Practice using cisco packet tracer

Assignment Help Computer Networking
Reference no: EM133001957

Active class 7: Who is Instructing What

The learning objective of this class is to learn about routing and routing algorithms.

At the end of this activity, you should be able to:
1. Explain the control plane operation of the Network layer
2. Build a simple network in Cisco Packet Tracer and simulate static routing and dynamic routing.
This class activity is designed to be worked through active participation and collaborating with peers under the guidance of the teaching team in the class. The active classes are designed to be interactive, and they are here for you to extend your learning. However, these classes will only help you to enhance your learning if you come prepared.

Activity 1: Routing
This is a group activity. Therefore, you need to form a group of four (4) or five (5) people. At your table (or in MSTeams chat) discuss the following questions and conduct the role play with your group members. Remember to take notes as they will help you prepare your task submissions and complete other activities.

1. Assume your network has two routers and a separate LAN connects to each router as shown in the following figure.

2487_figure.jpg

2. Now we are ready to do a role play. Two group members are acting as LANs (one member for each LAN). They are responsible for all the PC's connected to their corresponding LAN. Two group members (or one member) are acting as data plane of Router 0 and Router 1. The remaining member is acting as the control plane of both routers.

3. Now assume PC1 wants to send a message to PC3, you need to work together to support the request. Each device needs to list your configurations.

4. Discuss the responsibilities of the control plan of the routers. Tips: How router 0 knows about the LAN 2 and router 1

5. You are going to use these discussions for Activity 2 and 3.

Activity 2: Putting what you have learned into practice using Cisco Packet Tracer.

Now it's time to implement your network in Cisco Packet Tracer. Make sure to take screenshots of the networks you build, analysis, and verifications.
1. Open the packet tracer and implement the following network as a group and make sure to use Activity 1 discussions to configure each device in the network.
a. You need to make sure PC1, PC3 and PC5 can communicate with each other. Tip: You need to add static routing to each router now.
b. Verify that PC1 can communicate with both PC3 and PC5 using PING command and simulations.

199_figure1.jpg

2. Now, add another serial connection between Router 1 and 3 and remove the direct connectivity between router 2 and 3.

2420_figure2.jpg

a. Discuss what changes now you need to make to enable the communication between PC1 and PC5 (Tip: what static routes you need to add).

b. Implement the changes and verify that PC1 and communicate with PC5 using PING command and simulations.

Activity 3: Alternative for Static Routing

In activity 2, you have noticed that you need to make changes in routers every time there is a change in the connection. Discuss the following with the group members.

1. Is there any alternative to stop manually configuring the routing table every time the connectivity changes?

2. What are the latest routing algorithms you can use?

3. Is there any routing algorithm available in Cisco Packet Traces?

4. Implement the same network as shown in the following figure. However, this time make sure to use the routing algorithm available in the routers that you use.

937_figure3.jpg

5. Verify the network connections using PING (in each PC).

6. Use the simulation tool to send a packet from PC1 to PC5. Have you seen any differences compared to the route you have seen in Activity 2? Explain what happened.

7. Now remove the connection between router 1 and 3 and use the simulation tool to send a packet from PC1 to PC5 without changing any configuration.

8. Explain what you observed.

Active class 8: Internet is Full of Network Protocols

The learning objective of this class is to learn the role of Network Address Translation (NAT) protocol, Dynamic Host Configuration Protocol (DHCP) and Internet Control Message Protocol (ICMP) which are (perhaps considered as) significant network layer protocols.
At the end of this activity, you should be able to:

1. Explain the functionalities of the mentioned protocols

2. Build a simple network and analyse the protocols.

Activity 1: Group Discussion.

It is predicted that we will have 50 billion IoT devices in our networks soon. Yes, just IoT devices! If you think about this, most devices need an IP address to communicate with the network. Discuss the following questions with your group members.

1. Do we have enough IP addresses to assign for each device that connect to the network?

2. Do we have any solution?

3. Explain a protocol that we can use along with IPv4 to conserve the global IP address space?

Activity 2: Who does assign an IP address when your computer connects to the network?

This is the role of DHCP. First, we are going to do a small role play to mimic DHCP. Each member of the group has a role to play. Assume your group is your local area network (LAN). For example, you could consider a LAN at home or at Campus or at your workplace.

1. One group member can act as a router with a DHCP server and other three members are host devices that try to connect to the network. These host devices could be a PC, a printer, and network storage device. A sample network is shown in the below figure.

690_figure4.jpg

2. Assume the all the devices are physical connected as shown in the above figure. Now, your job is to set up the network and establish the connections with the router using DHCP. Each member needs to send/ respond with the correct message and message sequence to establish the connections and receive IP address for each host.

3. Draw a timing diagram to indicate the sequence of messages transferred between devices.

4. Next, we are going to implement a DHCP server in Cisco packet tracer and check the DHCP in action. Make use to take screenshots of the networks you build, analysis, and verifications. Open the packet tracer and implement the following network. You may need to use the same model of the devices shown in the diagram. Today, we are not going to use static IP configuration for the hosts as we are going to check the DHCP in action. Tips: You need to add a module with a fast ethernet port to the router, so that the router can support three LANs as shown in the below network diagram.

1286_figure5.jpg

a. Set up the DHCP server by configuring network pools, default gateway, and IP address (use the subnets mentioned in the diagram).
b. Set up the router by configuring the interfaces and DHCP (use the subnets mentioned in the diagram).
c. Set up each host with DHCP to obtain IP configuration and verify the IP address and the default gateway configured.
d. Verify the connectivity between each host in the network.

Activity 3: ICMP
In this activity, we are going to use Cisco Packet tracer's simulation tool to explore ICMP. To do this, you are going to use the network that you have implemented in Activity 2.

1. Use the Simulation mode and send a simple packet from one host (Host A) from LAN1 to another host (Host B) in LAN2. In simulation tool, you can run the simulation step by step. When you go through each step, pay attention to the type of the message passed (highlighted in the below figure).

2. You may notice when Host A ping Host B, we use ICMP protocol. Double click on one entry as shown below to explore the ICMP message,


3. You should be able to view the packet details as follows.

4. Explain what information you can find in "outbound PDU details".

5. Have a closer look at the ICMP message format. Can you identify the type of ICMP message and specific information is in there (type and code)? You can refer to RFC792 for more help. https://datatracker.ietf.org/doc/html/rfc792
6. Can you identify the changes in ICMP message when you use a traceroute from Host A to Host B compared to what you have witnessed in the above question? Note that you can use tracert command in each device (in command prompt) similar to the way that ping command is used.

Above and Beyond Tasks:

Those who are targeting for Credit and above can complete the following task as part of Task 4.1C and 5.2D to demonstrate your deeper understanding on network layer.

1. Analyze DHCP in Wireshark (you may want to disconnect your wireless connection and connect it again whilst capturing the packets). You can show the sequence of DHCP messages and the details of those messages.
2. Why are different inter-AS and intra-AS protocols used in the Internet? What are the examples of these two different types of routing protocols?

Attachment:- Protocols.rar

Reference no: EM133001957

Questions Cloud

Find the value of a call option at the strike price : Consider a European option on a non-dividend-paying stock when the stock price is $30, the exercise price is $29, continuously compounded risk-free interest rat
Determine the arbitrage profit that can be made : An American put on a non-dividend paying stock is currently worth Rs200. The put expires in a month's time and has a strike price of Rs500.
Data and system required to monitor future experience : What are the data and system required to monitor future experience
Which goals contains elements for implementation : Which goals contains elements for implementation and measurement? Save $100 a month to create a $2,400 emergency fund in 2 years.
Practice using cisco packet tracer : Putting what you have learned into practice using Cisco Packet Tracer - Discuss what changes now you need to make to enable the communication between PC1
Prepare appropriate entries for newton labs to record : Prepare appropriate entries for Newton Labs to record the arrangement at its commencement, January 1, 2021, and on March 31, 2021.
How a company could be required to consolidate : Describe how a company could be required to consolidate another company in which it has no or minor voting stock. Why do some private companies follow the law?
How to measure for purposes of financial reporting : Adopt the role of SCL's Chief Financial Officer and discuss the options available for valuation, including how to measure for purposes of financial reporting
Process of design thinking methodology : Identify and define the problem, and stakeholders and solutions and therefore includes the processes used during the analysis and development of proposed

Reviews

len3001957

9/30/2021 3:57:37 AM

Secure networking task The "exercises" and "reflections" given in the first five files need to be done. For the last two files (class7 and class8) these are the active classes. These exercises need to be done according to the questions in the file(class7 and 8). and also provide short reflections for the active classes that are done. In the end, the submission should contain both exercises(and active class exercises included) and reflections(also including the reflections of the active class exercises mentioned above).

Write a Review

Computer Networking Questions & Answers

  Administration and management of internetworking

MN503 - Overview of Internetworking - Network design with configuration - Investigate and resolve appropriate design and solutions for medium sized organisation

  Develop a design solution that meets stated requirements

Develop a design solution that meets stated requirements. You must include a diagram in your presentation to depict your recommended design.

  Human factors in network analysis and design

Human factors in network analysis and design - Advanced Network Design - MN621 - Develop a questionnaire to gather requirements from users, sports complex

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Potential security issues in healthcare networks

Analyse critically, three current or possible future potential security issues in Healthcare Networks - Propose a possible solution for one of the threats

  How does the home agent accomplish this interception

In the text it was stated that when a mobile host is not at home, packets sent to the home LAN are intercepted by its home agent on that LAN.

  Implement the security configuration

Provide an outline of the overall configuration management system that is required to implement the security configuration of the network.

  How does iscsi handle the process of authentication

How does iSCSI handle the process of authentication? Research the available options? Why should an MTU value of at least 2,500 bytes be configured in a bridged iSCSI environment?

  Discuss briefly how you will consider application resilience

Discuss the requirements for remote administration, resource management and SLA management. It may be useful to consider Morad and Dalbhanjan's operational checklists for DSI's OSDS. This section should be no more than two to three pages in length..

  Research the digital millennium copyright act

Research the Digital Millennium Copyright Act. How does this government enacted legislation affect computer security?

  Protect intellectual property that umuc has on the servers

Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.

  Discuss the features of ipam and how it might be useful

Discuss the features of IPAM and how it might be useful in a large organization. Create a 4- to 6-slide PowerPoint presentation on your findings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd