Internal network address to incorporate variable length sub

Assignment Help Computer Networking
Reference no: EM13906256

Suppose the image below is your company’s network diagram after a merger and you have recently added access controls to your network. The CSO would like to:

·Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol.

·Set up all of the accountants on a separate VLAN.

·Create a VPN connection to allow accountants to access the accounting database from their home.

Write a two to three (2-3) page paper in which you:

1.Re-create the diagram provided in the assignment summary using VLSM, through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. (The starting address is 172.16.0.0.) Note: The graphically depicted solution is not included in the required page length. 

2.Specify the commands that you would use to set up the routers to use EIGRP.

3.Outline the requirements to set up a VLAN and VPN access for the accountants.

4.Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to eliminate loops. 

Your assignment must follow these formatting requirements:

·Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

·Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

·Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

·Describe and implement Virtual Local Area Networks (VLANs) on a computing network.

·Compare and contrast dynamic routing, distance vector routing, and link-state routing protocols.

·Use technology and information resources to research issues in Internetworking.

·Write clearly and concisely about basic internetworking using proper writing mechanics and technical style conventions.

 

 

Reference no: EM13906256

Questions Cloud

The distribution of excess profits amounting : Suppose that management and labor are bargaining over the distribution of excess profits amounting to $200 per worker. Suppose that failure to reach an agreement an agreement reduces management's share of the surplus by 5 percent per round and reduce..
Source code of the existing software : The development team of SoftSols Inc. analyzes the source code of the existing software and notes the following observations:
Determine the input power required at shaft 1 : Design a gear train which satisfies the above criteria. Use a sketch to illustrate your design, label the gears A, B, C, etc. from the driver to the driven gear, and state the number of teeth on each gear.
Compliance with generally accepted accounting principles : Lauren Corporation was formed two years ago to manufacture fitness equipment. it has been profitable and is growing rapidly. it currently has 150 shareholders and 90 employees; most of the employees own at least a few shares of Lauren's stock. Explai..
Internal network address to incorporate variable length sub : Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol. Set up all of the accountants on a separate VLAN. Create a VPN connection to allow accountants to access the accounting database from..
The firms in a perfectly competitive industry : "When the firms in a perfectly competitive industry are just able to cover their cost of production, economic profit is zero. Therefore, if demand falls, causing prices to go down even a little bit, all of the firms in the industry will immediately s..
Define assets-liabilities and equity : Define [a]assets, [b] liabilities, and [c] equity. Which financial statement is sometimes called the statement of financial position. During the year, Able Co. purchased $39,600 worth of supplies, at the end of the year, the balance sheet showed a ba..
Find pin dynamic forces and torque : Find: Pin dynamic forces and T (torque applied on link 2 ) to generate the required input velocity following requested output velocity of 25rpn Please note that for kinetic analysis
Indicate extent to which the payments are taxable income : Indicate the extent to which these payments are taxable income to Jeremy this year if Jeremy is (1) a cash-method taxpayer and (2) he is an accrual-method taxpayer.

Reviews

Write a Review

Computer Networking Questions & Answers

  What protocol can use to move data

Can you run an ordinary TCP connection through the guard to pass it through the guard? Explain why/why not, and if not, what protocol can you use to move the data?

  Distinguish between packet switching and circuit switching

Distinguish between packet switching and circuit switching: Give three advantages and three disadvantages of each one and discuss four advantages of layering as seen in the TCP/IP architecture.

  Research paper on structures and classes

Write a 2 page research paper (excluding title and reference pages) on structures and classes. Explain the concepts discussed in the textbook using at least an example not included in the textbook. In addition to textbook, use two other resource..

  Hypothetical company trying to certify at top secret level

Hypothetical company (make up one for this problem) for your system (for example: operating system) that you are trying to certify at the TOP SECRET level?

  Andrea stevens cosmetics is a small cosmetics

Andrea Stevens Cosmetics is a small cosmetics company that has a network of 30 computers. They are currently using a 10BaseT network that is wired with Category 5 Plenum cable

  Explain standard can versus extended can

What is CAN protocol and where is it used, what is LIN and where is it used and explain "Standard CAN" versus "Extended CAN".

  Network management and mobility

Network Management and Mobility- Modern networks have to support a number of digital data protocols as well as digital audio protocols. The ability to stream both data and audio has led to the design and deployment of advanced applications

  Establish a wan connectivity between two offices

establish a WAN connectivity between your local offices across town.

  What type of security issues need to be considered

What are some of the reasons an organization might consider using a Wireless LAN? What type of security issues need to be considered when implementing a Wireless LAN

  Briefly discuss how the concept of workstation domains

Briefly discuss how the concept of workstation domains figure into your organizations security policies, please cite and list your references

  What are the advantages of dhcp

Compare and contrast DCHP and the ICMP messages that were previously used for start up configuration. What are the advantages of DHCP that caused it to be the popular solution

  The use of a trac generating application and a network

the use of a trac generating application and a network emulator to perform network analysis. the trac generating

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd