Design and document an addressing scheme


Assignment: Computer and Information Network

• Part 1 : Knowledge Assessment

• Allow to open books, references, and web surfing

Part 1:

A. Single answer questions:

1. ( ) The goal of fault management is to detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running effectively.

2. ( ) When you add new configuration commands on existing network devices needs, you must verify the commands for integrity before actual implementation takes place.

3. () A properly configured network device can have a disastrous effect on network connectivity and performance.

4. ( )Configuration command parameters must be checked to avoid mismatches or incompatibility issues.

5. ( ) To configure from a personal computer for router or switch, what kind of line shall be selected to use? (A) serial DTE;(B) straight through fast Ethernet; (C) crossover fast Ethernet; (D) console

6. ( ) Where is the startup configuration file stored on a standard router or switch? (A) NVRAM; (B) ROM; (C) HDD; (D) SSD

7. ( )As shown in following figure, 4 hosts are being added to the 172.16.112.0 network. Which IP address is invalid as a host address for this network?

(A) 172.16.113.55; (B) 172.16.112.255; (C) 172.16.127.255; (D) 172.16.120.96

8. (  ) As shown in following figure, how many collision domains exist in the exhibited network?

(A) 1; (B) 2;(C) 3; (D) 4; (E) 6;

9. ( ) A wireless network has one access point installed. Users at some locations in the office complain that their wireless access is slow, while others say that the wireless network performance is fine. What should be done to remedy this situation?

(A) Replace the access point; (B) Upgrade the wireless NICs in the hosts that are slow; (C) Convert back to a wired network.; (D) Install another access point at another location within the office

10. ( ) Which device performs the function of determining the path that messages should take through internetworks?

(A) switch; (B) router; (C) firewall; (D) DSL modem; (E) firewall; (F) Web server

11. ( ) Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

(A) intranet; (B) extranet; (C) wireless LAN; (D) wireless WAN

12. ( )Which expression accurately defines the term bandwidth?

(A) a method of limiting the impact of a hardware or software failure on the network; (B) a set of techniques to manage the utilization of network resources; (C) a measure of the data carrying capacity of the media; (D) a state where the demand on the network resources exceeds the available capacity

13. ( ) A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?

(A) devices with support for modularity; (B) devices with a fixed number and type of interfaces; (C) devices that have support for network monitoring; (D) redundant devices

14. ( ) Why is it important for the router to maintain an accurate routing table?

(A) to determine the best path to the destination network; (B) to provide Layer 2 addressing information for the next hop; (C) to prevent broadcasts from occurring on the LAN; (D) to identify all of the routers in a network

15. ( ) In what two situations would UDP be the preferred transport protocol over TCP?

(A) when destination port numbers are dynamic; (B) when delivery overhead is not an issue; (C) when applications do not need to guarantee delivery of the data; (D) when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated;

B. Multi-answers questions:

1. ( ) A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network?

(A) better security; (B) easy to create; (C) better device performance when acting as both client and server; (D) lacks centralized administration; (E) less cost to implement; (F) scalable.

2. ( )What two criteria are used to help select a network medium from various network media?

(A) the types of data that need to be prioritized; (B) the cost of the end devices utilized in the network; (C) the distance the selected medium can successfully carry a signal; (D) the environment where the selected medium is to be installed;(E) the number of intermediate devices installed in the network.

3. () Which two statements describe intermediary devices?

(A) Intermediary devices generate data content; (B) Intermediary devices direct the path of the data; (C) Intermediary devices alter data content; (D) Intermediary devices connect individual hosts to the network; (E) Intermediary devices initiate the encapsulation process.

4. () What are two functions of end devices on a network?

(A) They originate the data that flows through the network; (B) They direct data over alternate paths in the event of link failures; (C) They filter the flow of data to enhance security; (D) They are the interface between humans and the communication network; (E) They provide the channel over which the network message travels

5. () Which 2 addresses are valid public addresses? (Choose 2):

(A) 64.104.78.227; (B) 198.133.219.17; (C)192.168.1.1245; (D) 10.15.205.5; (E)128.107.12.117;

C. Manipulation / Questions:

1. As shown in following figure, considering the information that follows and the exhibit, (1) where is the data flowing? (2) From host to default gateway router.

Source IP address: 192.168.1.88; Destination IP address: 209.165.200.225

Source MAC address: 00-11-12-7a-41-10; Destination MAC address: 00-0d-cc-f4-ad-2c; Source Port: 1464; Destination Port: 23

2. What is the function of Routing protocol?

Part 2: Physical Implementation via Packet Tracer

Topology Diagram

Addressing Table

Device

Interface

IP Address

Subnet Mask

Default Gateway

HQ

Fa0/0

     

S0/0/0

 

 

 

S0/0/1

 

 

 

B1

Fa0/0

 

 

 

S0/0/0

 

 

 

B2

Fa0/0

 

 

 

S0/0/1

 

 

 

PC1

NIC

 

 

 

PC2

NIC

 

 

 

PC3

NIC

 

 

 

Objectives

• Design and document an addressing scheme based on requirements.
• Select appropriate equipment and cable the devices.
• Apply a basic configuration to the devices.
• Verify full connectivity between all devices in the topology.
• Identify layer 2 and layer 3 addresses used to switch packets.

Task 1: Design and document an addressing scheme.

Step 1: Design an addressing scheme.

Based on the network requirements shown in the topology, design an appropriate addressing scheme.

• Starting with the largest LAN, determine the size of each subnet you will need for the given host requirement.

• After the addresses have been determined for all the LAN subnets, assign the first available address space to the WAN link between B1 and HQ.

• Assign the second available address space to the WAN link between HQ and B2.

(Note: Remember that the interfaces of network devices are also host IP addresses and are included in the above addressing requirements.)

Step 2: Document the addressing scheme.

• Use the blank spaces on the topology to record the network addresses in dotted-decimal/slash format.
• Use the table provided in the printed instructions to document the IP addresses, subnet masks and default gateway addresses.

- For the LANs, assign the first IP address to the router interface. Assign the last IP address to the PC
- For the WAN links, assign the first IP address to HQ.

Task 2: Select equipment and cable devices.

Step 1: Select the necessary equipment.

Select the remaining devices you will need and add them to the working space inside Packet Tracer. Use the labels as a guide as to where to place the devices.

Step 2: Finish cabling the devices.

Cable the networks according to the topology taking care that interfaces match your documentation in Task 1.

Task 3: Apply a basic configuration.

Step 1: Configure the routers.

Using your documentation, configure the routers with basic configurations including addressing. Use cisco as the line passwords and class as the secret password. Use 64000 as the clock rate.

Step 2: Configure the PCs.

Using your documentation, configure the PCs with an IP address, subnet mask, and default gateway.

Task 4: Test connectivity and examine the configuration.

Step 1: Test connectivity.

RIP routing has already been configured for you. Therefore, you should have end-to-end connectivity.

• Can PC1 ping PC2? _____yes___
• Can PC1 ping PC3? _____yes___
• Can PC3 ping PC2? ______yes__

Troubleshoot until pings are successful.

Step 2: Examine the configuration.

Use verification commands to make sure your configurations are complete.

Task 5: Identify layer 2 and layer 3 addresses used to switch packets.

Step 1: Create a simple PDU ping packet

• Enter Simulation Mode.
• Use the Add Simple PDU button to create a ping from PC1 to PC3.
• Change "Edit Filters" so that only ICMP is simulated.

Step 2: Addresses at PC1

Record the addresses used by PC1 to send the ping packet to B1:

Layer 3 Source: _______________192.168.1.126__________________________
Layer 3 Destination:______________192.168.1.222___________________________
Layer 2 Source: _____________________0001.9713.OEDB____________________
Layer 2 Destination: ______________________0002.1669.A701___________________

Step 3: Addresses at B1

Record the addresses used by B1 to switch the ping packet to HQ:

Layer 3 Source: ______________________192.168.1.126___________________
Layer 3 Destination:_______________192.168.1.222__________________________
Layer 2 Source: __________________None_______________________
Layer 2 Destination: __________________0x8f_______________________

Step 4: Addresses at HQ

Record the addresses used by HQ to switch the ping packet to B2:

Layer 3 Source: _______________192.168.1.126__________________________
Layer 3 Destination:_____________192.168.1.222____________________________
Layer 2 Source: ___________________None______________________
Layer 2 Destination: ________________________0x8f_________________

Step 5: Addresses at B2

Record the addresses used by B2 to switch the ping packet to PC3:

Layer 3 Source: ______________192.168.1.126___________________________
Layer 3 Destination:___________192.168.1.222______________________________
Layer 2 Source: ______________0001.64C5.8501___________________________
Layer 2 Destination: _______________000D.BDBB.E27C__________________________

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Attachment:- Diagrams.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Design and document an addressing scheme
Reference No:- TGS03005833

Expected delivery within 24 Hours