Build a routing table for edge routers

Assignment Help Computer Networking
Reference no: EM132310975

Network Planning Assignment

Overview

The main objectives of this assignment are:

• To help students gain a good understanding of the IP (Internet Protocol), which is the major underlying technology of the Internet.
• To help students to understand the importance of subnet and routing of IP address.
• To encourage students to conduct an independent investigation into IP related topics from books, the Internet and through practical investigation.

Scenario

You have been appointed as a Network System Administrator by the Australian government to allocate public IP Version 4 (IPv4) addresses and build a routing table for edge routers to connect the Australian states as shown in Figure 1.

The IPv4 is an exhaustive list of IPv4 addresses for current Internet users in the world. However, in this scenario you have the liberty to use the entire available unreserved public IPv4 addresses for the Internet users in Australia.

33_figure.jpg

Figure 1: Edge routers R1 - R6 connecting different Australian states.

Tasks

The major task is to allocate the unreserved public IPv4 addresses to different states in Australia based on the Internet users in those states. The number of Internet users for Australian states are given below:

New South Wales (NSW)                                              : 6 Million

Victoria (VIC)                                                                : 4 Million

Queensland (QLD)                                                       : 3 Million

Western Australia (WA)                                                 : 2 Million

South Australia (SA)                                                      : 1 Million

Tasmania (TAS)                                                            : 300 Thousand

Northern Territory (NT)                                                : 150 Thousand

The task needs to be completed based on the following constraints and assumptions:

– Only unreserved public IPv4 address should be used for allocation.
– Each state should have unique set of addresses - no address or set of addresses can be reassigned for any other state.
– You should use only the classless IPv4 addressing in the assignment.
– The number of allocated addresses for each state should not exceed by 20% of the specified Internet users for that particular state. For instance, the allocated addresses for Tasmania should not exceed 360 Thousand addresses.
– It is allowed to use one or more subnets to achieve the number of required address for a given state.

The minor task is to create a routing table for edge routers only for the state NT, WA and SA. The task needs to be completed based on the following constraints and assumptions:

– The routing table should be minimal with no redundant routes in the table.
– Any packets from the source (NT or WA or SA) should take minimal route to reach the destination (NT or WA or SA).
– Identify the Network Interface Card Address to connect NT, WA and SA.

Learning Outcomes Assessed
The following course learning outcomes are assessed by completing this assessment:
• K1. Describe and explain the role and function of network connectivity in current computing.
• K2. Describe and explain the principles of communication in networks.
• K3. Describe the role and functionality of hardware and software entities that contribute to the network communications.
• K4. Describe and explain the protocols and interactions that implement network communications.
• K6. Describe fundamental aspects of cloud computing.
• A1. Apply networking architecture knowledge to analyze the networking needs of business.

Attachment:- Network Planning Assignment.rar

Verified Expert

In this exercise, we are required to subnet a selected IP address so that we have a subnetworks that are allocated to states. Our selected IP address is 190.162.18.0/22, we subnetted it into small divisions using VLSM technique.In VLSM technique, number of IP addresses per subnet must not be equal but will depend on the required number of IP addresses. Once we have the IP address table, we could construct routing table for routers R1, R2, and R3. We then assigned some IP addresses to interfaces of the mentioned routers.

Reference no: EM132310975

Questions Cloud

Outsourcing has increased over the past : Outsourcing has increased over the past decade because the following reasons EXCEPT
Aspects of customer relationship management : How can we illustrate the following aspects of customer relationship management, enterprise resource management, and supply chain management systems:
How to illustrate the networking technologies : How to Illustrate the networking technologies used in global business environment
Influence merger and acquistions transactions : Six elements of structure that influence Merger and acquistions transactions. What are these and how do they influence success or failure in M&A?
Build a routing table for edge routers : Describe and explain the principles of communication in networks - Describe the role and functionality of hardware and software entities that contribute to the
Build several basic construction communication skills : 301213 Construction Communication Assignment- Group report and presentation, Western Sydney University, Australia. Build basic construction communication skills
Sociological imagination as capacity for individuals : Wright Mills defined the sociological imagination as capacity for individuals to understand relationship between their individual lives and broad social forces.
Analyze the networking needs of business : Allocate the unreserved public IPv4 addresses to different states in Australia based on the Internet users in those states. The number of Internet users
Develop a project plan for this project containing goal : PRM701 Project Management Principles- University of the Sunshine Coast Australia-Choose one project that you identified during task one and develop a project.

Reviews

Write a Review

Computer Networking Questions & Answers

  Information security threats impacting security and privacy

1] Describe the information security threats impacting security and privacy. 2] Describe the security control measures to protect information assets.

  Information security law-ethics

Do you think that websites have a duty to be familiar with drug laws throughout the world?

  How can these be used to compare

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used? How can these be used to compare the features and components of each IDPS? Breifly compare the different classifications of systems you ..

  A description of what the layer of osi does

Write 2 - 3 paragraphs that include a description of what the layer does, what level it corresponds to in the TCP Model and what it covers in the real world.

  Different components difficult to incorporate into a network

Do you believe that a network with different types of computers, maybe different operating systems, or different components would be difficult to incorporate into a network. Why or why not.

  Why is there no need for security association with ssl

Why is there no need for security association with SSL? Why do we mean message authentication or entity authentication? Explain.

  Which is physical and which is the data link layer device

Which is the physical and which is the data link layer device? What difference in the two results in them operating at different layers of the Internet model?

  What are the sizes of ram, flash and nvram

Identify the different subnets according to network requirements. Please analyse and design the best IP addressing scheme and what is the version number of IOS? What are the sizes of RAM, Flash and NVRAM?

  Name the various options for an enterprise telephony

Name the various options for an enterprise's telephony network to be connected to SIP trunks?

  How many cells are needed to carry atmarp packet discussed

An ATMARP packet must also be carried in cells. How many cells are needed to carry an ATMARP packet discussed in this chapter?

  What types of devices will be part of the architecture

What types of devices will be part of the architecture - Types of lines/circuits considered - the elements of the proposal and address the issues

  1 the scenarioyou have been asked to prepare a feasibility

1. the scenarioyou have been asked to prepare a feasibility study and an initial design to enable a large holiday

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd