Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Unit's Learning Outcomes

At the completion of this unit, students should be able to:

1. Describe LAN and WAN network technologies, topologies and implementations;

2. Configure, test and troubleshoot various network devices such as routers and switches;

3. Configure and test different WAN protocols, such as HDLC, PPP, Frame Relay, DHCP, ISDN, NAT and PAT in a network environment;

4. Devise LAN and WAN design and test network implementations;

5. Identify and compare IPv4 and IPv6 in WAN networks;

6. Discuss the requirements of hierarchical network models for campus and other similar applications;

7. Utilise a systematic approach to solve various network problems.

MIT's Graduate Attributes

8. Ability to Communicate

9. Independent and Lifelong Learning

10. Ethics

11. Analytical and Problem Solving

12. Cultural and Global Awareness

13. Team work

14. Specialist knowledge of a field of study

Task 1:

Complete the table below for CIDR Prefixes, available IP addresses and Their Decimal Equivalent.

Note: To obtain full mark, there should not be any mistake in the table. In other words, zero (0) mark will be given unless 100% correct for the entire table from A1 to B10.

Note: Don't forget that you need to consider network address and broadcast address, which should be considered for the available IP addresses.

CIDR Network Prefix

No of Available IP Addresses for hosts

Dotted Decimal Subnet Equivalent

/19

A1

B1

/20

A2

B2

/21

A3

B3

/22

A4

B4

/23

A5

B5

/24

A6

B6

/25

A7

B7

/26

A8

B8

/27

A9

B9

/28

A10

B10

Using Private IPv4 Addresses

The IANA has reserved three blocks of IPv4 addresses for companies to use on their private networks. These addresses are defined in RFC 1918, Address Allocation for Private Internets. You can use these private addresses, also known as 1918 addresses, for systems on local networks within a corporate intranet. However, private addresses are not valid on the Internet. Do not use them on systems that must communicate outside the local network.

The following table lists the private IPv4 address ranges and their corresponding netmasks.

How IP Addresses Apply to Network Interfaces

To connect to the network, a system must have at least one physical network interface. Each network interface must have its own unique IP address. During installation, you must supply the IP address for the first interface that the installation program finds. Usually that interface has the name device-name, and this interface is considered the primary network interface.

Task 2:

Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table.

Hints: Consider how many network bits are required to accommodate (accumulate) ALL of the network masks in the table. It may be easier to use Excel to allocate each block to calculate the mother (?) network masks, which can be sub-divided into many subnets.

Domain

Network Mask

Network Address

Host from

Host to

No of IP Address

Broadcast Address

Network A

/21

A1

B1

C1

D1

E1

Network B

/21

A2

B2

C2

D2

E2

Network C

/19

A3

B3

C3

D3

E3

Network D

/24

A4

B4

C4

D4

E4

Network E

/25

A5

B5

C5

D5

E5

Network F

/24

A6

B6

C6

D6

E6

Network G

/24

A7

B7

C7

D7

E7

Network H

/21

A8

B8

C8

D8

E8

Network I

/24

A9

B9

C9

D9

E9

Network J

/24

A10

B10

C10

D10

E10

Network K

/24

A11

B11

C11

D11

E11

Network L

/20

A12

B12

C12

D12

E12

Network M

/20

A13

B13

C13

D13

E13

Network N

/12

A14

B14

C14

D14

E14

Network O

/13

A15

B15

C15

D15

E15

Task 3:

You are requested to design IP addressing for 10 x subnets for the following requirements: To accommodate X hosts for each subnet
,where X = 2, 7, 17, 32, 66, 1024, 2047, 4900, 10,000 and 500,000.

1. Use the table in task 2 (if required) or use your own template, e.g. Excel spreadsheet, to work out and provide below for each subnet

(1) Network mask
(2) Network Address
(3) Host from
(4) Host To
(5) No of Available IP addresses (usable) and
(6) Broadcast Address

2. Show formulas to work out the number of bits allocated for (a) Network and (b) Hosts for the last subnet, i.e. subnet hosting 500,000 hosts.

3. To design and accommodate the above 10 subnets, what network and network mask do you use to maximize reserved IP ranges? List all of the reserved IP address ranges after 10 subnets have been allocated for future use. [3 mark]

Notes:

- No need to consider future expansion for hosts.
- Use Class A IP address range and CIDR to design
- Try to save as many IP ranges as possible for future use.

Part 2: Problem Based Learning (PBL)

Read the below and learn how they designed and built their network to resolve the problems.

Building Express Backbone: Facebook's new long-haul network

Facebook has multiple data centers in the U.S and Europe. For the past ten years, they were connected by a single wide-area (WAN) backbone network known as the classic backbone or CBB. This network carried both user (egress) traffic and internal server-to-server traffic.

In recent years, bandwidth demand for cross-data center replication of rich content like photos and video has been increasing rapidly, challenging the efficiency and speed of evolution of the classic backbone.

Furthermore, machine-to-machine traffic often occurs in large bursts that may interfere with and impact the regular user traffic, affecting our reliability goals. As new data centers were being built, we realized the need to split the cross-data center vs Internet-facing traffic into different networks and optimize them individually. In a less than a year, we built the first version of our new cross-data center backbone network, called the Express Backbone (EBB), and we've been growing it ever since.

Tasks 4:

Provide answers to all the questions.

1. What are the problems motivating the project?

2. There are several protocols mentioned in the article. What are they? List ALL of them. Briefly describe the protocols found above. At least 4 protocols (100 - 200 words each).

3. When they began the network design, they had objectives to overcome constraints. What did they do to achieve the goals? Write two of them.

4. What are the benefits of their approach after the project has been completed?

5. What are the challenges they faced after the project?

6. What are the 3 major steps they followed in network design to achieve the goals?

7. What are the benefits of a hybrid model for software design?

8. What is LSP? How are LSPs created in MPLS? (500 - 800 words)

9. Describe ‘Data Centre' including definition, purpose, trend, related issues etc. (500 - 800 words)

10. Summarise traffic engineering, what is it? How does it work? Why is it required? e.g. RSVP- TE (500 - 800 words)

Attachment:- Assessment Template.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92324742
  • Price:- $35

Guranteed 24 Hours Delivery, In Price:- $35

Have any Question?


Related Questions in Computer Network & Security

Income effects depend on the income elasticity of demand

Income effects depend on the income elasticity of demand for each good that you buy. If one of the goods you buy has a negative income elasticity, that is, it is an inferior good, what must be true of the income elastici ...

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

Final project incident response exercise amp reportyour

Final Project: Incident Response Exercise & Report Your Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident desc ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Autonomous consumptionnbsp 660marginal propensity to

Autonomous consumption  = 660 Marginal propensity to consume  = 0.8 Autonomous taxation  = 200 Income tax rate =  0.2 Planned investment  = 500 Government spending  = 500 Autonomous net exports  = 300 NX  = 0.04 Calculat ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As