Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Lab - Frame Relay Lab

ANSWERS DOCUMENT

Your Name:

Follow the directions in the Lab #2 assignment document titled "Packet Tracer - Configuring Frame Relay Point-to-Point Subinterfaces" to implement the lab network.

There are 2 places where the instructions are slightly different than the network diagram. In these cases, you must follow the instructions and not the diagram. They are:

  1. Network diagram says "EIGRP", but instructions are to use OSPF.
  2. Network diagram shows subinterface numbers as ".1", ".2" or ".3", but instructions say that the DLCI numbers ".102", ".103", etc, should always be used as the subinterface numbers.

When lab is complete, answer questions below. You can enteryour answers into this document or create a separate one.  When complete, saveanswers file as PDF and submit for your Lab #2assignment on D2L.

All results must show the complete output from the command (that is, it should not say "-More-" at the bottom). 

1. On PC, ping to Laptop.  Paste results here.

2. On PC, tracert to Laptop.  Paste results here.

3. On PC, tracert to 209.165.200.226.  Paste results here.

4. On R1, execute show ipinterfaces brief and paste here.

5. On R1, execute show iproute and paste here.

6. On R2, execute show frame-relay map and paste here.

7. On R2, execute show frame-relay pvc and paste here.

8. On router R3, show running configuration (show run) and paste here.

9. You are done!!

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91779621
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

If 1220 grams of rbcl are dissolved in water to make a

If 12.20 grams of RbCl are dissolved in water to make a solution of0.223 L, the density is found to be 1.040 g/cm 3 . Calculate the molality of the solute.

Stock portfolio gui projectgoalyou are to write a gui

Stock Portfolio GUI Project Goal You are to write a GUI program that will allow a user to buy, sell and view stocks in a stock portfolio. For example, you might track the profit or loss on the trades. You might allow for ...

Question need two different postsresponses with 200 words

Question: Need two different posts(responses) with 200 words each on the below topic. Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:(Wikipedia ar ...

What is a security policy and why is it so critical to the

What is a security policy and why is it so critical to the success of an organization's information security program? Select an Issue Specific Security Policy and describe why an organization should have this issue cover ...

A researcher working at a particular company wants to know

A researcher working at a particular company wants to know if workers' health would improve if they were given extra days 'off. In this company, all workers undergo a standard physical exam twice a year and after each ex ...

Computer sciencewhat is required of an organization to

Computer Science What is required of an organization, to implement and maintain IT Governance? What outside resources are available to assist technology managers in the implementation and maintenance process?

Research 3 risk estimation methodswrite a short explanation

Research 3 risk estimation methods. Write a short explanation of each method to someone with little knowledge of information security or risk. Compare the advantages and disadvantages the three methods above?

Please solve the following question using java format

please solve the following question using java format (*Solution can include*if needed* ( if statement, switch, while ) not arrays*) Write a program which performs the following: a) Prompts the user to enter a number N b ...

Questionsummarize the ways that third-party cookies are

Question Summarize the ways that third-party cookies are created and processed. Even though cookies are not supposed to contain personally identifying data, explain how such data can readily be obtained.

Question cyber attacks on critical infrastructures-a risk

Question: Cyber Attacks On Critical Infrastructures-A Risk To The Nation There has been a great deal of research related to cyber attacks and vulnerabilities and critical infrastructure, but there is an incomplete unders ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As