Design private subnetworks

Assignment Help Computer Networking
Reference no: EM131516015

Unit's Learning Outcomes

At the completion of this unit, students should be able to:

1. Describe LAN and WAN network technologies, topologies and implementations;

2. Configure, test and troubleshoot various network devices such as routers and switches;

3. Configure and test different WAN protocols, such as HDLC, PPP, Frame Relay, DHCP, ISDN, NAT and PAT in a network environment;

4. Devise LAN and WAN design and test network implementations;

5. Identify and compare IPv4 and IPv6 in WAN networks;

6. Discuss the requirements of hierarchical network models for campus and other similar applications;

7. Utilise a systematic approach to solve various network problems.

MIT's Graduate Attributes

8. Ability to Communicate

9. Independent and Lifelong Learning

10. Ethics

11. Analytical and Problem Solving

12. Cultural and Global Awareness

13. Team work

14. Specialist knowledge of a field of study

Task 1:

Complete the table below for CIDR Prefixes, available IP addresses and Their Decimal Equivalent.

Note: To obtain full mark, there should not be any mistake in the table. In other words, zero (0) mark will be given unless 100% correct for the entire table from A1 to B10.

Note: Don't forget that you need to consider network address and broadcast address, which should be considered for the available IP addresses.

CIDR Network Prefix

No of Available IP Addresses for hosts

Dotted Decimal Subnet Equivalent

/19

A1

B1

/20

A2

B2

/21

A3

B3

/22

A4

B4

/23

A5

B5

/24

A6

B6

/25

A7

B7

/26

A8

B8

/27

A9

B9

/28

A10

B10

Using Private IPv4 Addresses

The IANA has reserved three blocks of IPv4 addresses for companies to use on their private networks. These addresses are defined in RFC 1918, Address Allocation for Private Internets. You can use these private addresses, also known as 1918 addresses, for systems on local networks within a corporate intranet. However, private addresses are not valid on the Internet. Do not use them on systems that must communicate outside the local network.

The following table lists the private IPv4 address ranges and their corresponding netmasks.

How IP Addresses Apply to Network Interfaces

To connect to the network, a system must have at least one physical network interface. Each network interface must have its own unique IP address. During installation, you must supply the IP address for the first interface that the installation program finds. Usually that interface has the name device-name, and this interface is considered the primary network interface.

Task 2:

Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table.

Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets.

Domain

Network Mask

Network Address

Host from

Host to

No of IP Address

Broadcast Address

Network A

/21

A1

B1

C1

D1

E1

Network B

/21

A2

B2

C2

D2

E2

Network C

/19

A3

B3

C3

D3

E3

Network D

/24

A4

B4

C4

D4

E4

Network E

/25

A5

B5

C5

D5

E5

Network F

/24

A6

B6

C6

D6

E6

Network G

/24

A7

B7

C7

D7

E7

Network H

/21

A8

B8

C8

D8

E8

Network I

/24

A9

B9

C9

D9

E9

Network J

/24

A10

B10

C10

D10

E10

Network K

/24

A11

B11

C11

D11

E11

Network L

/20

A12

B12

C12

D12

E12

Network M

/20

A13

B13

C13

D13

E13

Network N

/12

A14

B14

C14

D14

E14

Network O

/13

A15

B15

C15

D15

E15

Task 3:

You are requested to design IP addressing for 10 x subnets for the following requirements: To accommodate X hosts for each subnet
,where X = 2, 7, 17, 32, 66, 1024, 2047, 4900, 10,000 and 500,000.

1. Use the table in task 2 (if required) or use your own template, e.g. Excel spreadsheet, to work out and provide below for each subnet

(1) Network mask
(2) Network Address
(3) Host from
(4) Host To
(5) No of Available IP addresses (usable) and
(6) Broadcast Address

2. Show formulas to work out the number of bits allocated for (a) Network and (b) Hosts for the last subnet, i.e. subnet hosting 500,000 hosts.

3. To design and accommodate the above 10 subnets, what network and network mask do you use to maximize reserved IP ranges? List all of the reserved IP address ranges after 10 subnets have been allocated for future use. [3 mark]

Notes:

- No need to consider future expansion for hosts.
- Use Class A IP address range and CIDR to design
- Try to save as many IP ranges as possible for future use.

Part 2: Problem Based Learning (PBL)

Read the below and learn how they designed and built their network to resolve the problems.

Building Express Backbone: Facebook's new long-haul network

Facebook has multiple data centers in the U.S and Europe. For the past ten years, they were connected by a single wide-area (WAN) backbone network known as the classic backbone or CBB. This network carried both user (egress) traffic and internal server-to-server traffic.

In recent years, bandwidth demand for cross-data center replication of rich content like photos and video has been increasing rapidly, challenging the efficiency and speed of evolution of the classic backbone.

Furthermore, machine-to-machine traffic often occurs in large bursts that may interfere with and impact the regular user traffic, affecting our reliability goals. As new data centers were being built, we realized the need to split the cross-data center vs Internet-facing traffic into different networks and optimize them individually. In a less than a year, we built the first version of our new cross-data center backbone network, called the Express Backbone (EBB), and we've been growing it ever since.

Tasks 4:

Provide answers to all the questions.

1. What are the problems motivating the project?

2. There are several protocols mentioned in the article. What are they? List ALL of them. Briefly describe the protocols found above. At least 4 protocols (100 - 200 words each).

3. When they began the network design, they had objectives to overcome constraints. What did they do to achieve the goals? Write two of them.

4. What are the benefits of their approach after the project has been completed?

5. What are the challenges they faced after the project?

6. What are the 3 major steps they followed in network design to achieve the goals?

7. What are the benefits of a hybrid model for software design?

8. What is LSP? How are LSPs created in MPLS? (500 - 800 words)

9. Describe ‘Data Centre' including definition, purpose, trend, related issues etc. (500 - 800 words)

10. Summarise traffic engineering, what is it? How does it work? Why is it required? e.g. RSVP- TE (500 - 800 words)

Attachment:- Assessment Template.rar

Reference no: EM131516015

Questions Cloud

Business school edition-walt disney prospectus : Students are to go to the Thomson One site and find the prospectus filed on December 19, 2008, by Walt Disney Company (ticker symbol, DIS).
Distinguish dividends and stock splits : Distinguish dividends and stock splits. Which factors influence dividend payout? Please include references so I can research this further.
Compute the future value : Compute the future value in year 8 of a $3,200 deposit in year 1 and another $2,700 deposit at the end of year 3 using a 10 percent interest rate.
Concepts to support statements and assumptions : What is the total amount you will pay for the car (principal and interest) in each of the steps 1,2,3 and 4.
Design private subnetworks : Complete the table below for CIDR Prefixes, available IP addresses and Their Decimal Equivalent - design and accommodate the above 10 subnets,
What was your realized? return : a. What was your realized? return? b. How much of the return came from dividend yield and how much came from capital? gain?
Portfolio weights of the three stocks in portfolio : What are the portfolio weights of the three stocks in your? portfolio? What is the expected return of your? portfolio?
Expected return of a portfolio : What is the expected return of a portfolio that consists of 60% Autodesk stock and 40% Costco? stock, according to the? CAPM?
Information in the assignment description : In this assignment, please show all work, including formulae and calculations used to arrive at financial values. You must answer the following:

Reviews

len1516015

6/2/2017 6:19:10 PM

Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table. Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets. [75 x 0.333 mark for each = 25 marks. Total mark portion of less than '.1' will be rounded down, e.g. 22.79 -> 22.7] Domain Network Mask Network Address A4 Host from B4 Host to No of IP Address Broadcast Address A1 C1 D1 E1 Network A /21 B1 Network B /21 A2 A3 B2 B3 C2 C3 D2 D3 E2 E3 Network C /19 Network D /24 C4 D4 E4 C5 E5 Network E A5 B5 D5 /25 C6 E6 Network F A6 B6 D6 /24 C7 E7 Network G A7 B7 D7 /24 C8 E8 Network H /21 /24 A8 A9 A10 A11 B8 B9 B10 B11 C10 D8 D9 D10 E9 Network I C9 E10 Network J /24 C11 D11 E11 Network K /24

Write a Review

Computer Networking Questions & Answers

  Data communication could you give me some ideas of every

could you give me some ideas of every questions of this assignmentor can you recommend some reading materials to

  Design type of lan-windows server network operating system

It has already decided to use the Windows Server 2003 network operating system. What type of LAN will your team design for this company?

  How often are network standards reviewed

How often are network standards reviewed? What category of UTP cabling is the minimum for a telephone cable?Cat 5 is used for telephone cable, before Cat 5, Cat 3 was used.

  Benefits and drawbacks of using social networking

What are some benefits and drawbacks of using social networking?

  What are the main telecommunications transmission media and

1. what are the principal components of telecommunications networks and key networking technologies?2.describe the

  Project 1 bull in your own words what rfc gives

project 1 bull in your own words what rfc gives the protocol and specifications a news server must use to

  Text book – computer networking a top down approach

Text Book – Computer networking A top down approach, Part 1. Text reading, Part 2. Textbook questions, Chapter 7 , 7.1 Generalize the basic approaches we used for making the best out of best effort service for real-time interactive multimedia applica..

  Information security and disaster recovery

Explain which concepts are the most significant to consider when designing information security policies and procedures.

  Find a bit-inverter turing machine

Find a Turing machine that recognizes the set of palindromes on {0, 1}*, that is, the set of all strings in {0, 1}* that read the same forward and backward.

  Explain how professional associations and state regulatory

write a 1050- to 1750-word paper in which you discuss the content in each site the professionals involved and how the

  The future of the internet lies with ipv6

The future of the internet lies with IPv6

  Determine rtcp bandwidth that each sender be assignied

Let the RTP session comprising of four users, all of which are sending and receiving packets to same multicast address. Determine RTCP bandwidth that each sender be assignied?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd