Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Question 1:

The users of USQ College is divided into 4 subnets as shown. The Senior Student subnet has 100 hosts, Junior Student subnet has 50 hosts, Admin subnet has 20 hosts and Teacher subnet has 4 hosts. The network diagram shows only 2 PCs per subnet for simplicity.

USQ College was assigned the network 192.168.0.0/24.

1046_network topology.png

Draw a table such as the one show below and subdivide the network into subnets:

- Use the smallest subnet where possible.
- Routers use G0/0 to connect to the LAN.
- Routers use G0/1 to connect to G0/2 of another router.
- Routers use crossover cables to connect other routers using G interfaces.
- VLAN 1 of all switches should be assigned an address.
- PCs should have IP of G0/0 of the connected router as the gateway.
- The link between each router is also a subnet of its own.

You should start assigning IP to the biggest subnet first, and others in descending order of size. Use "N/A" to indicate a subnet not assigned to any group.

Senior Student subnet has been done for you:

implement the USQ College network.

- Remember to switch off the router before adding modules, and switch on again after adding modules.
- Use copper straight through cables to connect PC and Switch, Switch and router.
- Use copper straight through cables to connect PC and Switch, Switch and router.
- Use serial cable (automatically choose connection type) to join routers.

Question 2:

To demonstrate your computer network ability to your employer, you are asked to set up a simple network of 4 LANs using Packet Tracer. Your boss also hinted that a router interface can handle multiple protocols at the same time.

- LAN1: 192.168.0.0/24
- LAN2: 192.168.1.0/24
- LAN3: 2001:DB8:ACAD::/64
- LAN4: 2001:DB8:FADE::/64
- PC1 is in LAN1 with address 192.168.0.1.
- PC2 is in LAN2 with address 192.168.1.1.
- PC3 is in LAN3 with address 2001:DB8:ACAD::1.
- PC4 is in LAN4 with address 2001:DB8:FADE::1.
- Router G0/0 is in LAN1 with address 192.168.0.254 and in LAN3 with address 2001:DB8:ACAD::2.
- Router G0/1 in in LAN2 with address 192.168.1.254 and LAN4 with address 2001:DB8:FADE::2.
- Switch S1 is used to connect all LAN1 devices.
- Switch S1 is also used to connect all LAN3 devices.
- Switch S2 is used to connect all LAN2 devices.
- Switch S2 is also used to connect all LAN4 devices.

a) Implement the network topology using Packet Tracer and named it as Q2ans.pkt.

b) Can PC1 ping PC2? Why?

c) Can PC1 ping PC3? Why?

Question 3:

Ping server from PC.

Trace the PDU as it travels from PC to server and back. List the source and destination MAC addresses and IP addresses when the PDU enters and leaves a device. The first one has been done for you:

a) How many MAC does the 24 port Cisco switch used in the Packet Tracer has?

b) What is the use of the MAC and IP for VLAN 1 in a Cisco switch?

c) Will the source and destination MAC for the PDU change when the PDU moves along the path? If there is any change, describe the change(s) in less than 50 words.

d) Will the source and destination IP for the PDU change when the PDU moves along the path? If there is any change, describe the change(s) in less than 50 words.

Put your address tables and answers to a), b), c), d) in answer.txt.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91241200
  • Price:- $45

Guranteed 36 Hours Delivery, In Price:- $45

Have any Question?


Related Questions in Computer Network & Security

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

Question snmp initially appeared in 1988 but it did not

Question : SNMP initially appeared in 1988, but it did not receive widespread adoption. What have been the issues with SNMP, and have they been addressed? How widely used is SNMP now? Find some examples of tools that use ...

Short answers1 the discussion question to debate is how

Short Answers: 1. The discussion question to debate is how have companies like Apple, Microsoft and the big providers (ATT, Verizon, Sprint, etc) impacted communication today? 2. Technology wise what do you imagine for t ...

From the product designed expanded as follows1 from your

From the product designed expanded as follows. 1. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As