Design private subnetworks

Assignment Help Computer Networking
Reference no: EM131516015

Unit's Learning Outcomes

At the completion of this unit, students should be able to:

1. Describe LAN and WAN network technologies, topologies and implementations;

2. Configure, test and troubleshoot various network devices such as routers and switches;

3. Configure and test different WAN protocols, such as HDLC, PPP, Frame Relay, DHCP, ISDN, NAT and PAT in a network environment;

4. Devise LAN and WAN design and test network implementations;

5. Identify and compare IPv4 and IPv6 in WAN networks;

6. Discuss the requirements of hierarchical network models for campus and other similar applications;

7. Utilise a systematic approach to solve various network problems.

MIT's Graduate Attributes

8. Ability to Communicate

9. Independent and Lifelong Learning

10. Ethics

11. Analytical and Problem Solving

12. Cultural and Global Awareness

13. Team work

14. Specialist knowledge of a field of study

Task 1:

Complete the table below for CIDR Prefixes, available IP addresses and Their Decimal Equivalent.

Note: To obtain full mark, there should not be any mistake in the table. In other words, zero (0) mark will be given unless 100% correct for the entire table from A1 to B10.

Note: Don't forget that you need to consider network address and broadcast address, which should be considered for the available IP addresses.

CIDR Network Prefix

No of Available IP Addresses for hosts

Dotted Decimal Subnet Equivalent

/19

A1

B1

/20

A2

B2

/21

A3

B3

/22

A4

B4

/23

A5

B5

/24

A6

B6

/25

A7

B7

/26

A8

B8

/27

A9

B9

/28

A10

B10

Using Private IPv4 Addresses

The IANA has reserved three blocks of IPv4 addresses for companies to use on their private networks. These addresses are defined in RFC 1918, Address Allocation for Private Internets. You can use these private addresses, also known as 1918 addresses, for systems on local networks within a corporate intranet. However, private addresses are not valid on the Internet. Do not use them on systems that must communicate outside the local network.

The following table lists the private IPv4 address ranges and their corresponding netmasks.

How IP Addresses Apply to Network Interfaces

To connect to the network, a system must have at least one physical network interface. Each network interface must have its own unique IP address. During installation, you must supply the IP address for the first interface that the installation program finds. Usually that interface has the name device-name, and this interface is considered the primary network interface.

Task 2:

Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table.

Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets.

Domain

Network Mask

Network Address

Host from

Host to

No of IP Address

Broadcast Address

Network A

/21

A1

B1

C1

D1

E1

Network B

/21

A2

B2

C2

D2

E2

Network C

/19

A3

B3

C3

D3

E3

Network D

/24

A4

B4

C4

D4

E4

Network E

/25

A5

B5

C5

D5

E5

Network F

/24

A6

B6

C6

D6

E6

Network G

/24

A7

B7

C7

D7

E7

Network H

/21

A8

B8

C8

D8

E8

Network I

/24

A9

B9

C9

D9

E9

Network J

/24

A10

B10

C10

D10

E10

Network K

/24

A11

B11

C11

D11

E11

Network L

/20

A12

B12

C12

D12

E12

Network M

/20

A13

B13

C13

D13

E13

Network N

/12

A14

B14

C14

D14

E14

Network O

/13

A15

B15

C15

D15

E15

Task 3:

You are requested to design IP addressing for 10 x subnets for the following requirements: To accommodate X hosts for each subnet
,where X = 2, 7, 17, 32, 66, 1024, 2047, 4900, 10,000 and 500,000.

1. Use the table in task 2 (if required) or use your own template, e.g. Excel spreadsheet, to work out and provide below for each subnet

(1) Network mask
(2) Network Address
(3) Host from
(4) Host To
(5) No of Available IP addresses (usable) and
(6) Broadcast Address

2. Show formulas to work out the number of bits allocated for (a) Network and (b) Hosts for the last subnet, i.e. subnet hosting 500,000 hosts.

3. To design and accommodate the above 10 subnets, what network and network mask do you use to maximize reserved IP ranges? List all of the reserved IP address ranges after 10 subnets have been allocated for future use. [3 mark]

Notes:

- No need to consider future expansion for hosts.
- Use Class A IP address range and CIDR to design
- Try to save as many IP ranges as possible for future use.

Part 2: Problem Based Learning (PBL)

Read the below and learn how they designed and built their network to resolve the problems.

Building Express Backbone: Facebook's new long-haul network

Facebook has multiple data centers in the U.S and Europe. For the past ten years, they were connected by a single wide-area (WAN) backbone network known as the classic backbone or CBB. This network carried both user (egress) traffic and internal server-to-server traffic.

In recent years, bandwidth demand for cross-data center replication of rich content like photos and video has been increasing rapidly, challenging the efficiency and speed of evolution of the classic backbone.

Furthermore, machine-to-machine traffic often occurs in large bursts that may interfere with and impact the regular user traffic, affecting our reliability goals. As new data centers were being built, we realized the need to split the cross-data center vs Internet-facing traffic into different networks and optimize them individually. In a less than a year, we built the first version of our new cross-data center backbone network, called the Express Backbone (EBB), and we've been growing it ever since.

Tasks 4:

Provide answers to all the questions.

1. What are the problems motivating the project?

2. There are several protocols mentioned in the article. What are they? List ALL of them. Briefly describe the protocols found above. At least 4 protocols (100 - 200 words each).

3. When they began the network design, they had objectives to overcome constraints. What did they do to achieve the goals? Write two of them.

4. What are the benefits of their approach after the project has been completed?

5. What are the challenges they faced after the project?

6. What are the 3 major steps they followed in network design to achieve the goals?

7. What are the benefits of a hybrid model for software design?

8. What is LSP? How are LSPs created in MPLS? (500 - 800 words)

9. Describe ‘Data Centre' including definition, purpose, trend, related issues etc. (500 - 800 words)

10. Summarise traffic engineering, what is it? How does it work? Why is it required? e.g. RSVP- TE (500 - 800 words)

Attachment:- Assessment Template.rar

Reference no: EM131516015

Questions Cloud

Business school edition-walt disney prospectus : Students are to go to the Thomson One site and find the prospectus filed on December 19, 2008, by Walt Disney Company (ticker symbol, DIS).
Distinguish dividends and stock splits : Distinguish dividends and stock splits. Which factors influence dividend payout? Please include references so I can research this further.
Compute the future value : Compute the future value in year 8 of a $3,200 deposit in year 1 and another $2,700 deposit at the end of year 3 using a 10 percent interest rate.
Concepts to support statements and assumptions : What is the total amount you will pay for the car (principal and interest) in each of the steps 1,2,3 and 4.
Design private subnetworks : Complete the table below for CIDR Prefixes, available IP addresses and Their Decimal Equivalent - design and accommodate the above 10 subnets,
What was your realized? return : a. What was your realized? return? b. How much of the return came from dividend yield and how much came from capital? gain?
Portfolio weights of the three stocks in portfolio : What are the portfolio weights of the three stocks in your? portfolio? What is the expected return of your? portfolio?
Expected return of a portfolio : What is the expected return of a portfolio that consists of 60% Autodesk stock and 40% Costco? stock, according to the? CAPM?
Information in the assignment description : In this assignment, please show all work, including formulae and calculations used to arrive at financial values. You must answer the following:

Reviews

len1516015

6/2/2017 6:19:10 PM

Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table. Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets. [75 x 0.333 mark for each = 25 marks. Total mark portion of less than '.1' will be rounded down, e.g. 22.79 -> 22.7] Domain Network Mask Network Address A4 Host from B4 Host to No of IP Address Broadcast Address A1 C1 D1 E1 Network A /21 B1 Network B /21 A2 A3 B2 B3 C2 C3 D2 D3 E2 E3 Network C /19 Network D /24 C4 D4 E4 C5 E5 Network E A5 B5 D5 /25 C6 E6 Network F A6 B6 D6 /24 C7 E7 Network G A7 B7 D7 /24 C8 E8 Network H /21 /24 A8 A9 A10 A11 B8 B9 B10 B11 C10 D8 D9 D10 E9 Network I C9 E10 Network J /24 C11 D11 E11 Network K /24

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd