Network diagram says eigrp

Assignment Help Basic Computer Science
Reference no: EM131055213

Lab - Frame Relay Lab

ANSWERS DOCUMENT

Your Name:

Follow the directions in the Lab #2 assignment document titled "Packet Tracer - Configuring Frame Relay Point-to-Point Subinterfaces" to implement the lab network.

There are 2 places where the instructions are slightly different than the network diagram. In these cases, you must follow the instructions and not the diagram. They are:

  1. Network diagram says "EIGRP", but instructions are to use OSPF.
  2. Network diagram shows subinterface numbers as ".1", ".2" or ".3", but instructions say that the DLCI numbers ".102", ".103", etc, should always be used as the subinterface numbers.

When lab is complete, answer questions below. You can enteryour answers into this document or create a separate one.  When complete, saveanswers file as PDF and submit for your Lab #2assignment on D2L.

All results must show the complete output from the command (that is, it should not say "-More-" at the bottom). 

1. On PC, ping to Laptop.  Paste results here.

2. On PC, tracert to Laptop.  Paste results here.

3. On PC, tracert to 209.165.200.226.  Paste results here.

4. On R1, execute show ipinterfaces brief and paste here.

5. On R1, execute show iproute and paste here.

6. On R2, execute show frame-relay map and paste here.

7. On R2, execute show frame-relay pvc and paste here.

8. On router R3, show running configuration (show run) and paste here.

9. You are done!!

Reference no: EM131055213

Questions Cloud

What would be the total return of the bond in percentage : A 8.9 percent coupon bond with 11 years left to maturity is priced to offer a 6.95 percent yield to maturity. You believe that in one year, the yield to maturity will be 8.0 percent. What would be the total return of the bond in dollars? What would b..
Explain the java programming concept of inheritance : Explain the Java programming concept of inheritance. Do all programming languages have Inheritance, and why or why not? Discuss and state how it relates to inheritance. Identify a situation where inheritance behavior would be absolutely crucial.
Write a summary about the article apples supply-chain secret : Write a summary paper about the article "Apple's Supply-Chain Secret? Hoard Lasers". What's apple doings? How apple breaks the rules?
Compute the taxable equivalent yield and yield to maturity : A 4.40 percent coupon municipal bond has 16 years left to maturity and has a price quote of 105.50. The bond can be called in eight years. The call premium is one year of coupon payments. Compute the bond’s current yield. Compute the taxable equivale..
Network diagram says eigrp : Network diagram says "EIGRP", but instructions are to use OSPF. Network diagram shows subinterface numbers as ".1", ".2" or ".3", but instructions say that the DLCI numbers ".102", ".103", etc, should always be used as the subin..
Use the protective list system to protect work of licensee : You must have a corporation or LLC business structure to be a “Brokerage” and hold a real estate broker license. Regulation and oversight of real estate activities in Minnesota is done by the Commissioner of Commerce. The State of Minnesota does not ..
What are the characteristics of ethical leadership : Give an example of ethical leadership. What are the characteristics of ethical leadership? And why do you think ethical leadership is important?
About the lease and buy : Reynolds Construction needs a piece of equipment that costs $350. Reynolds either can lease the equipment or borrow $350 from a local bank and buy the equipment. If the equipment is leased, the lease would not have to be capitalized. In either case, ..
What conclusions can you draw about the ethical issues : What conclusions can you draw about the ethical issues facing business leaders? How would you explain the role of leadership in corporate culture, leadership styles, and how they affect ethical decision making?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The disregard for ethics in an organization.

There have been a number of headline examples recently that have discussed the disregard for ethics in an organization.

  Component of the von neumann architecture of a computer

Which of the following is NOT a component of the von Neumann architecture of a computer

  A tracking system for the students at the school

a tracking system for the students at the school

  Two network security software tools

They must be of a type listed on page 22. Other types are not acceptable unless explicitly agreed by the module leader. c. They must be agreed with your module leader. The means of reaching this agreement are described below.

  List and discuss five areas where threat to data security

List and discuss five areas where threat to data security might occur? 4. Briefly describe the major components of a datawarehouse architecture.

  Useful principle about it management

The novel is generally about what IT Development and Operations (Dev-Ops) has to learn from manufacturing. Summarize as a list, what these recommendations are. For each recommendation, list a page in the novel where the recommendation is made or r..

  The sequence of fibonacci numbers is defined by f0

PROBLEM 1. The sequence of Fibonacci numbers is defined by f0 = 0, f1 = 1, and fn = fn-1 + fn-2, for n > 1.

  Families play an important role in the socialization process

Political scientists believe that families play an important role in the socialization process. Families pass along partyidentification to their children, and politically active families may do so for future generations. Consider the linkbetween your..

  Write a program that reads in an integer

Write a program that reads in an integer, and breaks it into a sequence of individual digits. For example, the input 16384 is displayed as 1 6 3 8 4 You may assume that the input has no more than five digits and is not negative

  Integer value from 1 to20 along with as squared value

Write an application that displays every integer value from 1 to20 along with as squared value

  Identify different it systems that have affected business

Identify five different IT systems that have affected business in the past few years?

  What is the addressing mode of the instruction

What is the addressing mode of the instruction

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd