Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Refering to figure below: You are the network administrator for the network depicted in the diagram. You have been assigned the address space 10.1.16.0/21 to create the LANs you need, and the 172.16.1.0/28 space for your WAN links.

LAN: 10.1.16.0/21
WAN: 172.16.1.0/28

453_Network.png

LAN Subnets

Begin by creating and assigning the LAN subnets you will use. In order to make the most efficient use of your address space you should start by creating the subnet needed for the LAN with the most hosts and then work you down to the smallest LAN.

Using the address space 10.1.16.0/21, create subnets for the LANs shown in the diagram and fill in the table 1 below. Notice that the first 7 subnets are all basically the same size and all subnets are all factors of 2 (remember 2n-2 where n is the number of host bits tells you the subnet size). Also remember for the most efficient addressing you should use the smallest size subnet that provides you the needed number of hosts.

TABLE 1: (Questions 1-8)

Question

LAN

Subnet Address

Subnet Mask

1.

R1 LAN S3

 

 

2.

R1 LAN S4

 

 

3.

R2 LAN S5

 

 

4.

R2 LAN S6

 

 

5.

R3 LAN S7

 

 

6.

R3 LAN S8

 

 

7.

HQ LAN S1

 

 

8.

HQ LAN S2

 

 

WAN Subnets

For the WAN links, you have been assigned the 172.16.1.0/28 address space. Fill in the subnets in Table 2 below by subnetting the assigned WAN space.

TABLE 2: (Questions 9-11)

Question

WAN

Subnet Address

Subnet Mask

  9.

HQ-R1

 

 

10.

HQ-R2

 

 

11.

HQ-R3

 

 

Assign addresses

Use Table 3 below to document the IP addresses for the indicated interfaces following the guidelines below:

1. Assign the first IP address for all LANs to the router interface.

2. Assign HQ the first IP address for all WAN links to Branch routers.

Table 3: (Questions 13-27)

 

Device

Interface

Address

Mask

13

HQ Router

Fa0/0

 

 

14

 

Fa0/1

 

 

15

 

S0/0/0

 

 

16

 

S0/1/0

 

 

17

 

S0/0/1

 

 

18

R1 Router

Fa0/0

 

 

19

 

Fa0/1

 

 

20

Bonus

n/a

n/a

n/a

21

 

S0/0/0

 

 

22

R2 Router

Fa0/0

 

 

23

 

Fa0/1

 

 

24

 

S0/0/0

 

 

25

R3 Router

Fa0/0

 

 

26

 

Fa0/1

 

 

27

 

S0/0/0

 

 

EIGRP Metric Calculation

 

List the values used in the EIGRP composite metric to calculate the preferred path (4):

28

 

29

 

30

 

31

 

Routing concepts- Questions

32. What is the default formula for the EIGRP composite metric?

33. What command can be used to view the current K value being used by EIGRP?

34. What command can be used to see the actual values of the EIGRP metric?

35. The _____________ metric is displayed in Kbps?

36. The default value used by most serial interfaces is based on T1 connections and is______________bps?

37. The measure of the probability a link will fail based on its history (downtime, errors) is referred to as ____________ and is measured with a value between 0 and 255.

38. ____________represents the amount of traffic using the link with a value between 0 and 255.

39. What is the main difference between a parent route and an ultimate route?

40. What is the relationship between parent and child routes?

41. Provide a brief description of a level 1 route:

42. What are the types of level one routes?

DUAL Concepts


List at least 3 advantages that DUAL offers:

43

 

44

 

45

 


Dual Concept

Definition

46

Successor

 

 

47

Feasible distance (FD)

 

 

48

Feasible successor

 

 

49

Feasibility condition (FC)

 

 

50

Reported Distance

 

 

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91525166
  • Price:- $120

Priced at Now at $120, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Consider the following series of paymentsyear 0 20year 1

Consider the following series of payments: Year 0: 20 Year 1: 30 Year 2: 40 Year 3: 10 Year 4: 5 Using an interest rate of 10%: a. What is the present value of this series of payments? b. What is the future value of this ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Question 1 for rsa encryption we need a modulus that is the

Question : 1. For RSA encryption we need a modulus that is the product of two prime numbers, p and q. Assume p = 11 and q = 13, and thus n = p*q = 143. In this case, the RSA encryption exponent e must be relatively prime ...

Short answers1 the discussion question to debate is how

Short Answers: 1. The discussion question to debate is how have companies like Apple, Microsoft and the big providers (ATT, Verizon, Sprint, etc) impacted communication today? 2. Technology wise what do you imagine for t ...

Assume that the number of customers who arrive at a water

Assume that the number of customers who arrive at a water ice stand follows the Poisson distribution with an average rate of 6.4 per 30 minutes. What is the probability that more than one customer will arrive during the ...

From the product designed expanded as follows1 from your

From the product designed expanded as follows. 1. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

Suppose alice wants to communicate with bob using symmetric

Suppose Alice wants to communicate with Bob using symmetric key cryptography with a session key KS. They have no public key cryptography and they intend to use a key distribution center (KDC). The KDC is a server that sh ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As