Network design and simulation tests

Assignment Help Computer Networking
Reference no: EM13726768

You work at XYZ company that needs to break its network address 172.16.0.0 into 5 sub-networks using Cisco routers 2621 range and Cisco 2950 Series Switches.

STEP 1:

To define the addressing scheme of the company XYZ network you will indicate:

1) The subnet mask selected,
2) the maximum number of subnets provided by the selected subnet mask,
3) the maximum number of hosts allowed for each subnet.

STEP 2:

Install Cisco packet tracer.

By using the Cisco packet tracer, draw the network wiring diagram using the necessary network devices (routers and switches). For each sub-network assign one or two workstations.

STEP 3:

By using the Cisco packet tracer, assign IP addresses for network devices and hosts. Configure routers by using static routes to obtain logical connectivity between all subnets. Use the command ping to test the logical connectivity between sub-networks.

STEP 4:

Replace static routes by dynamic routes using RIP protocol.

STEP5

By using the simulation mode of Cisco packet tracer, Analyze all protocols used in the network when we do a test with the command ping between two hosts in different subnets.

STEP6

Write and submit a project report that comments all tasks of this project. submit a Cisco packet tracer file that contains your network design and simulation tests.

Reference no: EM13726768

Questions Cloud

Identify three examples of impressionist painting : Identify three examples of 19th century Impressionist painting or sculpture and three Post-Impressionist works. Explain how the six pieces of art fall into these two styles.
Krispy kremes current worth and cash flows : Strategy and Performance - Krispy Kreme's current worth and cash flows
Describe digital web based marketing channels : What is a Marketing Channel? the origin, evolution over time from when Toros began 1919 to now, Describe Digital Web based marketing channels
Describe digital web based marketing channels : What is a Marketing Channel? the origin, evolution over time from when Toros began 1919 to now, Describe Digital Web based marketing channels
Network design and simulation tests : Write and submit a project report that comments all tasks of this project. submit a Cisco packet tracer file that contains your network design and simulation tests.
Analyze at least two primary economic assumptions : Evaluate the fundamental reasons why price and utilization economic factors in the healthcare setting influence competitive market status in regard to supply and demand for health care services.
Function in php that receives a number as an input : Write a function in PHP that receives a number as an input and returns true if the number is a prime number, and false if it is not prime.
What is the most persuasive idea we want to convey : Communicate the Value: Integrated Marketing Communications BriefPlease select a brand that has a brand problem. What is the most persuasive idea we want to convey
Create database of customers table : 1) Add 10 customers to the database using the Customers table. Show the table, including the SQL Code.2) Using SQL query, update more than one element in a customer record. Show before and after data, including the SQL code.

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe components, devices involved in each topology

Outline the three general network topologies (bus, ring, and star). Describe the components, devices, and arrangement of components and devices involved in each topology, as well as some of the pros and cons of each configuration.

  Characteristics of mobile devices that need to be

1 a major purpose of an organizational knowledge base is to support and allow .a. knowledge sharingb.e-learningc.

  How does a packet from one lan node find its way to a

how does a packet from one lan node find its way to a recipient on the same lan? how does a packet find its way to a

  Question 1a what is cyber terrorism amp information warfare

question 1a what is cyber terrorism amp information warfare in relation to?b what can be made on the subject of cyber

  Explore ways to secure a wireless network

Explore ways to secure a wireless network and present your findings in a brief report(1 page is fine, more is ok). Talk about your own experiences with using a wireless network, including the things you do to keep the network secure.

  Create a powerpoint presentation to provide a succinct

the assessment is based on two blog entries blog 1 and blog 4 which will be posted on the resouce section under

  Given the narrow usable audio bandwidth of the telephone

given the narrow usable audio bandwidth of the telephone transmission facility nominal snr of 56 db 400000 and a

  Implementable wlan design solution for office

Give a most implementable WLAN design solution for office with 20 wireless employees, using WLAN capable laptops to access email, Internet, small accounting applications.

  What are the three main types of network media

Question 1: What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways? Question 2: What are the three main types of network media?

  Compute theoretical maximum channel capacity-telephone lines

Given the narrow (usable) audio bandwidth of the telephone transmission facility, nominal SNR of 56 dB (400,000), and a distortion level of

  Explain how gossiping can help to find those nodes

When searching for files in an unstructured peer- to-peer system, it may help to restrict the search to nodes that have files similar to yours. Explain how gossiping can help to find those nodes.

  Reduction polynomial on the computation?

Addition in  GF (2^4): Compute  A ( x )+ B ( x ) mod  P ( x ) in GF (2^4) using the irreducible

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd