W2+Guided+Practice+VLSM
.docx
keyboard_arrow_up
School
ECPI University *
*We aren’t endorsed by this school
Course
CIS202L
Subject
Computer Science
Date
Apr 28, 2024
Type
docx
Pages
12
Uploaded by PresidentMask13432
Introduction to Routing and Switching Week 2 Guided Practice: VLSM
Objective
In this Guided Practice you will be connecting and configuring a small subnetted network with multiple routers. Technology
You will use Packet Tracer in this practice. Anytime you see a 50 in an IP address replace with your assigned number.
Task 1 – Adding and connecting devices
You will start with the network shown below that is given to you in the packet tracer file in this practice. You will connect to the CSU-DSU later in this practice. For now, you can select the network below and drag it to the corner of your Packet Tracer desktop.
Your instructor has assigned you a unique network number.
Make sure to use this unique network
number throughout the Guided Practice where indicated by an underscore ___.
Drag and label the following devices to the desktop: three 4321 routers, three 2960 switches, four PCs, two servers, a RT300N wireless router and a smart phone.
Make sure to add serial port modules to the routers as you did in the previous Guided Practice. Connect the routers together using a Serial DCE cable.
Click and drag from the R1 router (connect to S0/1/0) to the R2 router and connect to S0/1/1. Again, using the Serial DCE cable, click and drag from the R2 router (connect to S0/1/0) to the R3 router and connect on S0/1/1. Finally connect from the R3 router, S0/1/0, to the R1 router on S0/1/1. We will now connect the other devices. Connect from the G0/0/0 port on the R2 router to the G0/1 port
on the Sw1 switch using a straight-through cable. Connect Server1 to Fa0/1 on the Sw1 switch and Sever2 to Fa0/12 on the Sw1 switch using a straight-through cable.
Connect from the G0/0/0 port on the R3 router to the G0/1 port on the Sw2 switch using a straight-
through cable. Connect the Sw2 switch on port G0/2 to the Sw3 switch on port G0/1 using a straight-
through cable. Connect PC1 to Fa0/1 on the Sw2 switch and PC2 to Fa0/12 of the Sw2 switch using a straight-through cable. Connect PC3 to Fa0/1 on the Sw3 switch and PC4 to Fa0/12 of the Sw3 switch using a straight-through cable.
Finally, connect the G0/0/1 port on the R1 router to the Internet port of the WRT300N wireless router using a straight-through cable. The smart phone should automatically be connected to the WRT300N.
You will notice that the connections to the PCs and servers have all turned green, but the links to the routers are still red. We will configure the routers in the next task and all links will turn green. Take a screenshot.
Deliverables for Task 1
Screenshot of your network labeled and connected.
Task 2– Configure the network In this task we will configure the devices. We will need to bring up the router interfaces to a usable state and assign IP addresses to them. We will configure the switches with VLANs and trunks. Start off by bringing each of the router interfaces
we are using up. Below is an example of bringing up the interfaces for the R2 router. Do the same for the R1 and R3 router interfaces.
Look at the table below. This is a standard network connection grid that you will be using in the future for all your network programming. Notice we are using different subnet masks on the routers - we will be using VLSM
(Variable Length Subnet Mask), a technique that allows network administrators to divide an IP address space into subnets of varied sizes, rather than dividing it into subnets of the same size.
System
Port
Connect To
IP address
Subnet Mask
Clock
Rate
Users
<studentID>-R1 G0/0/0 CSU-DSU 11.0.0.___ 255.255.255.0 G0/0/1 Wi-Fi 192.168.___.241 255.255.255.252 1 S0/1/0 R2 172.16.___.1 255.255.255.252 500000 S0/1/1 R3 172.16.___.10 255.255.255.252 <studentID>-R2 G0/0/0.10 Sw1 192.168.___.225 255.255.255.248 5 G0/0/0.20 Sw1 192.168.___.233 255.255.255.248 5 S0/1/0 R3
172.16.___.5 255.255.255.252 500000 S0/1/1 R1
172.16.___.2 255.255.255.252 <studentID>-R3 G0/0/0.10 Sw2 192.168.___.1 255.255.255.128 100 G0/0/0.20 Sw2 192.168.___.129 255.255.255.192 50 G0/0/0.30 Sw2 192.168.___.193 255.255.255.240 10 G0/0/0.40 Sw2 192.168.___.209 255.255.255.240 10 S0/1/0 R1 172.16.___.9 255.255.255.252 500000 S0/1/1 R2
172.16.___.6 255.255.255.252
Make sure you refer to the previous Guided Practice for creating sub-interfaces on the R2 and R3 routers.
Once you configure all the interfaces in the table above, run a show ip interface brief
on each router to show each one configured. Take a screenshot of each. Here is an example from the R2 router.
Configure the clock rate for the DCE ends of each link between the routers. Take a screenshot of each. Below is an example from the R1 router.
Let us now configure the VLANs and trunks on the switches. Notice we added VLANs 30 and 40 to S2.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Addressing Schemes – Subnetting
The Iconic Production is a company newly established in the vicinity of Midrand in the city of Tshwane. The company has just hired you as their network engineer. You are told that the company currently has three departments: HR, Marketing and Operations. You are given the IP address: 192.168.5.0/24. You are required to subnet it as efficiently as possible in order to meet the requirements for the following number of hosts in the company’s network:• HR department: 13 hosts• Marketing department: 61 hosts• Operations department: 28 hosts• Link HR-M: 2 addresses• Link HR-O: 2 addresses• Link M-O: 2 addresses
For each of the subnets, determine:• The Network ID• The subnet mask• The total number of hosts addresses• The number of usable host addresses• The range of usable host addresses• The broadcast address
arrow_forward
Data communication course
A company that carries out international cargo business has offices and transfer stations at different points.
The company carries out transportation by land, sea and air. Different packages are used for each kind of transport. At the transfer stations, if necessary, package type is changed according to the next transportation type, and it will be directed to the destination.
Q2)= Which situations in this scenario can be compared to the difference between TCP and UD protocols?
arrow_forward
IP Header has a field TTL ( Time To Live). Which among the following statement best explain the use of TTL(a) It can be used to prioritize the packets(b) It can be used to reduce the delay.(c) It can be used to optimize the throughput.(d) It can be used to prevent packet looping.
arrow_forward
Computer Science
As a network consultant, you are given the complete access to customers’ infrastructure, all features in routers/instruments, and all the customers’ data collection. You have been assigned to address the following customers’ queries:
1) Customer A is experiencing a high network traffic problem within one of its private networks. The customer suspects that the traffic is generated by computers that are infected with malicious software where it has been sending spam messages without the owners' knowledge. The customer is asking for your help to monitor the amount of traffic due to this network and possible hosts that had been infected. Analyze the necessary steps you would take to address the query and clearly state all the assumptions. Evaluate the practical data that you may consider to be included in your analysis.
arrow_forward
FTP, on the other hand, requires verification that a file has been correctly transmitted to a client, but it does not give a built-in means to track this information. File Transfer Protocol (FTP) relies on the TCP/IP architecture's Transport layer to ensure that data is delivered.
arrow_forward
DNS settings may be categorised in several ways. All of them must be simplified into manageable parts, complete with illustrations and arguments. Can the same IP address be used for both the company's web server and its email server?
arrow_forward
Request to send (RTS) and its threshold are defined.
arrow_forward
Data-Com-Comp-Networks Week 1 TCP/IP Configuration
The TCP/IP protocol is the universal standard for network and Internet communication. Take a moment to comment on at least one aspect of the TCP/IP network stack and how it’s important. Also, what TCP/IP configuration is needed for a computer to connect to a network?
arrow_forward
Using Cisco Packet Tracer
arrow_forward
Computer Networks - Dynamic Routing and Name Resolution
arrow_forward
Intermediary devices form interface with human network &
communications network. *
True
False
In TCP/IP Model, the Internet Layer responsible to find the best path
between source and destination.
False
True
The Transport Layer Numbering the Segment in the Source, and
Reassemble Segments in the Destination side. *
False
True
One of the Primary function of the Session Layer is the Data Compression
on the Source side. *
True
False
arrow_forward
answer only 100% sure else downvote strictly posted multiple times dont answer if not known
dont post existing ones
arrow_forward
In your role as a network administrator, under what conditions would you choose to employ a static route configuration?
arrow_forward
FTP doesn't have a built-in method for tracking the progress of files that have been sent to clients. File Transfer Protocol (FTP) depends on a different protocol at the TCP/IP architecture's Transport layer to guarantee a successful transfer.
arrow_forward
As much as FTP needs verification of successful file transmission, it does not provide a means for the server to independently monitor this information. Transport layer TCP/IP protocols depend on the File Transfer Protocol (FTP) for ensuring that the delivery is successful.
arrow_forward
Switch ports security is a serious security concern to computer networks. As a network specialist consultant, you have been approached by a start-up company to implement some port security configurations on the newly acquired switch on their network. They want you to restrict access on the switch only to authorised devices. Below is the start-up network overview:A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to the switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the network to access data on the server Server0.3.1 Create this network on packet tracer using the information below. • Connect a Laptop (Laptop0) Fa0 to Hub0 Fa0; then connect Hub0 Fa3 to the Switch0Fa0/1.• Connect a PC (PC0) Fa0 to Hub1 Fa0; • Connect a PC (PC1) Fa0 to Hub1 Fa1; • Connect a PC (PC2) Fa0 to Hub1 Fa2; • Connect Hub1 Fa3 to Switch0 Fa0/2.• Connect…
arrow_forward
Switch ports security is a serious security concern to computer networks. As a network specialist consultant, you have been approached by a start-up company to implement some port security configurations on the newly acquired switch on their network. They want you to restrict access on the switch only to authorised devices. Below is the start-up network overview:A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to the switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the network to access data on the server Server0.
Configuration of Switch0 Fa0/1 port:a. Enable port security on Switch0 Fa0/1 port.b. Configure Switch0 Fa0/1 port to dynamically learn the MAC address of the end device that is currently connected to it.c. Enable (define) the Switch0 to be able to learn a maximum of 1 host on its Fa0/1 port.d. If an unauthorised device…
arrow_forward
Switch ports security is a serious security concern to computer networks. As a network specialist consultant, you have been approached by a start-up company to implement some port security configurations on the newly acquired switch on their network. They want you to restrict access on the switch only to authorised devices. Below is the start-up network overview:A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to the switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the network to access data on the server Server0.3.1 Create this network on packet tracer using the information below. • Connect a Laptop (Laptop0) Fa0 to Hub0 Fa0; then connect Hub0 Fa3 to the Switch0Fa0/1.• Connect a PC (PC0) Fa0 to Hub1 Fa0; • Connect a PC (PC1) Fa0 to Hub1 Fa1; • Connect a PC (PC2) Fa0 to Hub1 Fa2; • Connect Hub1 Fa3 to Switch0 Fa0/2.• Connect…
arrow_forward
Switch ports security is a serious security concern to computer networks. As a network specialist consultant, you have been approached by a start-up company to implement some port security configurations on the newly acquired switch on their network. They want you to restrict access on the switch only to authorised devices. Below is the start-up network overview:A hub (Hub-PT Hub0) is placed in the director’s office and connected to the switch (2960-24TT Switch 0). Another hub (Hub-PT Hub1) is placed in the developers’ lab and it is connected to the switch (2960-24TT Switch 0) as well. The switch Switch0 enables hosts on the network to access data on the server Server0.3.1 Create this network on packet tracer using the information below. • Connect a Laptop (Laptop0) Fa0 to Hub0 Fa0; then connect Hub0 Fa3 to the Switch0Fa0/1.• Connect a PC (PC0) Fa0 to Hub1 Fa0; • Connect a PC (PC1) Fa0 to Hub1 Fa1; • Connect a PC (PC2) Fa0 to Hub1 Fa2; • Connect Hub1 Fa3 to Switch0 Fa0/2.• Connect…
arrow_forward
*
routing approach that recreates the exact
.topology of the entire network
subnetting
link state
NAT
VLSM
arrow_forward
In what circumstances would you, as a network administrator, employ a static route configuration?
arrow_forward
Access control lists (ACL) are rules, typically applied to router interfaces, that specify permitted and denied traffic and their filtering criteria include IP addresses, port number, and MAC addresses.
Group of answer choices
True
False
arrow_forward
As a network administrator, under what conditions would you use static route configuration?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Addressing Schemes – Subnetting The Iconic Production is a company newly established in the vicinity of Midrand in the city of Tshwane. The company has just hired you as their network engineer. You are told that the company currently has three departments: HR, Marketing and Operations. You are given the IP address: 192.168.5.0/24. You are required to subnet it as efficiently as possible in order to meet the requirements for the following number of hosts in the company’s network:• HR department: 13 hosts• Marketing department: 61 hosts• Operations department: 28 hosts• Link HR-M: 2 addresses• Link HR-O: 2 addresses• Link M-O: 2 addresses For each of the subnets, determine:• The Network ID• The subnet mask• The total number of hosts addresses• The number of usable host addresses• The range of usable host addresses• The broadcast addressarrow_forwardData communication course A company that carries out international cargo business has offices and transfer stations at different points. The company carries out transportation by land, sea and air. Different packages are used for each kind of transport. At the transfer stations, if necessary, package type is changed according to the next transportation type, and it will be directed to the destination. Q2)= Which situations in this scenario can be compared to the difference between TCP and UD protocols?arrow_forwardIP Header has a field TTL ( Time To Live). Which among the following statement best explain the use of TTL(a) It can be used to prioritize the packets(b) It can be used to reduce the delay.(c) It can be used to optimize the throughput.(d) It can be used to prevent packet looping.arrow_forward
- Computer Science As a network consultant, you are given the complete access to customers’ infrastructure, all features in routers/instruments, and all the customers’ data collection. You have been assigned to address the following customers’ queries: 1) Customer A is experiencing a high network traffic problem within one of its private networks. The customer suspects that the traffic is generated by computers that are infected with malicious software where it has been sending spam messages without the owners' knowledge. The customer is asking for your help to monitor the amount of traffic due to this network and possible hosts that had been infected. Analyze the necessary steps you would take to address the query and clearly state all the assumptions. Evaluate the practical data that you may consider to be included in your analysis.arrow_forwardFTP, on the other hand, requires verification that a file has been correctly transmitted to a client, but it does not give a built-in means to track this information. File Transfer Protocol (FTP) relies on the TCP/IP architecture's Transport layer to ensure that data is delivered.arrow_forwardDNS settings may be categorised in several ways. All of them must be simplified into manageable parts, complete with illustrations and arguments. Can the same IP address be used for both the company's web server and its email server?arrow_forward
- Request to send (RTS) and its threshold are defined.arrow_forwardData-Com-Comp-Networks Week 1 TCP/IP Configuration The TCP/IP protocol is the universal standard for network and Internet communication. Take a moment to comment on at least one aspect of the TCP/IP network stack and how it’s important. Also, what TCP/IP configuration is needed for a computer to connect to a network?arrow_forwardUsing Cisco Packet Tracerarrow_forward
- Computer Networks - Dynamic Routing and Name Resolutionarrow_forwardIntermediary devices form interface with human network & communications network. * True False In TCP/IP Model, the Internet Layer responsible to find the best path between source and destination. False True The Transport Layer Numbering the Segment in the Source, and Reassemble Segments in the Destination side. * False True One of the Primary function of the Session Layer is the Data Compression on the Source side. * True Falsearrow_forwardanswer only 100% sure else downvote strictly posted multiple times dont answer if not known dont post existing onesarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education