Ip address allocation plan for key network device

Assignment Help Computer Networking
Reference no: EM131960778

ASSIGNMENT - DATA COMMUNICATIONS AND NETWORKS

Objective:

- By completing this assignment, students will be demonstrating their knowledge and skills leant from week 1-6 that include:
o IP address planning

1 Problem Context

uSoft is a software development company with two branches spread over the Gold Coast region. The company's local area network (LAN) is captured in the topology below:

2387_figure.jpg

Head Quarter network has 100 network devices including all computers, printers and other devices. Branch A and B subsequently has 30 and 20 devices.

Recently, the company has been assigned with a new space of IP addressing and the whole network has to be re-addressed.

2 The Task

You are contracted by the company to help with the IP address planning.

The following is the new IP address space:

IPv4 network: 203.2.XY.0

IPv6 network: 2001:1234:ABCD: XY00::/64

where XY is the last 2 digits of your student ID

Your task in this assignment is to plan and document

- An IPv4 address plan for the LAN
- An IPv6 address plan for the LAN

You are expected to provide an efficient and optimum address allocation solution with the following details:

1. IP address requirement for each sub-network

2. IP address allocation plan for each network/sub-network including network address, subnet mask, broadcast address, default gateway address and valid host address range.

3. IP address allocation plan for key network device and interfaces e.g., servers, printers, router interfaces, etc.

Reference no: EM131960778

Questions Cloud

By how much will you overvalue the firm : By how much will you overvalue the firm if its beta is actually 2.1? (Do not round intermediate calculations. Round your answer to 2 decimal places.)
Account to chequing account : If you transfer $100 from your saving account to your chequing account, M1 increases by $100 but M2 does not change. Why?
What would be the expected return of the portfolio : If you want to put together a portfolio consisting of 40% Company A stock and 60% Company B stock, what would be the expected return of this portfolio?
Discuss potential damages the threats could cause : Discuss potential damages these threats and vulnerabilities could cause if exploited. What are the challenges and issue faced by corporation to control threats?
Ip address allocation plan for key network device : CSC00240 – Data communication and Networks - IP address allocation plan for each network/sub-network including network address, subnet mask, broadcast address
Indicate the change to global book value of equity : Consider the following potential events that might have occurred to Global on December 30, 2013. For each one, indicate which line items in Global's balance.
What is the cost of the portfolio : Consider the following portfolio: - Long 3 calls with strike price 98.0 and price 21.278 - Short 0 calls with strike price 98.0 and price 21.278.
Explain how the number of page faults depends on page size : In this lab you will simulate demand paging and see how the number of page faults depends on page size, program size, replacement algorithm, and job mix.
How will you manage your credit card debt : What factor(s) would cause you to accept this offer? What factor(s) would cause you to decline this offer? Be specific and thorough in your response.

Reviews

len1960778

4/27/2018 7:22:35 AM

it's work limit is 1000 in report.If you need any help.you can take mine username and password .Search on My SCU -scu blackboard Make sure that I will pass this assignment with good result.I have taken a risk .It's already due yesterday .I am going to do late submision so I'll definitely loose marks .But I trust you .you will make perfect that after marks .I'll pass.

Write a Review

Computer Networking Questions & Answers

  Explain what is a lan subnet

What is a LAN subnet? What are some of the strategies for a network administrator to consider use subnetting (why do it)? What, if any, equipment is needed? Are there other alternatives that can accomplish similar results

  Business applications of java

Summarize the main points of the article.

  Create network for multimedia development firm

You have been contracted to make a network for a multimedia development firm which currently uses 10-Mbps Ethernet network. Company needs a high-bandwidth network for multimedia team.

  You are to design a network

You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, and assign IP addresses to the appropriate devices. You will also be required to implement security..

  What is difference between a tcp segment and an ip packet

How are errors handled during transmission of segmented packets? What is the difference between a TCP segment and an IP packet?

  Describe ah tunnel between gateways-using esp-transport mode

Packets based on packet header. Describe the rationale for having AH tunnel between gateways and using ESP in transport mode between two hosts.

  Which of the given results does proposed solution deliever

TVBCA has just occupied a historic building in downtown Pittsburgh where 15 employees will work. Because of codes for historic buildings.

  Technical recommendation for addressing the security

Describe your technical recommendation for addressing the security requirements in the overall technical design of the ABC Healthcare network. This should include both internal and external (untrusted and trusted) aspects. Untrusted would include ..

  Explain the concepts of information systems security

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the org..

  Write rule sets for two firewalls to permit traffic to flow

Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet. Write down two rule sets for two firewalls which will permit only traffic described to flow.

  Which networking model can the network now support

In Question 11, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support.

  What major risks behind implementing cloud computing program

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd