Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Part A

Question 1:

Produce and supply a screen shot of the local area connection properties of your computer. Based on your local information, please answer the following questions: What is your local machine's default gateway IP address?

What is the purpose of having a default gateway?

What is your subnet mask?

Based on the given subnet mask, what is the maximum number of devices within your same subnet ? (show your workings)

Question 2:
In your local machine CLI window, ping your default gateway and ping www.cisco.com. Once successful, type the command "arp - a" Take a screen shot of the output and explain the first two lines as examples.

What does ARP stand for ? why do we need ARP?

Question 3:

Issue "netstat -r" command in the CLI window, screen shot the IPv4 and IPv6 tables and explain the table content row-by-row.

Question 4:

Peter has bought a Cisco switch of model 2960. He found that he can't access the switch as it was protected by a password. Please advise him with the correct password recovery procedure and commands to clean up the old configuration.

186_Figure.jpg

Part B:

A small business, Smart Office Services Pty Ltd, has its central office (HQ) and two branch offices (Branch 1 and Branch 2) linked via serial leased lines using routers. The network topology is given as follows. It is required that: 1) You will be assigned a single IP to configure this network.

2) You must e-mail your lecturer to request an IP address. Once you have received your allocated IP address you need to reply with a confirmation e-mail. Study the network topology, examine the network requirements, set up the network in Packet Tracer and complete all four sub-questions. Keep in mind that IP addresses will be needed for each of the LAN interfaces.

Question 5:

Follow VLSM scheme to identify the different subnets according to network requirements. Please analyse and design the best IP addressing scheme. Create a table which lists the following information: Router Interfaces/ IP Address (Highest)/ IP Address (Lowest)/ Subnet Mask/ Default Gateway). Please show working out. Note: The lowest IP addresses of each subnet should be given to the PCs. The highest IP addresses of each subnet are given as the default gateway.

Question 6:

Follow previous questions' requirement, set up your network in Packet Tracer simulation software. Configure the three (3) routers: - name the routers and label them as HQ, Branch1 and Branch 2 - set the secret password as ‘class' on all routers - configure interfaces/ PCs - configure TELNET on the HQ router with a password of ‘CISCO' and (a suitable) MOTD - Verify basic configuration and router operations - What are the main components of a Cisco router? - If you need to keep back up of IOS of the routers. Please advise the two methods with correct procedures.

Question 7:
Configure the other PCs and configure the necessary static routes (such as IP route 0.0.0.0 0.0.0.0 exit interface) on three routers to make a successful connection between routers. "Show ip route" check and screen shot each router's routing table.

Question 8:

PING from PC6 in LAN6 to PC4 in LAN4 (checked in Packet Tracer file). What protocol is used by PING? What are the names of two PING messages? Provide screen shots of successful ping

Record the information flow in EVENT LIST of simulation and explain the PDU information such as TYPE and involved layers in each stage

Note: 2 marks are given to the correct referencing.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92283154
  • Price:- $70

Guranteed 36 Hours Delivery, In Price:- $70

Have any Question?


Related Questions in Computer Network & Security

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

Assessment taskstarting from the logical network design

Assessment Task Starting from the logical network design that you completed in Assessment Item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Assignment -global finance inc gfi - global finance inc gfi

Assignment - GLOBAL FINANCE, INC. (GFI) - Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GFI specia ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As