What are the sizes of ram, flash and nvram

Assignment Help Computer Networking
Reference no: EM13735447

A small business, Smart Office Services Pty Ltd, has its central office (HQ) and two branch offices (BRANCH 1 and BRANCH 2) linked via serial leased lines using routers. The network topology is given as follows. It is required that:

a) You will be assigned a single IP to configure this network.

b) You must e-mail your lecturer to request an IP address. Once you have received your allocated IP address you need to reply with a confirmation e-mail.

Study the network topology, examine the network requirements, set up the network in Packet Tracer and complete all five sub-questions.
Keep in mind that IP addresses will be needed for each of the LAN interfaces.

Question 1:

Identify the different subnets according to network requirements. Please analyse and design the best IP addressing scheme.

Create a table which lists the following information: Router Interfaces/ IP Address (Highest)/ IP Address (Lowest)/ Subnet Mask/ Default Gateway). Please show working out.

Note: The lowest IP addresses of each subnet should be given to the PCs. The highest IP addresses of each subnet are given as the default gateway.

Question 2:
Set up the required network in Packet Tracer software. Select one router in the topology, type the command "show version" in the CLI interface. What is the version number of IOS? What are the sizes of RAM, Flash and NVRAM?

Question 3:

Configure the three (3) routers:

- name the routers and label them as HQ, BRANCH 1 and BRANCH 2
- set the secret password as ‘class' on all routers
- configure interfaces/ PCs
- configure TELNET on the HQ router with a password of ‘xyz123' and (a suitable) MOTD
- Verify basic configuration and router operations

Question 4:

Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers.

"Show ip route" check and screen shot each router's routing table.

Question 5:

PING from PC6 in LAN6 to PC4 in LAN4 (checked in Packet Tracer file). What protocol is used by PING? What are the names of two PING messages?

Record the information flow in EVENT LIST of simulation and explain the PDU information such as TYPE and involved layers in each stage.

Reference no: EM13735447

Questions Cloud

Calculate the annual income effect on hours worked : Suppose you win a lottery, and your after-tax gain is $40,000 per year until you retire. As a result, you decide to work part time at 32 hours per week in your old job instead of the usual 40 hours per week. Calculate the annual income effect on hour..
What effect would this change in the price of pens : Consider the market for two goods that are substitutes, such as pens and pencils. if a technological breakthrough reduced the cost of producing pens. A/ what would happen the supply of pen? B/ what would happen on the price of pens and the quantity e..
Deduction for prompt payment is equivalent : The treasurer of a firm noted tha many invoices were received with the following terms of payment: "2%- days, net 30 days." Thus, if the bill is paid within 10 days of its date, he could deduct 2%. Or the full amount would be due 30 days from the inv..
Sacred temple hidden in the deep mountains : Once upon a time there was a sacred temple hidden in the deep mountains, in which believers gathered to exercise meditation to become saints. The believers sat in a circle facing each other while meditating during the day, and retired to their separa..
What are the sizes of ram, flash and nvram : Identify the different subnets according to network requirements. Please analyse and design the best IP addressing scheme and what is the version number of IOS? What are the sizes of RAM, Flash and NVRAM?
Explain the concepts of election and convenant : Write one paragraph explaining the concepts of election and covenant. How might these concepts effect efforts for Religious Tolerance?
Summarize the use of storytelling in the cultures of artwork : To conclude, summarize the use of storytelling in the cultures represented in the three artworks below. Funerary Stele of Amenemhat, c. 2000 BCE. Painted limestone. Egyptian Museum, Cairo.
Describe the companys target market in terms of its size : Describe the company's target market in terms of its size, competitors, and the specific needs and wants of potential customers that your product or service is likely to satisfy
Graph the supply and demand curves : The equation for the demand curve for hotel rooms in Boston is given by P = 5000-0.48Qd. The supply curve is given by P = 0.02Qs. Prices are nightly rates in dollars.

Reviews

Write a Review

Computer Networking Questions & Answers

  Recognize roi and npv of wireless order-taking system

Recognize ROI and NPV of wireless order-taking system. Explain some of intangibles Lisa requires to consider and make recommendation as to whether Lisa must order such a system.

  When organizations develop risk management plans they need

when organizations develop risk management plans they need to consider the value of the assets being protected and the

  Suggest a sub-network design

Acme Computing Corp. has remote sites in Port Clinton and Napoleon in addition to their main site in Toledo. There are currently 29 devices connected to the network in Toledo. The corporate plan is to link the Port Clinton and Napoleon offices to ..

  What is needed to accelerate its deployment

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  How and why are these processes more complex in a modern

1.describe authentication and authorization. which depends on the other? how and why are these processes more complex

  I outlinethis case study will require you to1 build a small

i. outlinethis case study will require you to1 build a small network using three switches and one router2 one switch

  Differentiate between a two-tier clientserver system and a

differentiate between a two-tier clientserver system and a three-tier clientserver system. why would a firm choose one

  Thesis statement pertaining to social networking

Develop a thesis statement pertaining to social networking. Identify writing strategies (mind mapping, brainstorming, and free writing)for developing the thesis and summarize experiences.

  Question 1one of the criticisms of measurement of the work

question 1one of the criticisms of measurement of the work of software engineers is that they will probably change how

  Deliver a research paper and presentation based on your

deliver a research paper and presentation based on your research.future threats to network security and planning for

  Question 1awhat is your knowing for the term cyber weapon

question 1awhat is your knowing for the term cyber weapon? give an example of a cyber weapon.bhow was sony play station

  What is utc and why is it used

The topics above are linked to each other and the question, they are not independent of each other. They are provided as a minimal guide only. Do not simply write an unconnected paragraph on each without linking the concepts together.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd