Configuring ip addresses and subnet masks on the hosts

Assignment Help Computer Networking
Reference no: EM133337566

Introduction to Data Communications and Networking

Assignment: Learning Outcomes:

By the end of the assignment the student must be able to:
Create and configure a network topology in Packet Tracer, identify the connectivity between computers, switches, and hubs on the network.

Instruction:
• Do not erase anything from this document. By the contrary, insert all your answers on it following each step. Refer to the last page to know how to submit your report.
• How to insert screenshots in your report? Follow the example below. You must show the current date/time as it appears on your computer screen lower right corner. Write down your name in any empty space of the screenshot. An example is shown below.

Assignment:

Be sure that you have a version of Cisco Packet Tracer running on yur computer. Follow all and every instruction as they are presented. Depending on the Packet Tracer software version you have on your computer, the appearance and options may vary.

Step 1: Start Packet Tracer

Follow the instructions given in class or online videos to know how to edit in Packet Tracer.

Step 2: Building the Topology - Adding Hosts

Add four hosts.

Step 3: Building the Topology - Connecting the Hosts to Hubs and Switches

Adding a Hub

Select a hub, by clicking once on Hubs and once on a PT-Hub.

Add the hub by moving the plus sign "+" below PC0 and PC1 and click once.

Connect PC0 to Hub0 by first choosing Connections.

Click once on the Copper Straight-through cable.

Perform the following steps to connect PC0 to Hub0:
1. Click once on PC0
2. Choose FastEthernet
3. Drag the cursor to Hub0
4. Click once on Hub0 and choose Port 0
5. Notice the green link lights on both the PC0 Ethernet NIC and the Hub0 Port 0 showing that the link is active.

Repeat the steps above for PC1 connecting it to Port 1 on Hub0. (The actual hub port you choose does not matter.)

Step 4. Adding a Switch

Select a switch, by clicking once on Switches and once on a 2950-24 switch.

Add the switch by moving the plus sign "+" below PC2 and PC3 and click once.

Connect PC2 to Hub0 by first choosing Connections.

Click once on the Copper Straight-through cable.

Perform the following steps to connect PC2 to Switch0:
1. Click once on PC2
2. Choose FastEthernet
3. Drag the cursor to Switch0
4. Click once on Switch0 and choose FastEthernet0/1
5. Notice the green link lights on PC2 Ethernet NIC and amber light Switch0FastEthernet0/1 port. The switch port is temporarily not forwarding frames, while it goes through the stages for the Spanning Tree Protocol (STP) process.
6. After a about 30 seconds the amber light will change to green indicating that the port has entered the forwarding stage. Frames can now forwarded out the switch port.

Note: Spanning Tree Protocol (STP) is discussed later.

Repeat the steps above for PC3 connecting it to Port 3 on Switch0 on port FastEtherent0/2. (The actual switch port you choose does not matter.)

Move the cursor over the link light to view the port number. Fa means FastEthernet, 100 Mbps Ethernet.

Replace the previous figure by the screenshot of your computer as you complete this last step [One mark]

Step 5: Configuring IP Addresses and Subnet Masks on the Hosts

Before we can communicate between the hosts we need to configure IP Addresses and Subnet Masks on the devices.

Click once on PC0.

Choose the Config tab and click on Settings. It is here that you can change the name of PC0. It is also here where you would enter a Gateway IP Address, also known as the default gateway and the DNS Server IP Address. We will discuss this later, but this would be the IP address of the local router. If you want, you can enter the Gateway IP Address 172.16.1.1 and DNS Server IP Address 172.16.1.100, although it will not be used in this lab.

Click on Interface and then FastEthernet. Although we have not yet discussed IP Addresses, add the IP Address to 172.16.1.10. Click once in the Subnet Mask field to enter the default Subnet Mask. You can leave this at 255.255.0.0. We will discuss this later.

Also, notice this is where you can change the Bandwidth (speed) and Duplex of the Ethernet NIC (Network Interface Card). The default is Auto (autonegotiation), which means the NIC will negotiate with the hub or switch. The bandwidth and/or duplex can be manually set by removing the check from the Auto box and choosing the specific option.

Bandwidth - Auto

If the host is connected to a hub or switch port which can do 100 Mbps, then the Ethernet NIC on the host will choose 100 Mbps (Fast Ethernet). Otherwise, if the hub or switch port can only do 10 Mbps, then the Ethernet NIC on the host will choose 10 Mbps (Ethernet).

Duplex - Auto

Hub: If the host is connected to a hub, then the Ethernet NIC on the host will choose Half Duplex.

Switch: If the host is connected to a switch, and the switch port is configured as Full Duplex (or Autonegotiation), then the Ethernet NIC on the host will choose Full Duplex. If the switch port is configured as Half Duplex, then the Ethernet NIC on the host will choose Half Duplex. (Full Duplex is a much more efficient option.)

The information is automatically saved when entered.

To close this dialog box, click the "X" in the upper right.

Repeat these steps for the other hosts. Use the information below for IP Addresses and Subnet Masks.

Host IP Address Subnet Mask
PC0 172.16.1.10 255.255.0.0
PC1 172.16.1.11 255.255.0.0
PC2 172.16.1.12 255.255.0.0
PC3 172.16.1.13 255.255.0.0

How many bits is the Network portion of these addresses?
How many bits is the Host portion of these addresses?
What is the maximum number of hosts that can be addressed in this network?

Verify the information

To verify the information that you entered, move the Select tool (arrow) over each host.

Replace the previous figure by the screenshot of your computer as you complete this last step [ONE AND A HALF MARKS]

Step 6: Connecting Hub0 to Switch0

To connect like-devices, like a Hub and a Switch, we will use a Cross-over cable. Click once the Cross-over Cable from the Connections options.

Move the Connections cursor over Hub0 and click once.

SelectPort 5 (actual port does not matter).

Move the Connections cursor to Switch0.

Click once on Switch0 and choose FastEthernet0/4 (actual port does not matter).

The link light for switch port FastEthernet0/4 will begin as amber and eventually change to green as the Spanning Tree Protocol transitions the port to forwarding.

Replace the previous figure by the screenshot of your computer as you complete this last step [One mark]

Step 7: Verifying Connectivity in Realtime Mode

Be sure you are in Realtime mode.

Select the Add Simple PDU tool used to ping devices..

Click once on PC0, then once on PC3.

The PDU Last Status should show as Successful.

Resetting the Network

At this point we will want to reset the network, Whenever you want to reset the network and begin the simulation again, perform the following tasks:

Click Delete in the PDU area.

Now, Power Cycle Devices and confirm the action.

Waiting for Spanning Tree Protocol (STP)

Note: Because Packet Tracer also simulates the Spanning Tree Protocol (later), at times the switch may show amber lights on its interfaces. You will need to wait for the lights to turn green on the switches before they will forward any Ethernet frames.

Step 8: Verifying Connectivity in Simulation Mode

Be sure you are in Simulation mode.

Deselect all filters (All/None) and select only ICMP.

Select the Add Simple PDU tool used to ping devices..

Click once on PC0, then once on PC3.

Continue clicking Capture/Forward button until the ICMP ping is completed. You should see the ICMP messages move between the hosts, hub and switch. The PDU Last Status should show as Successful.

Step 9: Replace the previous figure by the screenshot of your computer as you complete this last step. Be sure that the Simulation Panel is included in the insert [ TWO MARKS]

Step 10: Saving the Topology

Perform the following steps to save the topology. Use the File/Save as menu option. Keep the same file type, but rename it using the following naming convention: LASTNAME_FIRSTNAME_Asignment1

Instructions to submit your report:

1. Be sure that you wrote your full name on the first line of this report document. One mark deducted if you do not write your name at the beginning of this document.
2. Save your report as a pdf file using the following format: LASTNAME_FIRSTNAME_Asignment1.pdf One mark deducted if you do not follow this format.
3. Submit two files:
a. This report document in pdf format. One mark deducted if you use another format.
b. The Packet Tracer filefilesaved from the Step 10.One mark deducted if you miss this file.
4. Once finished the activity, submit the files using the Slate dropbox by the due date. Do not compress any file. One mark deducted if you compress a file.

Attachment:- Introduction to Data Communications and Networking.rar

Reference no: EM133337566

Questions Cloud

Outline the phases of organizational development : Outline the phases of organizational development.
Why supply chain management software dominated : Why supply chain management software dominated by Enterprise Resource Planning players such as Systems Applications and Products and Oracle
What is the primary organizational variable : What is the primary organizational variable that can be used to reward individuals and reinforce performance?
Adopting supply chain it systems : Why the high-tech industry has been leader in adopting supply chain IT systems?
Configuring ip addresses and subnet masks on the hosts : TELE13167 Introduction to Data Communications and Networking, Sheridan College Configuring IP Addresses and Subnet Masks on the Hosts
Some ways for user or the device to hinder data collection : Where is that data stored on or off device and how might this affect data collection? What are some ways for the user or the device to hinder data collection?
Comment on cyber risk models or modeling : Comment on cyber risk models or modeling. Discuss how your selected resources can be used in your selected organization.
Revolutionizing cyber operations : Revolutionizing Cyber Operations. Cyber is a dynamic domain that evolves on a daily basis.
Provide a specific treatment plan : Diagnose the child and describe how you arrived at the diagnosis (i.e., how you ruled out other diagnoses) and Provide a specific treatment plan

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd