Study carefully the following network topology it is

Assignment Help Computer Networking
Reference no: EM13380243

Study carefully the following network topology. It is required that the small business Smart Office Services Pty Ltd have its Central office (HQ) and two branch offices (BRANCH1 and BRANCH2) linked via serial leased lines using routers.

You will be assigned a SINGLE IP Address to configure this network. Your lecturer will email you the IP address. You must need to reply with a confirmation e-mail once you have received your allocated IP address.

944_Define network convergence.png

Examine the network requirements and answer the following ten questions. Keep in mind that IP addresses will be needed for each of the LAN interfaces.

Question 1. How many subnets are needed in the topology?

Question 2. Construct a table to list each subnet's information such as router interfaces, available IP Addresses range, broadcast address, subnet mask, and the default gateway. Please show the working. [Note: VLSM must be used in the most efficient way to subnet the given IP address. The highest available IP address of a subnet should be assigned as the default gateway of the subnet. PC4 and PC6 should be assigned the lowest available IP addresses of LAN4 and LAN6 respectively.]

Question 3. What cable type should be selected between two routers? Explain the reason.

Question 4. Usually, the clock rates are assigned by ISPs. From the clock signal viewpoint, what are both ends of a serial link called?

Question 5. Construct the topology in the packet tracer software. Select any one of the routers in the topology, and using appropriate command(s) find out and list the following information about the router: version number of the IOS, sizes of different memories (ROM, RAM, Flash and NVRAM).

Question 6. Using the packet tracer, configure the routers as follows:

  • Name the routers and label them as HQ, BRANCH1 and BRANCH2.
  • Set the secret password as 'class' on all routers.
  • Configure all  router interfaces and PCs.
  • Configure TELNET on the HQ router with a password of 'xyz123' and (a suitable) MOTD.
  • Save the changes on all routers.

Question 7. Select, configure and justify necessary static routes on three routers to make the successful connection between routers.

Question 8. Ping the PC4 from the PC6. Record the information flow in EVENT LIST of simulation and explain the PDU information such as TYPE and involved layers in each stage.

Question 9. Which protocol is used by PING? List the names of two PING messages.

Question 10. Define network convergence. How can you identify your configured network has reached convergence?

Reference no: EM13380243

Questions Cloud

You and your eight-year-old nephew elmo decide to play a : you and your eight-year-old nephew elmo decide to play a simple card game. atthe beginning of the game the cards are
Write a paper discussing threads vs processes what is a : write a paper discussing threads vs processes. what is a thread? what is a process? how are they different? how are
Write two page paper describing xml and json what are they : write two page paper describing xml and json. what are they? why do we need them? are there certain applications that
1 with what kind of network device router or switch do you : 1 with what kind of network device router or switch do you replace device 1 device 2 and device 3? and why? notenbsp
Study carefully the following network topology it is : study carefully the following network topology. it is required that the small business smart office services pty ltd
A rural medical centre in australia plans to improve its : a rural medical centre in australia plans to improve its services to the community by providing telemedicine and
Use wireshark tool to capture packets when you download : use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you
Consider the following udp header dumpbb400045003aff10a : consider the following udp header dumpbb400045003aff10a identify the source port number.b identify the destination port
An organisation has been granted a block of addresses : an organisation has been granted a block of addresses starting with the address 172.154.68.022.a create three subnets

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain authentication and authorization

Explain authentication and authorization. Which depends on the other? How and why are these processes more complex in a modern networked organization.

  Implement tftp using the user datagram protocol

File system module design: This component is responsible for accessing the le systems of the sender and the receiver. The sender and the receiver have to read and write corresponding les, respectively. These operations are part of the actions in t..

  What is occurring and why bob now gets a reply

On June 10, 2013, Bob has no problem connecting to devices on Steve's network (everything appears to be working perfectly). When Bob tries to ping any device on Steve's network he gets "Request timed out". Explain what is going on.

  Pros and cons of long distances agreements

The telephone communication systems and long distances agreements are managed by a telecommunications department in the headquarters that reports to the vice president of finance. Outline pros and cons of both alternatives.

  Develop server-side dynamic webpages

A company is warned by its credit card companies that it will be classified as a high-risk firm unless it immediately reduces the number of fraudulent purchases made by its e-commerce clients. Come up with a plan to avoid this outcome.

  The cto informed you that the board of executives showed

the cto informed you that the board of executives showed great interest in building a new network based on the work you

  Find data transmission rate in bits per second of system

Assume that the airliner carries 10,000 kg of those floppies at the speed of 1000 km/h over the distance of 5000 km. Determine the data transmission rate in bits per second of this system?

  A let deskp denote the des encryption of the plain text p

a let deskp denote the des encryption of the plain text p by the key k.i if we set k to be the key consisting of all

  Encapsulate ftp datagram into tcp datagram

Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload section of an FTP datagram. Encapsulate the FTP datagram into TCP datagram (generation of TCP packets)

  Design a wireless network for your home network

Define the termcomputer-based information systems. In your definition, discuss three types of information systems, the audience or level of management served by each, and how the systems benefit the organization.

  Determine result of scrambling sequence using techniques

Determine the result of scrambling sequence 11100000000000 by using one of the following scrambling techniques? Suppose that last non-zero signal level has been positive.

  Global finance inc gfi is a financial company that manages

global finance inc. gfi is a financial company that manages thousands of accounts across canada the united states and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd