Assign suitable ip addresses to each device of your choice

Assignment Help Computer Network Security
Reference no: EM132540857

#question..

ITNE1001 Network Architecture - Victorian Institute of Technology

Activity 1

1. Open the packet tracer software interface and get familiar with it using the help menu
2. Place three node PCs and one laptop within the work area
3. Connect them using a hub (hub 1). What is the suitable connection type?
4. Similarly, connect another three PCs nodes using a switch (switch 1) on the same workspace
5. Is it possible to connect the hub 1 to switch 1? Connect the two network segments using minimum resources and call it ‘Subnet 1'
6. Now, create a different ‘Subnet 2' by connecting 3 PCs to another switch (switch 2)
7. Now you are asked to connect these two subnets by connecting switch 1 and switch 2 using a suitable network device. Confirm from your selection by asking the instructor
8. It is required to assign IP addresses to these devices in order to enable networking among them. Assign suitable IP addresses to each device of your choice.
To assign IP address click on the network device and go to the ‘config' tab. Then click the ‘FastEthernet' button under ‘Interface' to get the IP config wizard as shown below
9. Now try to communicate with different nodes using the ‘ping' command

Activity 2:

1. Create the following network on Packet Tracer interface. When connecting the router to switches make sure the Switch0 is connected to FastEthernet0/0 interface and Switch1 is connected to FastEthernet0/1 interface of the router

2. As shown in the figure above assign the IP addresses 192.168.1.1 and 192.168.2.1 to the nodes PC0 and PC1

3. What is the class that these IP addresses are belonged? What is the subnet mask?

4. Are PC0 and PC1 are in the same network? Explain the reasons for your answer

5. Click on PC0 and use its ‘Command prompt' to ping from PC1. Is your ping successful? If not explain the reasons for that

6. Now we are going to configure the router. Click on the router and go to ‘CLI' tab.

7. You'll see the dialogue ‘Continue with configuration dialog? [yes/no]:' at the bottom. Type ‘yes' and hit enter.

8. Then give a suitable router name and give a password when ‘Enter enable secret:' is asked. Use the password ‘password' for this.

9. The enable password is used when you do not specify an enable secret password, with some older software versions, and some boot images. When ‘Enter enable password:' is asked assign the password ‘pwd'.

10. For ‘Enter virtual terminal password:' give ‘vpwd' for the password and hit enter

11. When it says "Enter interface name used to connect to the management network from the above interface summary:" type ‘FastEthernet0/0' and hit enter as shown below. This allows you to configure the router's interface to Switch0.

12. Then assign the following IP configurations to ‘FastEthernet0/0'

13. Then select option 2 in from the following message.

14. Then use the ‘enable' command and the password ‘password' to get into Privileged EXEC mode. This will appear in with ‘#' symbol

15. Then type ‘config t' command to get the configuration terminal.

16. Then use the command "interface FastEthernet0/1" to configure other interface of the router.

17. Then type (config-if)# ip address 192.168.2.254 255.255.255.0 to assign an ip address to this interface. And then use "no shutdown" command to turn the interface on. Then type ‘exit'.

18. Then use the following two commands to configure routing. This will enable packet forwarding

Router(config)#ip route 192.168.2.0 255.255.255.0 fastEthernet 0/1
Router(config)#ip route 192.168.1.0 255.255.255.0 fastEthernet 0/0

19. Then type ‘exit' and use "copy running-config startup-config" command to save configurations.

20. Now your network is up and running. Now try to ping from PC0 to PC1 and comment on your results.

Attachment:- Network Architecture.rar

Reference no: EM132540857

Questions Cloud

Real cost of hedging the eur payables for firm : What was the real cost of hedging the EUR payables for this firm?
Contingency plan to mitigate those unexpected challenges : Give suggestions on what might be added to the organization's contingency plan to mitigate those unexpected challenges.
Journal entries need be prepared for salinas corporation : Journal entries need be prepared for Salinas Corporation for 2020 and 2021, assuming Phelps is not able to exercise significant influence over
How much factory overhead will blackwelder factory allocate : How much factory overhead will Blackwelder Factory allocate to small lamp production if actual direct hours for the period is 178,000?
Assign suitable ip addresses to each device of your choice : Assign IP addresses to these devices in order to enable networking among them. Assign suitable IP addresses to each device of your choice
What effective annual interest rate has the investor earned : What effective annual interest rate has the investor earned, explain the results?
What amount of gain or loss would it record on the sale : If the company sold the equipment on December 31, 2019 for $14,000 what amount of gain or loss would it record on the sale
Expected eps under both financing options : Find out the expected EPS under both financing options at the given EBIT levels of Rs. 2 crores and Rs. 7.5 crores. What should be choice of the company
What would a schedule of cost of goods manufactured for year : Kookabuka Company during the most recent year, What would a schedule of cost of goods manufactured for the year look like?

Reviews

len2540857

6/10/2020 3:41:44 AM

I need 2 activities to be done. And my budget is only80-100$ AUD. So plz quote the price accordingly. Plz quote the price in AUD. Thanx

Write a Review

Computer Network Security Questions & Answers

  Describe each of the six stages of the employee life cycle

IT409 IT Security and Policies Assignment. Describe each of the six stages of the employee life cycle using your own words. Define and provide examples for the following using your own words: Information assets

  Describe how bob can recover the message

Describe how Bob can recover the message - Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?

  What is the peak data rate out of the router in one second

What is the peak data rate out of the router in one second - what is the long term average data rate out of the router?

  Explain why you believe the given items are important

Explain why you believe the given items are important, and include examples of security breaches that can occur if these items are not outlined and followed.

  Explain what scalability means in kerberos

One of the strengths of Kerberos is its scalability. Explain what scalability means in Kerberos and how the Kerberos system facilitates scalability.

  Advising about a software purchase

Your local art museum recently purchased a quad-core computer with 16 GB of RAM. The curator read an article about an art collection inventory system software package that could go on the new computer.

  How would know your lexical knowledge support is effective

How could you use Lexical knowledge to support Spanish-speaking ELL students in a classroom setting? How would you assess this support? How would you know your lexical knowledge support is effective?

  Formulate the network security plan to be implemented

Formulate the Network Security Plan to be implemented across the network footprint. Address the narrative plan as well as a network diagram.

  Analyze ings solution for providing security to determine

write a three to four page paper in which youassess the probable difficulties and risks associated with using a public

  What is the morality of posting an encryption key

What is the morality of posting an encryption key on a website publicly in order to help others play digital disks.

  What issues can arise during admission of digital evidence

The DQ response should be between 500 words, and grammar and spelling are important. Please make sure to proofread carefully!

  Watch the video - global conference on cyber space

How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd