Draw a logical diagram for the entire network

Assignment Help Computer Networking
Reference no: EM132263365

Assignment -

Draw a logical diagram for the entire 64.44.120.0/22 network.

Draw a physical diagram for the subnet network Net1, 64.44.120.0/23.

You will draw a physical and logical diagram for a network, which is 64.44.120.0/22 We have 4 internal subnets at two sites. Net1 needs to support 190 hosts but may later grow to 400 hosts. Net2 needs to support 76 hosts but may later grow to 200. Net3 needs to support 14 hosts but may grow to 100 hosts. We also may have unused address space you have available 4 routers.

You also have available any number of 8, 16, 32, 48, and 96 port 10/100/1000 manageable Ethernet switches.

Your site connects via a border router to the Internet via 66.44.1.0/30 using point to point serial interface, se0. The ISP is at 66.44.1.1 the border router address for interface se0 on that point to point is 66.44.1.2.

Site A links to Site B via 64.44.123.0/30. .1 is internal router at site A and .2 is internal router 3 at site B.

The border router (brouter) has 2 ethernet interfaces. One, Gi0/0, connects to and instantiates the 64.44.120.0/23 subnet. The other, Gi0/1, connects to and instantiates the 64.44.123.128/25 subnet. It uses the address 64.44.121.254/23 for Gi0/0 and 64.44.123.254/25 for Gi0/1.

A internal router (irouter1) is connected to 64.44.120.0/23 via its interface Gi0/0 and also connects the 64.44.122.0/24 network via its interface Gi0/1. It also has a serial interface connected to site B (se0) It uses 64.44.121.253 for Gi0/0 and 64.44.122.254 for Gi0/1 and 64.44.123.1 for the se0 link.

A internal router (irouter2) is conected to both 64.44.123.128/25 via its eth0 interface and 64.44.122.0/24 via its eth1 interface. It uses 64.44.123.253 for eth0 and 64.44.122.253 for eth1.

A internal router (irouter3) is at site B and is connected to 64.44.123.64/26 via its interface Gi0/0. It also has a serial interface connected to site A (se0) It uses 64.44.123.62 for Gi0/0 and 64.44.123.2 for the se0 link.

The physical network for Net1, 64.44.120.0/23, consists of a group of 5 48 port switches.

Draw a logical diagram for the entire 64.44.120.0/22 network.

Draw a physical diagram for the subnet network Net1, 64.44.120.0/23.

Note - Given the instruction and sample of the logical network diagram and a sample of a physical subnetwork diagram.

Attachment:- Assignment Files.rar

Reference no: EM132263365

Questions Cloud

Summarizing the content of the article or paper : You should summarize the content of the article or paper and explain how it relates to STRIDE and Threat Modeling. Provide your own assessment of the article.
Give an example of a scenario : Please discuss and give an example of a scenario when it is important to trade space for time and trade time for space in algorithmic design.
Eliminating partial dependencies : Second Normal Form (2NF) Let's take our 1NF circus tables to Second Normal Form (2NF) by eliminating partial dependencies.
How they should be managed once implemented : 1. Describe in detail what security controls are, how they are chosen, and how they should be managed once implemented.
Draw a logical diagram for the entire network : Draw a logical diagram for the entire 64.44.120.0/22 network. Draw a physical diagram for the subnet network Net1, 64.44.120.0/23
What is the management philosophy : What promotional mix, channels of distribution, and pricing strategies are being used by the organization?
Why are data classification systems important : What Defense in Depth methodologies could be integrated into your business or educational environment? Why are data classification systems important?
What makes a secure password secure : What makes a secure password secure? As the system administrator for a medium-sized company, how would you convince users that letting the computer operating.
What about the widget or gadget ratio : How much do varying expense margins impact the attractiveness of pursuing the opportunity? What about the widget / gadget ratio?

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine whether you prefer a laptop or desktop

From the e-Activity, determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to offer.

  Calculate rsa signature on long message by computing mod

Calculate RSA signature on long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Analyse four security procedures that are recommended to

analyse four security procedures that are recommended to protect computer software from corruption and

  Discuss the purpose of subnetting

Discuss the purpose of subnetting. What does CIDR stand for and mean? Discuss the use of ARP, TCP, UDP, FTP, HTTP, and Telnet.

  Industroyer or crashoverride

Do you believe North Korea has the technological capability to utilize malware such as Industroyer or CrashOverRide?

  How does a packet from one lan node find its way to a

how does a packet from one lan node find its way to a recipient on the same lan? how does a packet find its way to a

  What factors might cause peak loads in a network

What factors might cause peak loads in a network?  - How can a network designer determine if they are important, and how are they taken into account when designing a data communications network?

  What are the different types of cloud services

What are the different types of cloud services? What are the benefits and drawbacks of opting for a cloud service solution over an in-house IT solution?

  What features would you look for on switches you purchase

What features would you look for on the switches you purchase for this design? Explain why you would want each feature.

  Analyze and compare various server management software

MN506 - Analyze and compare various server management software such as Windows Server 2008, Unix, and Linux. Configure and troubleshoot server features

  Use a search engine to identify

Use a search engine to identify the positions of Google and Apple regarding cell phone tracking. What reasons do the give for tracking cell phones? What limitations do you think they might support?

  Examining two advantages of hardware vpns

Examine and explain the two advantages and two disadvantages for three types of protocols used in VPNs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd