Test network connections between any two pcs, Computer Networking

Assignment Help:

Use Packet Tracer software to model the network that you have designed, and configure the network to make sure it is running properly.

The following requirements should be met:

• All the PCs except the ones in the server room are workstations.

 In the server room, there is a Web Server and a DNS Server.

• Test network connections between any two PCs, and provide evidence.
• Assign appropriate IP addresses for all the workstations and servers in the network.
• Configure the DNS server and the web server.

Make sure any PC in the network can load the webpage from the web server properly. The work of Task 2 and 3 needs to be submitted in the electronic format. Please include the Packet Tracer file in the submission. Screenshots should be included in the report.

 


Related Discussions:- Test network connections between any two pcs

Which decision called socket base, IP plus port (IP on layer 3 and port on ...

IP plus port (IP on layer 3 and port on Layer 4 - In Encapsulation, socket base decision on Network Layer -Layer 3)

Describe the static routing process, Describe the static routing process ...

Describe the static routing process A static routing method does not adapt to changing conditions on the network but uses a fixed method developed ahead of time. With alternat

LAN, what is man LAN wan

what is man LAN wan

Protocol layers and their service models - computer network, Protocol Laye...

Protocol Layers and their Service Models The  internet is an extremely complicated system. It  consists of many  pieces like  numerous  applications and protocols  various  t

Working of internet, As discussed in the earlier section each computer link...

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer

Give the solutions to the threats, Give the solutions to the threats In...

Give the solutions to the threats In order to implement solutions to the threats, it is advisable that the company should maintain proper password protected hardware. Wherever

How to protect computer hardware by threats, How to protect computer Hardwa...

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

What is a protocol, What is a protocol? The term protocol refers to a s...

What is a protocol? The term protocol refers to a set of rules and process that govern the transmission of messages over a physical networking medium. The most common network p

Media, explain history of internet?

explain history of internet?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd