Explain and analysis the routing process of three routers

Assignment Help Computer Networking
Reference no: EM131195248

Assignment

Task

There are Eight tasks to complete in this assignment.

Using Packet tracer implement the following tasks based on the network topology of a small business given below. Smart Sale Pty Ltd has four departments: Sales, Production, Marketing and Management. Its Central office (HQ) controls the connection between Internet Service Provider (ISP) and one local office (R1). Examine the network requirements and complete the eight questions to make the company network service running.

You must submit your answer file in word or pdf and packet tracer file to EASTS by the due date.

Please use your last 4 digits of your student ID as the first two octets of your network address. Keep other bits same as what are shown in the addressing table and the figure below. For example,if your student ID is 11555787, using the last 4 digits (5787). your main network address will be 57.87.0.0.

Consider the following Topology in the figure below:

125_Topology Diagram.jpg

Addressing Table

Device

Interface

IP Address

Subnet Mask

Default Gateway

VLAN N/A

R1

50/0/0

x.x.1.2

255.255.255.0

N/A

G0/0.10

x.x.10.1

255.255.255.0

N/A

10

60/0.20

x.x.20.1

255.255.255.0

N/A

20

60/0.30

x.x.30.1

255.255.255.0

N/A

30

60/0.88

xx.88.1

255.255.255.0

N/A

88

60/0.99

x.x.99.1

255.255.255.0

N/A

99

Si

VIAN 88

x.x.88.33

255.255.255.0

x.x.88.1

88

PC-A

NIC

x.x.10.21

255.255.255.0

x.x.10.1

10

PC-8

NIC

x.x.20.22

255.255.255.0

x.x.20.1

20

PC-C

NIC

x.x.30.23

255.255.255.0

x.x.30.1

30

PC-D

NIC

x.x.88.24

255.255.255.0

x.x.88.1

88

VLAN Table

VIAN

Name

Interfaces

10

Sales

F0/11-15

20

Production

F0/16-20

30

Marketing

F0/5-10

88

Management

F0/21-24

99

Native

61/1

You need to use Packet Tracer to implement the given topology and to complete the following tasks:

1. Configure four VLANs as required on S1 and enable Trunking on S1.

2. Configure inter-VLAN routing on R1 based on the Addressing Table.

3. Configure four directly attached static routes on HQ to four VLANs: 10, 20, 30 and 88.

4. Configure directly attached static routes on HQ to reach Outside Host.

a. Configure the primary path through the Serial 0/1/0 interface.

b. Configure the backup route through the Serial 0/1/1 interface with a 10 AD.

5. Configure directly attached primary and backup summary routes on ISP for the entire x.x.0.0/17 address space.

a. Configure the primary path through the Serial 0/1/1 interface.

b. Configure the backup route through the Serial 0/1/0 interface with 25 AD.

6. Configure a directly attached default route on R1.

7. Verify connectivity by making sure all the PCs can ping Outside Host.

8. Explain and analysis the routing process of three routers in the case of ping from PC-A to Outside Host.

Rationale

In this assessment item, tasks are designed to reinforce the application of configuring routers for inter-VLAN communication and configure static routes to reach destinations outside of your network. Your ability demonstrate your skills at configuring inter-VLAN routing, static and default routes are also included.

The tasks in this assignment relate to Learning Outcome 3 & 4:

- be able to configure and troubleshoot networks to improve efficiency and security;

- be able to configure, verify and solve a variety of problems involving Virtual Local Area Networks;

Reference no: EM131195248

Questions Cloud

What elements does strong organizational culture display : According to McGuire, what elements does strong organizational culture display? you will need to access Gert Hofstede's website to answer this question. If you are an organization interested in establishing a strong market presence in China, Brazil, ..
Explain five operations on a binary search adt : In a way I can understand and grasp this concept, Please Explain five operations on a binary search ADT.
How large a wozac plant the company should build : Determine how large a Wozac plant the company should build to maximize its expected profit over the next 10 years.
Estimate the maximum compaction attainable in the landfill : A landfill operation uses a tractor to compact the waste. The tractor weighs 8 tons and has two tracks, each 2 ft 10 ft. Estimate the maximum compaction attainable in the landfill.
Explain and analysis the routing process of three routers : Configure the backup route through the Serial 0/1/0 interface with 25 AD. Explain and analysis the routing process of three routers in the case of ping from PC-A to Outside Host.
How does the feds monetary policy affect economic conditions : How does the Fed's monetary policy affect economic conditions?- Trade-offs of Monetary Policy Describe the economic trade-off faced by the Fed in achieving its economic goals.
Design a greedy algorithm using pseudocode : Design a greedy algorithm using pseudocode that solves this optimization problem of transferring files to disk while minimizing unused storage. The inputs to this algorithm are the number of files n, corresponding sizes (in MBs) s1, ... sn, m the ..
Assumed to increase at annual compound rate : How much money would have to be placed in a sinking fund each year to replace machine B at the end of 25 years if the fund yields 10% annual compound interest and if the first cost of the machine is assumed to increase at a 6% annual compound rate?
How much sooner will the town need a new landfill : how much more will this cost the town. How much sooner will the town need a new landfill?

Reviews

Write a Review

Computer Networking Questions & Answers

  Implement some very sophisticated server-side scripting

Discuss this in relation to server security, the continuing trend to eCommerce and the continual rise in popularity of PHP as a solution to eCommerce applications.

  Implement cipher-combining ascii representation of plaintext

Particular cipher is implemented by combining ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using XOR function.

  Intercept message and generates alternative message

Computed hash value for the message. Alice is able to intercept message, and generates alternative message that has a hash value that collides with Bob's original hash value. Show.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Determine how many floors are in a building

Imagine you are working for an in-house software team for a company that wants to monitor network access points in a building. Each building has a specified number of floors, a certain number of rooms per floor, and some number of network access p..

  Access control lists

Per the text, ACLs help by allowing or disallowing a subset of packets from reaching a particular destination. ACLs give network engineers a way to identify and control different types of packets.

  How do the tcp/ip layers map to the osi layers

Describe and explain the similarities and differences between the OSI model and the TCP/IP Architecture.

  Design and verify the equivalence function

Draw and label a diagram showing the connections among the exclusive-NOR gates and the AND gate to implement the equivalence logic.

  Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

  Depict topology in the diagram

Depict topology in the diagram, Determine if this is a peer-to-peer or client-server network. Be sure to explain what assumption drove you to select it.

  Assuming no inflation and an interest rate of 4 what

could you please solve the following the problems?a a truck is purchased for 20000. at the end of its 5 year life its

  What type of media is typically used for connectivity

What are the advantages and disadvantages of your selection? What type of media is typically used for connectivity? What are the performance specs in terms of reliability, speed capabilities, and nominal distance for reliable spans with the typica..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd