Identify different subnets according to network requirements

Assignment Help Computer Networking
Reference no: EM13729289

A small business, Smart Office Services Pty Ltd, has its central office (HQ) and two branch offices (BRANCH 1 and BRANCH 2) linked via serial leased lines using routers. The network topology is given as follows. It is required that:

a) You will be assigned a single IP to configure this network.

b) You must e-mail your lecturer to request an IP address. Once you have received your allocated IP address you need to reply with a confirmation e-mail.

Study the network topology, examine the network requirements, set up the network in Packet Tracer and complete all five sub-questions.

Keep in mind that IP addresses will be needed for each of the LAN interfaces.

Question 2.1:

Identify the different subnets according to network requirements. Please analyse and design the best IP addressing scheme.

Create a table which lists the following information: Router Interfaces/ IP Address (Highest)/ IP Address (Lowest)/ Subnet Mask/ Default Gateway). Please show working out.

Note: The lowest IP addresses of each subnet should be given to the PCs. The highest IP addresses of each subnet are given as the default gateway.

Question 2.2:

Set up the required network in Packet Tracer software. Select one router in the topology, type the command "show version" in the CLI interface. What is the version number of IOS? What are the sizes of RAM, Flash and NVRAM?

Question 2.3:

Configure the three (3) routers:

- name the routers and label them as HQ, BRANCH 1 and BRANCH 2
- set the secret password as ‘class' on all routers
- configure interfaces/ PCs
- configure TELNET on the HQ router with a password of ‘xyz123' and (a suitable) MOTD
- Verify basic configuration and router operations

Question 2.4:
Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers.

"Show ip route" check and screen shot each router's routing table.

Question 2.5:

PING from PC6 in LAN6 to PC4 in LAN4 (checked in Packet Tracer file). What protocol is used by PING? What are the names of two PING messages?

Record the information flow in EVENT LIST of simulation and explain the PDU information such as TYPE and involved layers in each stage

Reference no: EM13729289

Questions Cloud

Allowance for children and teens : 1) Which of the following is the smartest way to handle allowance for children and teens?
Describe the evaluation and measurement procedures : Describe the evaluation and measurement procedures to be used to monitor overall performance of the action plan, including quantitative measures and allowable time frames
What is the firms free cash flow of that year : A firm has $ 3 million market value and it sells preferred stock with a par value of $100. If the coupon rate on the preferred stock is 9% and the preferred stock trades at $85, what is the cost of preferred stock financing? A firm reports that in a ..
Identify two types of budgets from the five budget types : Identify two types of budgets from the five budget types, Line-Item, PerformanceBased, Program, Lump-Sum, and ZeroBased.
Identify different subnets according to network requirements : Identify the different subnets according to network requirements - Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers.
Growth coupled with heightened volatility : Please read the questions carefully before writing your responses. There is no ‘model' or ‘unique' answer to the discussion questions. The questions require brief, considered, responses. A premium will be placed on cogent, well-reasoned responses...
Summarize quality management and assurance concepts : Summarize quality management and assurance concepts along with the participation of major contributors to the quality field.
Compute weighted average cost of capital if firms tax rate : Sirom Scientific Solution has $10 million of outstanding equity and $10 million of bank debt. The bank debt costs 7% per year. The estimated equity beta is 2. IF the market risk premium is 8%, and the risk -free rate is 5%, compute the weighted avera..
Calculate the value index for each car : You have just graduated from college and are looking to buy your first car. Money is tight right now, so you are concerned with initial cost as well as ongoing expenses. Which car provides you with the greatest value? Use formulas to calculate the ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Cnt-books wants an affordable

CNT-Books wants an affordable way to establish remote connections for its salespeople, who log on from customer sites all over the country, and its three branch offices.

  Research various features that were added to ipv6 protocol

Take the time to research the various features that were added to the IPv6 protocol (compared to IPv4). Choose one feature and provide a brief explanation of its benefits.

  Q1 explain clientserver architecture including fat and thin

q1. explain clientserver architecture including fat and thin clients middleware and clientserver tiers.q2. make use of

  Explain how professional associations and state regulatory

write a 1050- to 1750-word paper in which you discuss the content in each site the professionals involved and how the

  Explain why wbs has different levels

Explain why a WBS has different levels and what each level represents. Respond to the following: "If you were a project manager in charge of employees affected by the above situation.

  Describe the purpose of the dynamic host control protocol

question 1 what is the purpose of the address resolution protocol arp?question 2 what is the purpose of the dynamic

  Data communications and net-centric computing

List A below contains the layers of the internet protocol. List B contains items and applications associated with these layers. Recreate the answer table show below in your answer booklet and put the protocol layers in their correct order.

  Discuss the possibility of setting up a wireless network

Imagine you are a wireless network contractor and you are meeting with a potential client over lunch to discuss the possibility of setting up a wireless network in the client's building.

  Choose to run over tcp rather than udp

Describe why an application developer might choose to run over TCP rather than UDP. Suppose host A is sending host B a large file over a TCP connection. If the acknowledge number for a segment of this connection is y, then the acknowledge number for ..

  Diagram of simplest connection between two computers

Using Ethernet Network Interface Cards or NICs, diagram simplest connection between two computers which will allow for communications and resource sharing.

  Athe keyspace for a cipher is the set all of possible keys

athe keyspace for a cipher is the set all of possible keys that can be used for the cipher. a des key consists of 56

  A number of drivers of change have transformed the roles

a number of drivers of change have transformed the roles functions and responsibilities of an operations manager over

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd