens after a NIDS detects an attack?

  What is wimax

What is WiMAX. Discuss why mobile WiMAX is an up-and-coming standard and briefly explain how it works. For what kind of countries, populations, and geographical areas might WiMAX be a good option

  How is the adoption of an enterprise security framework

1. Identify and discuss at least three major evolutionary steps in digital computing/networking experienced in major organizations. If possible, provide such insight regarding your current or former organization.

  Write down a 2- to 4-page paper that includes the following

write a 2- to 4-page paper that includes the following based on your chosen virtual organizationq1. explain the

  Describe concept of subnetting and subnet mask

Describe the concept of subnetting and concept of subnet masks. Why do we utilize subnetting? How do we know which bits are used to recognize network?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd