Difference between dynamic routing and static routing

Assignment Help Computer Networking
Reference no: EM131627408

There are Eight tasks to complete in this assignment. There are 30 marks in total.

Using Packet tracer implement the following tasks based on the network topology of a small business given below. Smart Sale Pty Ltd has four departments: Sales, Production, Marketing and Management. Its Central office (HQ) controls the connection between Internet Service Provider (ISP) and one local office (R1). Examine the network requirements and complete the eight questions to make the company network service running.

Please use your last 4 digits of your student ID as the first two octets of your network address. Keep other bits same as what are shown in the addressing table and the figure below. For example, if your student ID is 11567890, using the last 4 digits (7890). your main network address will be 78.90.0.0.

Consider the following Topology in the figure below:

1978_figure.jpg

Addressing Table

Device

Interface

IP Address

Subnet Mask

Default Gateway

VLAN

R1

50/0/0

x.x.1.2

255.255.255.0

N/A

N/A

60/0.10

x.x.10.1

255.255.255.0

N/A

10

60/0.20

x.x.20.1

255.255.255.0

N/A

20

60/0.30

x.x.30.1

255.255.255.0

N/A

30

60/0.88

x.x.88.1

255.255.255.0

N/A

88

60/0.99

x.x.99.1

255.255.255.0

N/A

99

S1

VLAN 88

x.x.88.33

255.255.255.0

x.x.88.1

88

PC-A

NIC

x.x.10.21

255.255.255.0

x.x.10.1

10

PC-B

NIC

x.x.20.22

255.255.255.0

x.x.20.1

20

PC-C

NIC

x.x.30.23

255.255.255.0

x.x.30.1

30

PC-D

MC

x.x.88.24

255.255.255.0

x.x.88.1

88

VLAN Table

VLAN

Name

Interfaces

10

Sales

F0/11-15

20

Production

F0/16-20

30

Marketing

F0/5-10

88

Management

F0/21-24

99

Native

G1/1

You need to use Packet Tracer to implement the given topology and to complete the following tasks:

Part A: Switching and VLANs

1. It is quite important to lock down access and install strong security features on PCs and servers. It is important that your network infrastructure devices, such as switches and routers, are also configured with security features. What will be the best practce to secure your switch S1?

2. Configure four VLANs as required on S1 and enable Trunking on 51.

3. Configure inter-VLAN routing on R1 based on the Addressing Table.

4. Configure four directly attached static routes on HQ to four VLANs: 10, 20, 30 and 88.

5. Configure directly attached static routes on HQ to reach Outside Host.
a. Configure the primary path through the Serial 0/1/0 interface.
b. Configure the backup route through the Serial 0/1/1 interface with a 10 AD.

6. Configure directly attached primary and backup summary routes on ISP for the entire x.x.0.0/17 address space.
a. Configure the primary path through the Serial 0/1/1 interface.
b. Configure the backup route through the Serial 0/1/0 interface with 25 AD.

7. Configure a directly attached default route on R1.

8. Verify connectivity by making sure all the PCs can ping Outside Host (Screen shots required)

9. Explain and analysis the routing process of three routers in the case of ping from PC-A to Outside Host.

Please save your configured packet tracer file with the name of "PT_your studentID_partA"

Part B Dynamic Routing

10. What is difference between dynamic routing and static routing? If you have another option to use dynamic routing in this project, how would you like to do?

Reference no: EM131627408

Questions Cloud

Benefits and risks of using stock index futures to hedge : Jim Pernelli and his wife, Polly, live in Augusta, Georgia. Like many young couples, the Pernellis are a two-income family.
Discuss legal environment of business : List the elements required to form a valid contract, and give a definition for each element.
Determine the current value of the t-note futures contract : T. J. Patrick is a young, successful industrial designer in Portland, Oregon, who enjoys the excitement of commodities speculation. T. J. has been dabbling.
Describe the process you would go through in solving problem : Consider a small problem that is solvable scientifically. Describe the process you would go through in solving that problem.
Difference between dynamic routing and static routing : What is difference between dynamic routing and static routing? If you have another option to use dynamic routing in this project, how would you like to do?
Explain embrace a socially responsible business policy : Applying the teachings of Centesimus Annus, can a corporation make money while at the same time embrace a socially responsible business policy
How many dollars would have after converting back to dollars : You have purchased a futures contract for euros. The contract is for 125,000 euros and the quote was 1.1636. On the delivery date, the exchange quote is 1.1050.
What is purpose of a control group and experimental group : During an experiment, what is the purpose of a control group and experimental group? In experimental evaluation of a new drug, what is the purpose of a placebo?
Discuss provide details of what insider trading is : Provide details of what insider trading is. Why is it prohibited? What is inside information? What are the exemptions

Reviews

len1627408

9/5/2017 3:31:47 AM

commands are Incorrect or missing. incorrect protocols are selected Protocols Protocols are contextualized to the problem Protocols are appropriate to the problem with minor limitation. Protocols selected have some limitations in application Protocols selected have many limitations in application Protocols are not contextualized VLANs and LAN Dunking Configurations of VLANs and VLAN trunking are completed and verified correctly onfigurations of VLANs and VLAN Dunking re completed and verified with minor errors onfgurations of VLANs and VLAN bunking are completed with some errors and verified mostly i Configurations of VLANs and VLAN trunking are completed with some errors and verified partially • nfigurabons of VLANs and VLAN nking are incorrect or missing Level of • - pth of ustification Explanations and justification are dearly articulated and comprehensive, explanations are logical and clear Explanation provided. clearly described but with minor errors in it Explanation provided, clearly descnbed but major errors in it Explanation provided, but not clear or cared Explanations and justification are absent Presentation Presentation is clear

len1627408

9/5/2017 3:31:10 AM

Most configuration commands are clear and accurate Appropriate protocols are selected Most procedures articulated and applied dearly. Some explanation has been attempted.Most calculations are correct and complete, appropriate hardware Identified and described with manor errors.Most configuration commands are accurate Major parameters of protocols are selected Most procedures are applied correctly. Some explanation has been attempted. Some calculations are correct. Hardware is identified and described with some errors. Some configuration commands are incorrect. Some parameters of protocols have been correctly selected The procedures required are absent or , pried Incorrectly. Calculations are incorrect hardware have been identified.

len1627408

9/5/2017 3:30:33 AM

Marking criteria The following criteria are designed to guide you in your presentation and preparation of your assignment. The criteria apply generally across all questions to show you the standard required for each of the criteria. Criteria HD Dl R PS FL • ()curacy All procedures articulated and applied clearly and concisely. all calculations are successful and complete. appropriate hardware identified and described clearly and concisely.

len1627408

9/5/2017 3:28:56 AM

CCNA assignment.Every task of packet tracer activity should be screen shoted Rationale In this assessment item, tasks are designed to reinforce the application of configuring routers for inter-VLAN communication and configure static routes to reach destinations outside of your network. Your ability demonstrate your skills at configuring inter-VLAN routing, static and default routes are also included. The tasks in this assignment relate to Learning Outcome 3 & 4: - be able to configure and troubleshoot networks to improve efficiency and security; - be able to configure, verify and solve a variety of problems involving Virtual Local Area Networks

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd