ITC233 Computer Networks Assignment

Assignment Help Other Engineering
Reference no: EM132518924

ITC233 Computer Networks - Charles Sturt University

Learning outcome 1: be able to explain the critical concepts in Local Area Networks;
Learning outcome 2: be able to describe and design the addressing and naming schemes of data networks;
Learning outcome 3: be able to analyse the communication processes across different levels in the layered architecture;
Learning outcome 4: be able to design, calculate and apply subnetting in IP networks;
Learning outcome 5: be able to perform and analyse tasks related to basic network configuration and testing.

Assessment item - Theory and Simulation Exercises

Question 1:
(a) The OSI protocol stack includes Session and Presentation layers in addition to its Application layer. TCP/IP applications, such as Telnet and FTP, have no such separate layers defined. Do you think that such a separation should be made? Give some advantages and disadvantages of incorporating the OSI approach into TCP/IP.

(b) Show the calculations for finding the estimated percentages of overhead for TCP/IP protocol for IPv4 and IPv6 versions.

(c) Why is the length of a TCP segment limited to 65,536 bytes?

Question 2:

(a) What difference does it make to the network layer if the underlying data link layer provides a connection-oriented service versus a connectionless service?
(b) Suppose transmission channels become virtually error-free. Is the data link layer still needed?
(c) Four levels of addresses are used in the TCP/IP protocol: physical address, logical address, port address, and application-specific address. Discuss the different types of addresses used in the TCP/IP protocol.

Part B:

Here you will be designing and implementing a VLSM addressing scheme. Please submit necessary screenshots in the document to prove your work, and also submit the packet tracer file.

Consider the topology below:

452_figure.jpg

Background / Scenario
Variable Length Subnet Mask (VLSM) was designed to avoid wasting IP addresses. With VLSM, a network is subnetted and then re-subnetted. This process can be repeated multiple times to create subnets of various sizes based on the number of hosts required in each subnet. Effective use of VLSM requires address planning.

Use the 172.XX.YY.0/17 network address to develop an addressing scheme for the network displayed in the topology diagram. In place of XX and YY use the last 4 digits of your student ID. For example, if your student ID is 12345678, the IP address you will be using is 172.56.78.0/17. VLSM is used to meet the IPv4 addressing requirements. After you have designed the VLSM address scheme, you will configure the interfaces on the routers with the appropriate IP address information using the Packet Tracer software.

There are two parts-

PART 1: Design the VLSM Address Scheme

For this part, please follow the following two steps:

Step 1: Calculate the subnet information

Subnet Description

Number of Hosts Needed

Network Address/ CIDR

First Usable Host Address

Broadcast Address

LAN A

 

 

 

 

LAN B

 

 

 

 

LAN C

 

 

 

 

LAN D

 

 

 

 

LAN E

 

 

 

 

LAN F

 

 

 

 

WAN A

 

 

 

 

WAN B

 

 

 

 

WAN C

 

 

 

 

Step 2: Complete the device interface address table.

Assign the first host address in the subnet to the Ethernet interfaces. HQ should be given the first host address on the Serial links to BR1 and BR2. BR1 should be given the first host address for the serial link to BR2.

Device

Interface

IP address

Subnet Mask

Device Interface

HQ Router

 

 

 

 

BR1 Router

 

 

 

 

BR2 Router

 

 

 

 

 

 

 

 

 

PART 2: Create the topology in Packet Tracer and Configure the IPv4 Network

In this part, you will create the topology using the packet tracer software and configure the three routers using the VLSM address scheme that you developed in the previous part.

Step 1: create the topology using the packet tracer software

Step 2: Configure basic settings on each router.
a. Assign the device name to the router.
b. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as though they were hostnames.
c. Assign class as the privileged EXEC encrypted password.
d. Assign cisco as the console password and enable login.
e. Assign cisco as the VTY password and enable login.
f. Encrypt the clear text passwords.
g. Create a banner that will warn anyone accessing the device that unauthorized access is prohibited.

Step 3: Configure the interfaces on each router.
a. Assign an IP address and subnet mask to each interface using the table that you completed in Part 2.
b. Configure an interface description for each interface.
c. Set the clocking rate on all DCE serial interfaces to 128000.
d. Activate the interfaces.

Step 4: Save the configuration on all devices.

Step 5: Test Connectivity.
a. From HQ, ping BR1's S0/0/0 interface address.
b. From HQ, ping BR2's S0/0/1 interface address.
c. From BR1, ping BR2's S0/0/0 interface address.

d. Troubleshoot connectivity issues if pings were not successful.

Attachment:- Computer Networks.rar

Reference no: EM132518924

Questions Cloud

How you would address the cultural and racial disparity : If the criminal justice system continues to fail to address the cultural and racial disparity that permeates every aspect of the system there will be no way to.
Identify the inquiry that guided sustained investigation : Describe how your sustained investigation shows evidence of practice, experimentation, and revision guided by your questions or inquiry
Identify international organization : Identify an international organization. Explain how the organization mitigates the inherent risks in international currency.
Write your response based on the individual rights : One way the government attempts to protect individual rights and maintain social order is through the criminal justice system. This system, just like the.
ITC233 Computer Networks Assignment : ITC233 Computer Networks Assignment Help and Solution, Charles Sturt University - Assessment Writing Service - explain critical concepts in Local Area Networks
Design for manufacturing and design for supply chain : What is the relationship between design for manufacturing (DFM) and design for supply chain (DFSC)?
What might cause neoliberalism to become discredited : What might cause Neoliberalism to become discredited and replaceable? What, in your mind, might replace Neoliberalism as a hegemonic ideology?
What are some of the typical challenges for hrm : What are some of the typical challenges for HRM in international SMEs? How do they differ from challenges for larger multinational corporations?
Discusses workplace ethics in brief : This week discusses workplace ethics. Sadly, this is a concept that we see all too often in the media. Using the company you chose for this week's ethical.

Reviews

Write a Review

Other Engineering Questions & Answers

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  Calculate the gasoline savings

How much gasoline do vehicles with the following fuel efficiencies consume in one year? Calculate the gasoline savings, in gallons per year, created by the following two options. Show all your work, and draw boxes around your answers.

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  Application of mechatronics engineering

Write an essay on Application of Mechatronics Engineering

  Growth chracteristics of the organism

To examine the relationship between fermenter design and operating conditions, oxygen transfer capability and microbial growth.

  Block diagram, system performance and responses

Questions based on Block Diagram, System Performance and Responses.

  Explain the difference in a technical performance measure

good understanding of Mil-Std-499 and Mil-Std-499A

  Electrode impedances

How did this procedure affect the signal observed from the electrode and the electrode impedances?

  Write a report on environmental companies

Write a report on environmental companies

  Scanning electron microscopy

Prepare a schematic diagram below of the major parts of the SEM

  Design a pumping and piping system

creating the pumping and piping system to supply cool water to the condenser

  A repulsive potential energy should be a positive one

Using the data provided on the webvista site in the file marked vdw.txt, try to develop a mathematical equation for the vdW potential we discussed in class, U(x), that best fits the data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd