What are Public and Private IP ranges

Assignment Help Computer Networking
Reference no: EM132064492

Assessment 1

Question 1. What is the rationale behind IP address scheme, why it is used, why we need subnets and how netmaking solves it?

Question 2. What are Public and Private IP ranges?

Question 3. What are the four main classes in IPV4?

Question 4. Design a head office local area network, you need to segregate your network into three parts:
1. A network for Administrative and Accounts departments (around 25 nodes)
2. A network for IT management (around 200 nodes)
3. A network for rest of the departments (around 120 nodes)

Assessment 2

1. Consider a network with network address 192.168.10.0/24, divide this network into 6 equal size subnets. And find followings
a. Subnet mask
b. Size of a subnet
c. Network addresses of each subnet
d. Broadcast addresses of each subnet
e. First 2 IP addresses of each subnetwork.

2. Answer following questions based on thee values given below
• Number of needed usable hosts in a single sub net - 22
• Network Address - 201.168.75.0

  • I. Address class
  • II. Default mask
  • III. subnet mask
  • IV. Number of bits borrowed
  • V. Total number of subnets
  • VI. Total number of host addresses
  • VII. Number of usable addresses in a single subnet
  • VIII. What is the 5th subnet range?
  • IX. What is the net id of the 5th subnet?
  • X. What is the subnet broadcast address for the 4th subnet?
  • XI. What are the first and last assignable addresses for the 3rd subnet?

3. Based on the information in the graphic shown, design a network addressing scheme that will supply the minimum number of subnets, and allow enough extra subnets and hosts for 100% growth in both areas. Circle each subnet on the graphic and answer the questions below.

IP Address 172.16.0.0

1731_figure.jpg

a. Address class Custom subnet mask
b. Minimum number of subnets needed
c. Extra subnets required for 100% growth
(Round up to the next whole number)
d. Total number of subnets needed
e. Number of host addresses in the largest subnet group
f. Number of addresses needed for 100% growth in the largest subnet
(Round up to the next whole number)
g. Total number of address needed for the largest subnet
h. Start with the first subnet and arrange your sub-networks from the largest group to the smallest.

  • I. IP address range for Research IP address range for Marketing
  • II. IP address range for Management
  • III. IP address range for Router A to Router B serial connection

Assessment 3

You are required to answer these questions individually, based on above activity.

Question 1. What is an enterprise network?

Question 2. What are typical network design business goals? Describe them in your own words.

Question 3. Why it is necessary to find what applications are/will be running in the network? How a network application needs a network throughput?

Question 4. What business constraints can limit or create boundaries on your network design?

Assessment Task. Based on your learnings, you are required to perform a business analysis and create a solution for XYZ pty ltd.

XYZ Pty Ltd. Is a financial solutions and advisory firm based in UK, starting its business in Australia. Their plan is to build a local data centre for their financial applications that they want to promote in Australia, these applications can be used via cloud and hence they can be considered SAAS solution for financial planning. They have requested expression of interest and finalized Equinix as the data centre hosting provider.

They will create a setup of following servers in Equinix Sydney:
1. A web server farm, consisting of 4 web servers.
2. Two application servers
3. A cluster of database servers
You are required to create a network diagram and select network hardware that will support this setup. Equinix demands XYZ to build up their own design, procure the hardware and then set it up.
For all internal infrastructure, Equinix has given XYZ the network of 192.168.10.0/27.
A1. Please verify how many subnets can be created from above network, and allocate them to following design:

634_figure1.jpg


A2. Please show your work here:
A3. Fill following table based on your calculations:
A4. Now allocate IP addresses to all devices and interfaces
B. Chose what network devices will be fit for the design. Chose the vendor, hardware model and justify your selection.
XYZ will also have their head office in Sydney CBD. They plan to have around 25 employees and an internal back office support in a small network room where their local servers for back office will be hosted.

C. Please create the network for the head office.

1. A router that will connect to the internet, as well as the Equinix XYZ setup.
2. A firewall for the head office
3. A network for back office infrastructure:
3.1 A mail server
3.2 A DNS server
3.3 An Active Directory Server
3.4 A SharePoint File share server

4. A network for the 25 desktops or laptops
You need to look after the switching, subnetting and routing. You need to justify if any Public IP addresses are required and why? If you chose to use Private IP addresses, justify them as well.
C1. Please provide a complete network diagram of the head office network.
C2. Please provide a diagram of how head office will connect to the Equinix data centre.
C3. Please fill following table with your network design scheme.

Attachment:- Assessments.rar

Verified Expert

In this project, the answers are delivered for the questions related to IP addressing and subnetting. Then identified about the subnet mask and broadcast address for the given IP range. The business goals and business constraints are specified for the network design. And network design is made by using the Visio. The models and quantity of the devices are specified. The network design is made for the head office. And the network design scheme was specified with the tables.

Reference no: EM132064492

Questions Cloud

Prepare the scope and objectives of risk management process : Prepare the Scope and Objectives of the Risk Management Process section of the Risk Management Plan based on the facts presented in the case study.
Discuss square methodology or square steps : The growth and sophistication of cyber-attacks against organizations, the client and software developers need to agree on security definitions derived.
Advise musela kwak straight to court of appeal : Advise Musela Kwak straight to Court of Appeal. aba of his options under the circumstances. Maximum of 5 pages typed to be handed in on 10 25 marks th May, 2018
Give the journal entry for the payment : Glasgow Company uses the periodic inventory system. Give the journal entry for the payment if the invoice is paid after the discount period
What are Public and Private IP ranges : What is the rationale behind IP address scheme, why it is used, why we need subnets and how netmaking solves it - What are Public and Private IP ranges
How awareness of such factors influences decision of hiring : Using the information presented in "Common Influences on Risk Perception" Figure 6-3 (Hillson and Simon text), determine the conscious factors.
How are authentication and authorization alike : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
What is a good manager : 1. What is a good manager? What does it need to be a good manager? Why? 2. What is a good leader? What does it need to be a good leader? Why?
Analyze the need for waterfall and agile methodologies : Explain waterfall methodologies and identify their relationship to the PMBOK® process groups. Analyze the need for waterfall and agile methodologies.

Reviews

inf2064492

10/8/2018 9:28:20 PM

Your imaginative and creative ideas led my work to be in the top grades. Thank you for this !! The expert did a great job on it.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd