PCs on subnet A PCs on subnet B Subnet A R1 Subnet B Fa0/0 Fa0/1 SO/0...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
PCs on subnet A PCs on subnet B Subnet A R1 Subnet B Fa0/0 Fa0/1 SO/0 SO/0 Fa0/1 Fa0/0 Figure 1. Topology diagram. Subnet D An address range for you to use. A subnet mask length to use for ALL the five subnets. R2 Subnet C Figure 1 shows a network topology with five IP subnets. Notice that Subnet E covers the WAN between R1 and R2. By referring to your unique set of assignment parameters in 'Individual Parameters.xlsx' you will find you have been allocated: The number of PCs on subnets A, B and C. Eagle server DNS server Your task is to assign IP addresses to the devices in the network. You will fill in Table 1 and Table 2 with appropriate information bearing in mind your unique set of assignment parameters and the following facts: In addition to the PCs, each router interface needs a "host" IP address and it is part of the subnet. PCs on subnet C Only the DNS server and Eagle server are on Subnet D. Switches are not allocated IP addresses in this network. PCs and servers are to be allocated the lowest IP addresses in each subnet. Router interfaces are to be allocated the highest IP addresses in each subnet. The subnets are to be allocated in the order A, B, C, D and E, (i.e. A is the lowest address and E is the highest). In Table 2, it is only necessary to indicate the first and last address of the PCs in each subnet using the lowest block of addresses. Subnet Network address ABCDE Device R1 R2 1st PC subnet A Last PC subnet A 1st PC subnet B Last PC subnet B 1st PC subnet C Last PC subnet C 1st PC subnet D Last PC subnet D DNS server Eagle server Interface Fa0/0 Fa0/1 SO/0 Fa0/0 Fa0/1 SO/0 NIC NIC NIC NIC NIC NIC NIC NIC NIC NIC Mask in dotted decimal form (e.g. 255.255.0.0) Number of hosts, including PCs and router interfaces Table 1. Subnet details. IP address Mask in dotted decimal form (e.g. 255.255.0.0 for /16) Table 2. Addressing table. Number of unused addresses Default Gateway 2. Analysis of address space usage You will submit an explanation encompassing: A statement on how many further subnets are available using the address range and mask that you have been allocated. N/A N/A N/A N/A N/A N/A A comment on how efficiently the address space you have been allocated has been used. Calculate the two ratios of: O used addresses to total number of usable addresses, and O unused addresses to total number of usable addresses A brief description of how the address space you have been allocated could be utilised more efficiently to leave a maximum number of addresses free for future subnets. You should not state any actual addresses but rather provide a general description of the process used. A comment on the trade-off between efficient utilisation of the address space and the prospects of future expansion within a subnet A comment on how you would address this trade-off if you had complete freedom in allocating the address range. 3. Application layer services In the 'Individual Parameters.xlsx' file you have been allocated two application layer services. The first of the above is described in the Cisco ITN courseware, to find out about the second you will have to look elsewhere. In most cases the name is given as an abbreviation. For each one, provide: The full title of the protocol if it is given in abbreviated form (e.g. HTTP is hypertext transfer protocol) A brief description of the purpose of the application The transport layer protocol (or protocols) usually used to transport the application protocol The normal (well known) transport layer port(s) that the protocol uses (some may use more than one) A brief description of how the protocol works, for example the key messages sent by the protocol. You are free to include visual illustrations such as (but not limited to) message sequence diagrams. A selection of references to either: a book, published article, or standards document that describes the protocol. Each reference should be included (i.e. cited) at a suitable point in your description of the protocol. A web reference (except to a standards document) is unacceptable. For example, HTTP is defined in RFC 2626 [1], described in a journal paper by Janssen [2] and also described by Tanenbaum [3]. Note how a recognised reference standard, the IEEE, is used below in Section 4 as an example to a standards document, a scholarly article and finally a well-known textbook. PCs on subnet A PCs on subnet B Subnet A R1 Subnet B Fa0/0 Fa0/1 SO/0 SO/0 Fa0/1 Fa0/0 Figure 1. Topology diagram. Subnet D An address range for you to use. A subnet mask length to use for ALL the five subnets. R2 Subnet C Figure 1 shows a network topology with five IP subnets. Notice that Subnet E covers the WAN between R1 and R2. By referring to your unique set of assignment parameters in 'Individual Parameters.xlsx' you will find you have been allocated: The number of PCs on subnets A, B and C. Eagle server DNS server Your task is to assign IP addresses to the devices in the network. You will fill in Table 1 and Table 2 with appropriate information bearing in mind your unique set of assignment parameters and the following facts: In addition to the PCs, each router interface needs a "host" IP address and it is part of the subnet. PCs on subnet C Only the DNS server and Eagle server are on Subnet D. Switches are not allocated IP addresses in this network. PCs and servers are to be allocated the lowest IP addresses in each subnet. Router interfaces are to be allocated the highest IP addresses in each subnet. The subnets are to be allocated in the order A, B, C, D and E, (i.e. A is the lowest address and E is the highest). In Table 2, it is only necessary to indicate the first and last address of the PCs in each subnet using the lowest block of addresses. Subnet Network address ABCDE Device R1 R2 1st PC subnet A Last PC subnet A 1st PC subnet B Last PC subnet B 1st PC subnet C Last PC subnet C 1st PC subnet D Last PC subnet D DNS server Eagle server Interface Fa0/0 Fa0/1 SO/0 Fa0/0 Fa0/1 SO/0 NIC NIC NIC NIC NIC NIC NIC NIC NIC NIC Mask in dotted decimal form (e.g. 255.255.0.0) Number of hosts, including PCs and router interfaces Table 1. Subnet details. IP address Mask in dotted decimal form (e.g. 255.255.0.0 for /16) Table 2. Addressing table. Number of unused addresses Default Gateway 2. Analysis of address space usage You will submit an explanation encompassing: A statement on how many further subnets are available using the address range and mask that you have been allocated. N/A N/A N/A N/A N/A N/A A comment on how efficiently the address space you have been allocated has been used. Calculate the two ratios of: O used addresses to total number of usable addresses, and O unused addresses to total number of usable addresses A brief description of how the address space you have been allocated could be utilised more efficiently to leave a maximum number of addresses free for future subnets. You should not state any actual addresses but rather provide a general description of the process used. A comment on the trade-off between efficient utilisation of the address space and the prospects of future expansion within a subnet A comment on how you would address this trade-off if you had complete freedom in allocating the address range. 3. Application layer services In the 'Individual Parameters.xlsx' file you have been allocated two application layer services. The first of the above is described in the Cisco ITN courseware, to find out about the second you will have to look elsewhere. In most cases the name is given as an abbreviation. For each one, provide: The full title of the protocol if it is given in abbreviated form (e.g. HTTP is hypertext transfer protocol) A brief description of the purpose of the application The transport layer protocol (or protocols) usually used to transport the application protocol The normal (well known) transport layer port(s) that the protocol uses (some may use more than one) A brief description of how the protocol works, for example the key messages sent by the protocol. You are free to include visual illustrations such as (but not limited to) message sequence diagrams. A selection of references to either: a book, published article, or standards document that describes the protocol. Each reference should be included (i.e. cited) at a suitable point in your description of the protocol. A web reference (except to a standards document) is unacceptable. For example, HTTP is defined in RFC 2626 [1], described in a journal paper by Janssen [2] and also described by Tanenbaum [3]. Note how a recognised reference standard, the IEEE, is used below in Section 4 as an example to a standards document, a scholarly article and finally a well-known textbook.
Expert Answer:
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these computer network questions
-
Note: All ML code must be explained clearly (INJAVAXX)and should be free of needless complexity. 2 CST.2016.1.3 2 Foundations of Computer Science Please help. (2c) (a) A prime number sieve is an...
-
Let r and s be solutions to the quadratic equation x 2 b x + c = 0. For n N, define d0 = 0 d1 = r s dn = b dn1 c dn2 (n 2) Prove that dn = r n s n for all n N. [4 marks] (b) Recall that a commutative...
-
Three charges are arranged as shown in the figure. Find the (a) magnitude and (b) direction (angle with the x axis) of the electrostatic force on the 6.00- nC charge. In the figure, q= 3.64 nC. 0.500...
-
What is involved in establishing the cap rate?
-
Absolute Corporation currently has $50 million in liabilities and common equity in combination. The firm has no preferred stock. After careful evaluation, the CFO constructed the following table to...
-
Find a detailed report on some recent statistical study of interest to you. Write a short report applying each of the eight guidelines given in this section. (Some of the guidelines may not apply to...
-
A social psychologist wishes to test the assertion that our attitude toward other people tends to reflect our perception of their attitude toward us. A randomly selected member of each of 12 couples...
-
Do you think AUD will be appreciating or depreciating GBP in the next 3-6 months and if so why?
-
Not all potentially good employees have a bubbly, goofy personality of the type that Zappos likes to attract. Would it be wise for the company to reject a candidate solely on the basis of a shy,...
-
what communication channels are currently been used to reach the target persona. provide examples of communication techniques applied. Identify untapped avenues that may be worth considering as well...
-
Comparative balance sheets for 2018 and 2017 and a statement of income for 2018 are given below for Metagrobolize Industries. Additional information from the accounting records of Metagrobolize also...
-
11) find the point of diminishing returns of the function 2x^3 - 1.5x^2 +3x
-
Describe how the report would help in your job or personal life . list a report or activity you learned about in managerial accounting which would be useful if implemented in either a) a current or...
-
Your long-lost Great Aunt died recently with no children. You receive a call informing you that you will inherit $100,000. Your mother would also like to gift you an additional $50,000 out of her...
-
Define electronic record and image record and describe the relationship between the two records media?
-
.5 The following is the statement of financial position of WW Associates as at 31 December 2014: Statement of financial position as at 31 December 2014 3. ASSETS Non-current assets Machinery 25,300...
-
Sue Deliveau opened a software consulting firm that immediately paid $2,000 for a computer. Was this event a transaction for the business?
-
Jason and Mary Wells, friends of yours, were married on December 30, 2012. They know you are studying taxes and have come to you with a question concerning their filing status. Jason and Mary would...
-
Calculate the amount of the child and dependent care credit allowed for 2012 in each of the following cases, assuming the taxpayers had no income other than the stated amounts. a. William and Carla...
-
Indicate whether each of the items listed below would be included (I) in or excluded (E) from gross income for the 2012 tax year. ________a. Welfare payments ________b. Commissions ________c. Hobby...
-
Let \(\left(B_{t} ight)_{t \geqslant 0}\) be a \(\mathrm{BM}^{1}\) and \(b(x), \sigma(x)\) autonomous and globally Lipschitz continuous coefficients. We have seen in Corollary 21.24 that the solution...
-
The linear growth of the coefficients is essential for Corollary 21.31. a) Consider the case where \(d=n=1, b(x)=-e^{x}\) and \(\sigma(x)=0\). Find the solution of this deterministic ODE and compare...
-
Let \((A, \mathfrak{D}(A))\) be the generator of a diffusion process in the sense of Definition 23.1 and denote by \(a, b\) the diffusion and drift coefficients. Show that \(a \in...
Study smarter with the SolutionInn App