W2
.docx
keyboard_arrow_up
School
ECPI University, Manassas *
*We aren’t endorsed by this school
Course
202L
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
24
Uploaded by sidorelakollcaku
Introduction to Routing and Switching Week 2 Guided Practice: VLSM
Objective
In this Guided Practice you will be connecting and configuring a small subnetted network with multiple routers. Technology
You will use Packet Tracer in this practice. Anytime you see a 50 in an IP address replace with your assigned number.
Task 1 – Adding and connecting devices
You will start with the network shown below that is given to you in the packet tracer file in this practice. You will connect to the CSU-DSU later in this practice. For now, you can select the network below and drag it to the corner of your Packet Tracer desktop.
Your instructor has assigned you a unique network number.
Make sure to use this unique network
number throughout the Guided Practice where indicated by an underscore ___.
Drag and label the following devices to the desktop: three 4321 routers, three 2960 switches, four PCs, two servers, a RT300N wireless router and a smart phone.
Make sure to add serial port modules to the routers as you did in the previous Guided Practice. Connect the routers together using a Serial DCE cable.
Click and drag from the R1 router (connect to S0/1/0) to the R2 router and connect to S0/1/1. Again, using the Serial DCE cable, click and drag from the R2 router (connect to S0/1/0) to the R3 router and connect on S0/1/1. Finally connect from the R3 router, S0/1/0, to the R1 router on S0/1/1. We will now connect the other devices. Connect from the G0/0/0 port on the R2 router to the G0/1 port
on the Sw1 switch using a straight-through cable. Connect Server1 to Fa0/1 on the Sw1 switch and Sever2 to Fa0/12 on the Sw1 switch using a straight-through cable.
Connect from the G0/0/0 port on the R3 router to the G0/1 port on the Sw2 switch using a straight-
through cable. Connect the Sw2 switch on port G0/2 to the Sw3 switch on port G0/1 using a straight-
through cable. Connect PC1 to Fa0/1 on the Sw2 switch and PC2 to Fa0/12 of the Sw2 switch using a straight-through cable. Connect PC3 to Fa0/1 on the Sw3 switch and PC4 to Fa0/12 of the Sw3 switch using a straight-through cable.
Finally, connect the G0/0/1 port on the R1 router to the Internet port of the WRT300N wireless router using a straight-through cable. The smart phone should automatically be connected to the WRT300N.
You will notice that the connections to the PCs and servers have all turned green, but the links to the routers are still red. We will configure the routers in the next task and all links will turn green. Take a screenshot.
Deliverables for Task 1
Screenshot of your network labeled and connected.
Task 2– Configure the network In this task we will configure the devices. We will need to bring up the router interfaces to a usable state and assign IP addresses to them. We will configure the switches with VLANs and trunks. Start off by bringing each of the router interfaces
we are using up. Below is an example of bringing up the interfaces for the R2 router. Do the same for the R1 and R3 router interfaces. Look at the table below. This is a standard network connection grid that you will be using in the future for all your network programming. Notice we are using different subnet masks on the routers - we will
be using VLSM
(Variable Length Subnet Mask), a technique that allows network administrators to divide an IP address space into subnets of varied sizes, rather than dividing it into subnets of the same size.
System
Port
Connect To
IP address
Subnet Mask
Clock
Rate
Users
<studentID>-R1 G0/0/0 CSU-DSU 11.0.0.51 255.255.255.0 G0/0/1 Wi-Fi 192.168.51.241 255.255.255.252 1 S0/1/0 R2 172.16.51.1 255.255.255.252 500000 S0/1/1 R3 172.165.1.10 255.255.255.252 <studentID>-R2 G0/0/0.10 Sw1 192.168.51.225 255.255.255.248 5 G0/0/0.20 Sw1 192.168.51.233 255.255.255.248 5 S0/1/0 R3
172.16.51.5 255.255.255.252 500000 S0/1/1 R1
172.16.51.2 255.255.255.252 <studentID>-R3 G0/0/0.10 Sw2 192.168.51.1 255.255.255.128 100 G0/0/0.20 Sw2 192.168.51.129 255.255.255.192 50 G0/0/0.30 Sw2 192.168.51.193 255.255.255.240 10 G0/0/0.40 Sw2 192.168.51.209 255.255.255.240 10 S0/1/0 R1 172.16.51.9 255.255.255.252 500000 S0/1/1 R2
172.16.51.6 255.255.255.252 Make sure you refer to the previous Guided Practice for creating sub-interfaces on the R2 and R3 routers.
Once you configure all the interfaces in the table above, run a show ip interface brief
on each router to show each one configured. Take a screenshot of each. Here is an example from the R2 router.
Configure the clock rate for the DCE ends of each link between the routers. Take a screenshot of each. Below is an example from the R1 router.
Let us now configure the VLANs and trunks on the switches. Notice we added VLANs 30 and 40 to S2.
Notice we added VLANs 30 and 40 to S2.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Computer Science
Below are network packet captures of malicious activity discovered on the network. Packets are captured when IDS/IPS or firewalls detect suspicious activity and then record the traffic. Depending on your configuration it may proactively block the traffic but it will ultimately end up as an alert for the SOC to investigate. The packet capture goes beyond the log files and provides a full picture of traffic on the network. In this lab you will be investigating and triaging a number of alerts as if you were a SOC analyst on call. It will be important to provide a technical understanding of the incidents but also put into context the impact to the business and identify the remediation steps.
2. The Business Implications Of These Results
Explain how these detections impact the business, what are the short term and long-term risks presented?
arrow_forward
Data communication course
A company that carries out international cargo business has offices and transfer stations at different points.
The company carries out transportation by land, sea and air. Different packages are used for each kind of transport. At the transfer stations, if necessary, package type is changed according to the next transportation type, and it will be directed to the destination.
Q2)= Which situations in this scenario can be compared to the difference between TCP and UD protocols?
arrow_forward
IP Header has a field TTL ( Time To Live). Which among the following statement best explain the use of TTL(a) It can be used to prioritize the packets(b) It can be used to reduce the delay.(c) It can be used to optimize the throughput.(d) It can be used to prevent packet looping.
arrow_forward
FTP, on the other hand, requires verification that a file has been correctly transmitted to a client, but it does not give a built-in means to track this information. File Transfer Protocol (FTP) relies on the TCP/IP architecture's Transport layer to ensure that data is delivered.
arrow_forward
In data
Encapsulation
Decapsulation
Routing
O Addresing
MAC sublayer adds header and a trailer to the IP Packet *
It primarily refers to error detection and retransmission. *
Error checking
Error control
Error detection
Error coding
arrow_forward
Request to send (RTS) and its threshold are defined.
arrow_forward
strict warning dont post exisitng answers strict warning skip if you dont know
arrow_forward
Data-Com-Comp-Networks Week 1 TCP/IP Configuration
The TCP/IP protocol is the universal standard for network and Internet communication. Take a moment to comment on at least one aspect of the TCP/IP network stack and how it’s important. Also, what TCP/IP configuration is needed for a computer to connect to a network?
arrow_forward
Using Cisco Packet Tracer
arrow_forward
Computer Networks - Dynamic Routing and Name Resolution
arrow_forward
Intermediary devices form interface with human network &
communications network. *
True
False
In TCP/IP Model, the Internet Layer responsible to find the best path
between source and destination.
False
True
The Transport Layer Numbering the Segment in the Source, and
Reassemble Segments in the Destination side. *
False
True
One of the Primary function of the Session Layer is the Data Compression
on the Source side. *
True
False
arrow_forward
In your role as a network administrator, under what conditions would you choose to employ a static route configuration?
arrow_forward
Q4: A: Explain the operation of the FTP protocol using a flowchart.
arrow_forward
FTP doesn't have a built-in method for tracking the progress of files that have been sent to clients. File Transfer Protocol (FTP) depends on a different protocol at the TCP/IP architecture's Transport layer to guarantee a successful transfer.
arrow_forward
As much as FTP needs verification of successful file transmission, it does not provide a means for the server to independently monitor this information. Transport layer TCP/IP protocols depend on the File Transfer Protocol (FTP) for ensuring that the delivery is successful.
arrow_forward
In what circumstances would you, as a network administrator, employ a static route configuration?
arrow_forward
Server reply (UDP). How does the networked application running on a server know
the client IP address and the port number to reply to in response to a received
datagram?
As the result of performing the accept () statement, the server has created a new
socket that is bound to that specific client, and so sending into this new socket (without
explicitly specifying the client IP address and port number) is sufficient to ensure that
the sent data will be addressed to the correct client.
The server will know the port number being used by the client since all services have a
well-known port number.
The application code at the server determines client IP address and port # from the
initial segment sent by client, and must explicitly specify these values when sending into
a socket back to that client.
The server will query the DNS to learn the IP address of the client.
Not quite. Your answer isn't correct.
arrow_forward
Access control lists (ACL) are rules, typically applied to router interfaces, that specify permitted and denied traffic and their filtering criteria include IP addresses, port number, and MAC addresses.
Group of answer choices
True
False
arrow_forward
The student can choose his/her own title for the project
The student should mention the objectives for the project clearly
The student should give a proper introduction about his work
The student must give a clear addressing table with necessary networking devices and
naming conventions have to be done properly for the same
A clear network has to be built using Cisco Packet tracer with necessary labelling of
network device names and IP addresses
Basic configuration has to be done for ROUTERS
Static Routing and Dynamic Routing have to be performed on routers
ACL must be implemented on routers
The softcopy of the network designed must be sent to the Moodle
The report must be submitted in Turnitin for plagiarism checking
A Printed version of the project report should be submitted to the assessor during the
presentation of the project
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Related Questions
- Computer Science Below are network packet captures of malicious activity discovered on the network. Packets are captured when IDS/IPS or firewalls detect suspicious activity and then record the traffic. Depending on your configuration it may proactively block the traffic but it will ultimately end up as an alert for the SOC to investigate. The packet capture goes beyond the log files and provides a full picture of traffic on the network. In this lab you will be investigating and triaging a number of alerts as if you were a SOC analyst on call. It will be important to provide a technical understanding of the incidents but also put into context the impact to the business and identify the remediation steps. 2. The Business Implications Of These Results Explain how these detections impact the business, what are the short term and long-term risks presented?arrow_forwardData communication course A company that carries out international cargo business has offices and transfer stations at different points. The company carries out transportation by land, sea and air. Different packages are used for each kind of transport. At the transfer stations, if necessary, package type is changed according to the next transportation type, and it will be directed to the destination. Q2)= Which situations in this scenario can be compared to the difference between TCP and UD protocols?arrow_forwardIP Header has a field TTL ( Time To Live). Which among the following statement best explain the use of TTL(a) It can be used to prioritize the packets(b) It can be used to reduce the delay.(c) It can be used to optimize the throughput.(d) It can be used to prevent packet looping.arrow_forward
- FTP, on the other hand, requires verification that a file has been correctly transmitted to a client, but it does not give a built-in means to track this information. File Transfer Protocol (FTP) relies on the TCP/IP architecture's Transport layer to ensure that data is delivered.arrow_forwardIn data Encapsulation Decapsulation Routing O Addresing MAC sublayer adds header and a trailer to the IP Packet * It primarily refers to error detection and retransmission. * Error checking Error control Error detection Error codingarrow_forwardRequest to send (RTS) and its threshold are defined.arrow_forward
- strict warning dont post exisitng answers strict warning skip if you dont knowarrow_forwardData-Com-Comp-Networks Week 1 TCP/IP Configuration The TCP/IP protocol is the universal standard for network and Internet communication. Take a moment to comment on at least one aspect of the TCP/IP network stack and how it’s important. Also, what TCP/IP configuration is needed for a computer to connect to a network?arrow_forwardUsing Cisco Packet Tracerarrow_forward
- Computer Networks - Dynamic Routing and Name Resolutionarrow_forwardIntermediary devices form interface with human network & communications network. * True False In TCP/IP Model, the Internet Layer responsible to find the best path between source and destination. False True The Transport Layer Numbering the Segment in the Source, and Reassemble Segments in the Destination side. * False True One of the Primary function of the Session Layer is the Data Compression on the Source side. * True Falsearrow_forwardIn your role as a network administrator, under what conditions would you choose to employ a static route configuration?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningLINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE LEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
- A+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning