Calculate two subnets in order to provide the ip

Assignment Help Computer Networking
Reference no: EM131305204

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ).

The branches need to be interconnected to the Headquarter; you have been assigned a design for this work. The assignment needs you to implement the following network design as per instructions and guidelines provided below. You need to put attention to the details of the requirement, marks will be deducted for any missing component or item. This is an individual assignment, therefore, this must be your own work. Please refer to the following Network Diagram (Figure 1), which reflects ail the connectivity details, customers per site as well as both IPV4 and IPV6 Address blocks that you need to use for IP subnetting and IP Addressing.

2112_Figure.png

You will be assessed on the following skills:

- Configuration of initial IOS device settings
- Design and calculation of IPv4 and IPV6 addressing
- Configuration of IOS device interfaces including IPv4 and IPv6 addressing when appropriate
- Addressing of network hosts with IPv4 and IPv6 addresses Enhancing device security, including configuration of the secure transport protocol for remote device configuration
- Configuration of a switch management interface

Requirements by devices:

HQ-R1, BR1-R1 and BR2-R1 routers:
- Configuration of initial router settings
- Interface configuration as well as IPv4 and IPv6 addressing
- Device security enhancement or "device hardening"
- Secure transport for remote configuration connections as covered in the labs.
- Backup all of the configuration file to a TFTP server
- IPV4 and IPV6 routing with Default & Static routes

All the switches Switch:
- Enabling basic remote management by Telnet

PC and Server hosts:
- IPv4 full addressing
- IPv6 addressing
Network Connectivity:
- Test and confirm end-to-end connectivity

Step 1:

Design an 113v4 addressing scheme and complete the Addressing Table based on the following requirements.

a. Subnet the IPV4 network to provide 190 hosts addresses for HQ, 55 hosts for BR1 and 26 hosts for BR2 while wasting the fewest addresses. Also calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page.

b. In HQ, assign first available IP address to the router interface as gateway and the last available address to the TFTP Server.

c. On BR1 and BR2, assign the first network host address in the respective subnet to the G0/0 interface of the routers.

d. Assign the second to the last address (the second highest) in this subnet to the VLAN 1 interface of the Switches.

e. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 2:

Design an IPv6 addressing scheme and complete the Addressing Table based on the following requirements.

a. Subnet the IPV6 network to provide 190 hosts addresses for HQ, 55 hosts for BR1 and 26 hosts for BR2 while wasting the fewest addresses. Please show your calculation works in a separate page.

b. Calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page.

c. In HQ, assign first available IPV6 address to the router interface as gateway.

d. On BR1 and BR2, assign the first network host address in the respective subnet to the G0/0 interface of the routers.

e. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 3: Configure and Backup the Routers

a. Configure HQ-R1, BR1-RI and BR2-R1 routers with all initial configurations that you have learned in the course so far:
Configure the router hostnames

Protect device configurations from unauthorized access with the encrypted password. Secure all of the ways to access the router using methods covered in the course and labs.

Newly-entered passwords must have a minimum length of 10 characters.

Prevent all passwords from being viewed in clear text in device configuration files.

Configure the router to only accept in-band management connections over the protocol that is more secure than Telnet, as was done in the labs. Use the value 1024 for encryption key strength.

Configure user authentication for in-band management connections.

b. Configure the Gigabit Ethernet interfaces using the lPv4 addressing values you calculated and the IPv6 values provided in the addressing table.

- Reconfigure the link local addresses as was practiced in the labs. The IPv6 link-local Interface ID should match the IPv6 unicast Interface ID as is practiced in the labs.

Label and document the interfaces in the configuration file.

- Complete the configuration of the TFTP server using the IPv4 addressing values from Step 1 and the values in the addressing table.

- Backup the running configuration of all routers to the TFTP Server. Use the default file name. Backup will be done after completion of the LAB.

Step 4: Configure the Switches

a. Configure all the switches for remote management.

b. Configure IPV4 Addresses and Default-Gateway to all switches

c. Test remote access to all the switches

Step 5: Configure and Verify Host Addressing [is MARKS]

a. Configure necessary static and default routes in order to make end-to-end connectivity.

b. Use the IPv4 addressing from Step 1 and the IPv6 addressing values provided in the addressing table to configure all host PCs with the correct addressing.

c. Use the router interface link-local addresses as the IPv6 default gateways on the hosts.

d. All hosts should be able to ping each other over IPv4 and IPV6.

Verified Expert

The solution files are prepared in packet tracer and MS word. The word file contains the IP address scheme for the network which contain IPv4 and IPv6 subnet mask address. This file also contains the configuration commands which are executed in packet tracer. the second solution is design the network in packet tracer and configure the network which includes the IP address for all host,routers and switches.

Reference no: EM131305204

Questions Cloud

Determine the boundary of b : Determine the boundary of B
The euros slide and the reliance of countries : What is the connection between the euro's slide and the reliance of countries that use the euro on foreign demand to help their economies?
How you perceive yourself professionally : A brief overview of how you perceive yourself professionally. You may include a photo. A description of attributes which contribute to professionalism in your chosen field such as professional attire, communication, and behavior.
Explain three contributions that kohlberg made : Explain three contributions that Kohlberg made to our understanding of moral development.
Calculate two subnets in order to provide the ip : ISCG 5337: Introduction to Networks - Calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page - Configure addresses on the hosts using any of the remaini..
What are real exchange rates between dollar and yen : If the exchange rates are $1.50 = £1 and ¥100 = $1, what are the real exchange rates between the dollar and the yen and the dollar and the pound?
Provide analysis of how the information contained in article : Provide an analysis of how the information contained in the article relates to strategic alliance or value opportunities for your current or former organization, using specific examples.
What is affirmative action as a social policy : What is Affirmative Action as a social policy?What were the goals of Affirmative Action? Has it been successful?What are the basic arguments for Affirmative Action and what are those against it? Which side do you find the most convincing and why?
Difference between spot transaction and forward transaction : What does it mean to describe the foreignexchange market as an "over-the-counter market"?- What is the difference between a spot transaction and a forward transaction in the foreignexchange market?

Reviews

inf1305204

12/10/2016 6:05:55 AM

I TRIED TO MAKE THE PAYMENT BUT SOMETHING WRONG WITH WEBSITE BECAUSE I TRIED DIFFRENT CARDS.WHAT SHULD I DO In which version of packet tracer have to configure network ? Cisco Packet Tracer 6.1 for Windows (no tutorials) -Student version.exe

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd