Give an example of the broadcasting uses on tcp-ip

Assignment Help Computer Networking
Reference no: EM131974981

Assignment: Theory and Simulation Exercises

Task

Part A

Question 1:

IP addresses are the logical identifier of devices in networks. please answer the following subquestions:

a) What is a broadcast IP?
b) What is a defaulty gateway? Why we need it?
c) What is a subnet mask? What does it do?
d) Give an example of the broadcasting uses on TCP/IP.

Question 2:

In your local machine CLI window, ping your default gateway and ping www.cisco.com. Once successful, type the command "arp - a" , and answer the follwoingsubquestions:

a) take a screen shot of the output and explain the first two lines as examples.
b) what does ARP stand for?
c) why do we need ARP?

Question 3:

Issue a "netstat -r" command in the CLI window, take a screen shot of the IPv4 and IPv6 tables and explain the table content row-by-row.

Question 4:

Peter has bought a Cisco switch of model 2960. He found that he can't access the switch as it was protected by a password. Please advise him with the correct password recovery procedure and commands to clean up the old configuration.

Part B:

A small business, Smart Office Services Pty Ltd, has its central office (HQ) and two branch offices (Branch 1 and Branch 2) linked via serial leased lines using routers. The network topology is given as follows. It is required that:

1) You will be assigned a single IP to configure this network.

2) For the private IP address, use the last 4 digits of your student ID as the first two octets of your network address. Keep other bits the same as shown in the addressing table and the figure below. For example, if your student ID is 12345678, using the last 4 digits (5678), so your main network address will be 56.78.0.0/16

Study the network topology, examine the network requirements, set up the network in Packet Tracer and complete all four sub-questions. Keep in mind that IP addresses will be needed for each of the LAN interfaces.

Question 5:

Follow VLSM scheme to identify the different subnets according to network requirements. Please analyse and design the best IP addressing scheme. Create a table which lists the following information: Router Interfaces/ IP Address (Highest)/ IP Address (Lowest)/ Subnet Mask/ Default Gateway). Please show working out. Note: The lowest IP addresses of each subnet should be given to the PCs. The highest IP addresses of each subnet are given as the default gateway.

Question 6:

Follow previous questions' requirement, set up your network in Packet Tracer simulation software. Configure the three (3) routers:

- name the routers and label them as HQ, Branch1 and Branch 2
- set the secret password as ‘class' on all routers
- configure interfaces/ PCs
- configure TELNET on the HQ router with a password of ‘CISCO' and (a suitable) MOTD
- Verify basic configuration and router operations
- What are the main components of a Cisco router?
- You need to keep a back up of IOS of the routers. Please advise the two methods with correct procedures.

Question 7:

Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers. "Show ip route" check and screen shot each router's routing table.

Question 8:

PING from PC6 in LAN6 to PC4 in LAN4 (checked in Packet Tracer file). What protocol is used by PING? What are the names of two PING messages? Provide screen shots of successful ping Record the information flow in EVENT LIST of simulation and explain the PDU information such as TYPE and involved layers in each stage

Note: 2 marks are given to correct referencing.

Reference no: EM131974981

Questions Cloud

What is the probability that the fiber will break : What is the probability that the fiber will break at 1,500 cycles? What is the probability that the fiber will break at 2,500 cycles?
How much could the firm raise and invest in inventory : According to company records, current loan covenants in place prohibit the current ratio from dropping below 2.30. How much could the firm raise and invest.
What is the expected rate of return for the first year : If you buy the stock now, what is the expected rate of return for the first year?
What is this company terminal value : You expect this cash flow to grow at 2% in perpetuity, and the company's WACC is 14%. Using the Perpetual Growth Method, what is this company's Terminal Value
Give an example of the broadcasting uses on tcp-ip : What is a broadcast IP? What is a defaulty gateway? Why we need it? What is a subnet mask? What does it do? Give an example of the broadcasting uses on TCP/IP.
How do the numbers relate to the given terms : A firm has $400,000 in credit sales and $100,000 in accounts receivable. Compute accounts receivable turnover and average number of collection days.
Assume that the stock is priced in equilibrium : What is the expected price in 3 years, E(P3)? Assume that the stock is priced in equilibrium.
What is the firm cash conversion cycle : A firm's days of sales outstanding are 23.4, days of inventory on hand are 45.9, What is the firm's cash conversion cycle
Determine the debt ratio of the firm : A firm has 30M shares issued with a market value of 15€ per share. It has debt issued with a market value of 104.4 M€ and it decides to pay a dividend.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd