Configuring ip addresses and subnet masks on the hosts

Assignment Help Computer Networking
Reference no: EM133337566

Introduction to Data Communications and Networking

Assignment: Learning Outcomes:

By the end of the assignment the student must be able to:
Create and configure a network topology in Packet Tracer, identify the connectivity between computers, switches, and hubs on the network.

Instruction:
• Do not erase anything from this document. By the contrary, insert all your answers on it following each step. Refer to the last page to know how to submit your report.
• How to insert screenshots in your report? Follow the example below. You must show the current date/time as it appears on your computer screen lower right corner. Write down your name in any empty space of the screenshot. An example is shown below.

Assignment:

Be sure that you have a version of Cisco Packet Tracer running on yur computer. Follow all and every instruction as they are presented. Depending on the Packet Tracer software version you have on your computer, the appearance and options may vary.

Step 1: Start Packet Tracer

Follow the instructions given in class or online videos to know how to edit in Packet Tracer.

Step 2: Building the Topology - Adding Hosts

Add four hosts.

Step 3: Building the Topology - Connecting the Hosts to Hubs and Switches

Adding a Hub

Select a hub, by clicking once on Hubs and once on a PT-Hub.

Add the hub by moving the plus sign "+" below PC0 and PC1 and click once.

Connect PC0 to Hub0 by first choosing Connections.

Click once on the Copper Straight-through cable.

Perform the following steps to connect PC0 to Hub0:
1. Click once on PC0
2. Choose FastEthernet
3. Drag the cursor to Hub0
4. Click once on Hub0 and choose Port 0
5. Notice the green link lights on both the PC0 Ethernet NIC and the Hub0 Port 0 showing that the link is active.

Repeat the steps above for PC1 connecting it to Port 1 on Hub0. (The actual hub port you choose does not matter.)

Step 4. Adding a Switch

Select a switch, by clicking once on Switches and once on a 2950-24 switch.

Add the switch by moving the plus sign "+" below PC2 and PC3 and click once.

Connect PC2 to Hub0 by first choosing Connections.

Click once on the Copper Straight-through cable.

Perform the following steps to connect PC2 to Switch0:
1. Click once on PC2
2. Choose FastEthernet
3. Drag the cursor to Switch0
4. Click once on Switch0 and choose FastEthernet0/1
5. Notice the green link lights on PC2 Ethernet NIC and amber light Switch0FastEthernet0/1 port. The switch port is temporarily not forwarding frames, while it goes through the stages for the Spanning Tree Protocol (STP) process.
6. After a about 30 seconds the amber light will change to green indicating that the port has entered the forwarding stage. Frames can now forwarded out the switch port.

Note: Spanning Tree Protocol (STP) is discussed later.

Repeat the steps above for PC3 connecting it to Port 3 on Switch0 on port FastEtherent0/2. (The actual switch port you choose does not matter.)

Move the cursor over the link light to view the port number. Fa means FastEthernet, 100 Mbps Ethernet.

Replace the previous figure by the screenshot of your computer as you complete this last step [One mark]

Step 5: Configuring IP Addresses and Subnet Masks on the Hosts

Before we can communicate between the hosts we need to configure IP Addresses and Subnet Masks on the devices.

Click once on PC0.

Choose the Config tab and click on Settings. It is here that you can change the name of PC0. It is also here where you would enter a Gateway IP Address, also known as the default gateway and the DNS Server IP Address. We will discuss this later, but this would be the IP address of the local router. If you want, you can enter the Gateway IP Address 172.16.1.1 and DNS Server IP Address 172.16.1.100, although it will not be used in this lab.

Click on Interface and then FastEthernet. Although we have not yet discussed IP Addresses, add the IP Address to 172.16.1.10. Click once in the Subnet Mask field to enter the default Subnet Mask. You can leave this at 255.255.0.0. We will discuss this later.

Also, notice this is where you can change the Bandwidth (speed) and Duplex of the Ethernet NIC (Network Interface Card). The default is Auto (autonegotiation), which means the NIC will negotiate with the hub or switch. The bandwidth and/or duplex can be manually set by removing the check from the Auto box and choosing the specific option.

Bandwidth - Auto

If the host is connected to a hub or switch port which can do 100 Mbps, then the Ethernet NIC on the host will choose 100 Mbps (Fast Ethernet). Otherwise, if the hub or switch port can only do 10 Mbps, then the Ethernet NIC on the host will choose 10 Mbps (Ethernet).

Duplex - Auto

Hub: If the host is connected to a hub, then the Ethernet NIC on the host will choose Half Duplex.

Switch: If the host is connected to a switch, and the switch port is configured as Full Duplex (or Autonegotiation), then the Ethernet NIC on the host will choose Full Duplex. If the switch port is configured as Half Duplex, then the Ethernet NIC on the host will choose Half Duplex. (Full Duplex is a much more efficient option.)

The information is automatically saved when entered.

To close this dialog box, click the "X" in the upper right.

Repeat these steps for the other hosts. Use the information below for IP Addresses and Subnet Masks.

Host IP Address Subnet Mask
PC0 172.16.1.10 255.255.0.0
PC1 172.16.1.11 255.255.0.0
PC2 172.16.1.12 255.255.0.0
PC3 172.16.1.13 255.255.0.0

How many bits is the Network portion of these addresses?
How many bits is the Host portion of these addresses?
What is the maximum number of hosts that can be addressed in this network?

Verify the information

To verify the information that you entered, move the Select tool (arrow) over each host.

Replace the previous figure by the screenshot of your computer as you complete this last step [ONE AND A HALF MARKS]

Step 6: Connecting Hub0 to Switch0

To connect like-devices, like a Hub and a Switch, we will use a Cross-over cable. Click once the Cross-over Cable from the Connections options.

Move the Connections cursor over Hub0 and click once.

SelectPort 5 (actual port does not matter).

Move the Connections cursor to Switch0.

Click once on Switch0 and choose FastEthernet0/4 (actual port does not matter).

The link light for switch port FastEthernet0/4 will begin as amber and eventually change to green as the Spanning Tree Protocol transitions the port to forwarding.

Replace the previous figure by the screenshot of your computer as you complete this last step [One mark]

Step 7: Verifying Connectivity in Realtime Mode

Be sure you are in Realtime mode.

Select the Add Simple PDU tool used to ping devices..

Click once on PC0, then once on PC3.

The PDU Last Status should show as Successful.

Resetting the Network

At this point we will want to reset the network, Whenever you want to reset the network and begin the simulation again, perform the following tasks:

Click Delete in the PDU area.

Now, Power Cycle Devices and confirm the action.

Waiting for Spanning Tree Protocol (STP)

Note: Because Packet Tracer also simulates the Spanning Tree Protocol (later), at times the switch may show amber lights on its interfaces. You will need to wait for the lights to turn green on the switches before they will forward any Ethernet frames.

Step 8: Verifying Connectivity in Simulation Mode

Be sure you are in Simulation mode.

Deselect all filters (All/None) and select only ICMP.

Select the Add Simple PDU tool used to ping devices..

Click once on PC0, then once on PC3.

Continue clicking Capture/Forward button until the ICMP ping is completed. You should see the ICMP messages move between the hosts, hub and switch. The PDU Last Status should show as Successful.

Step 9: Replace the previous figure by the screenshot of your computer as you complete this last step. Be sure that the Simulation Panel is included in the insert [ TWO MARKS]

Step 10: Saving the Topology

Perform the following steps to save the topology. Use the File/Save as menu option. Keep the same file type, but rename it using the following naming convention: LASTNAME_FIRSTNAME_Asignment1

Instructions to submit your report:

1. Be sure that you wrote your full name on the first line of this report document. One mark deducted if you do not write your name at the beginning of this document.
2. Save your report as a pdf file using the following format: LASTNAME_FIRSTNAME_Asignment1.pdf One mark deducted if you do not follow this format.
3. Submit two files:
a. This report document in pdf format. One mark deducted if you use another format.
b. The Packet Tracer filefilesaved from the Step 10.One mark deducted if you miss this file.
4. Once finished the activity, submit the files using the Slate dropbox by the due date. Do not compress any file. One mark deducted if you compress a file.

Attachment:- Introduction to Data Communications and Networking.rar

Reference no: EM133337566

Questions Cloud

Outline the phases of organizational development : Outline the phases of organizational development.
Why supply chain management software dominated : Why supply chain management software dominated by Enterprise Resource Planning players such as Systems Applications and Products and Oracle
What is the primary organizational variable : What is the primary organizational variable that can be used to reward individuals and reinforce performance?
Adopting supply chain it systems : Why the high-tech industry has been leader in adopting supply chain IT systems?
Configuring ip addresses and subnet masks on the hosts : TELE13167 Introduction to Data Communications and Networking, Sheridan College Configuring IP Addresses and Subnet Masks on the Hosts
Some ways for user or the device to hinder data collection : Where is that data stored on or off device and how might this affect data collection? What are some ways for the user or the device to hinder data collection?
Comment on cyber risk models or modeling : Comment on cyber risk models or modeling. Discuss how your selected resources can be used in your selected organization.
Revolutionizing cyber operations : Revolutionizing Cyber Operations. Cyber is a dynamic domain that evolves on a daily basis.
Provide a specific treatment plan : Diagnose the child and describe how you arrived at the diagnosis (i.e., how you ruled out other diagnoses) and Provide a specific treatment plan

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain elementary process for case-tracking system

You are now modeling logic of each elementary process for case-tracking system and have decided to write it is Structured English to communicate effectively with both users and programmers.

  Describe the components of rfid systems

Explain RFID and describe the components of RFID systems. Include in your discussion some of various RFID security and privacy threats.

  Org communication

Discuss the benefits and limitations of teams, and explain why employees join informal groups.

  Describe methodology behind constructing breakdown structure

Define a work breakdown structure and describe the methodology behind constructing one. Contains at least five main tasks, one for each of the PMBOK process areas.

  Discuss the significance of internetworking

Analyse and discuss the significance of internetworking for the chosen business case - Draw architectural internetworking design

  Perform a traceroute between the source and destination on

perform a traceroute between source and destination on the same continent at three different hours of the day.a. find

  Ethical considerations when investigating specific crime

Write down the specific ethical considerations which need to be addressed when investigating specific crime? How can we decrease ethical problems involved in investigation of crimes you selected?

  How to decrypt a message using classical cryptography

Part 1a. How to encrypt a message using classical cryptography algorithms we covered in class? Are these methods secure?b. How to decrypt a message using classical cryptography

  Assign IP address to all the devices in the network

Packet Tracer Requirements - Assign IP address to all the devices in the network. Display the network address of each departments; multilayer switches, router

  Analyze two data transmission technologies associated

WAN Technologies Paper: Define each protocol and describe at least two data transmission technologies associated with the protocol.

  What is the maximum size of the tcp header

What is the maximum size of the TCP header? What is the minimum size of the TCP header? How can TCP detect the error in the destination port?

  Describe quality-of-service

You were hired as a network engineer for a small firm that had just recently implemented a voice-over Internet protocol (VoIP) solution in its converged network, which had replaced all of its analog lines. Describe quality-of-service

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd