LAB 8 CREATE VLANS USING IPV4 IN PACKET TRACER
.docx
keyboard_arrow_up
School
Oakland University *
*We aren’t endorsed by this school
Course
4130
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
19
Uploaded by kegreve on coursehero.com
LAB 8: CREATE VLANS USING IPV4 IN PACKET TRACER
Objectives
The goal of this lab is to implement multiple VLANs (Virtual Local Area Networks) using
VLSM (Variable Length Subnet Mask) to segment a given network address. After completing
this lab, you will be able to:
Implement VLANs in Cisco Packet Tracer
Materials Required
This lab requires the following:
Computer with Windows 10/8/7 with Cisco Packet Tracer installed
Pencil and paper to perform subnet calculations
Lab Preparation
Verify computer works with no errors
Verify Cisco Packet Tracer is installed and functioning
ESTIMATED COMPLETION TIME: 75 MINUTES
Activity Background
As you learned in Lab 1 for Chapter 8, a well-designed network should work transparently for
the end user, allowing them to connect to various resources on the LAN (local area network).
This lab will implement the small library network that you subnetted in Lab 8.1. Three separate
networks will be created using a Cisco 1841 router, Cisco Catalyst 2960 switch and generic
802.11AC wireless access point. The network needs to be segmented for a staff network, patron
network, and public wireless network using a VLSM (variable length subnet mask). The router
will be configured to serve DHCP (Dynamic Host Control Protocol) addresses to the three
VLANs (virtual local area networks). In this lab, we will use Cisco Packet Tracer (PT) to create
the networks using VLSM, DHCP and VLANs.
Notes
You first installed Packet Tracer in Capstone Project 6-1 in the text. If you don’t have Packet
Tracer installed on your computer, follow the directions in that project to install it before you do
this lab.
Activity
Part 1: Create the Network Scheme
Follow these steps to create a network scheme:
1.
Using the information in Tables 1 and 2, assign static IP addresses to the three router sub-
interfaces for each VLAN and the two printer interfaces listed in Table 3. Keep these
facts in mind as you complete Table 3:
The router sub-interfaces (FastEthernet0/0.xxx, where xxx is the assigned VLAN)
require the first available host address on the network segment.
Both printers use the last available host address on their respective network
segment.
All other devices will use DHCP or do not need an IP address defined for this lab.
Table 1
IP addresses and subnet masks for three VLANs
Network
VLAN
First Available Host
Last Available Host
Subnet Mask
Staff
100
192.168.100.193
192.168.100.254
255.255.255.192
Patron
110
192.168.100.129
192.168.100.190
255.255.255.192
Public Wireless
120
192.168.100.1
192.168.100.126
255.255.255.128
Table 2
DHCP, subnet masks, and default gateways for three VLANs
Network
DHCP Range
Subnet Mask
Default Gateway
Staff
192.168.100.208 -
244
255.255.255.192 192.168.100.193
Patron
192.168.100.139 -
180
255.255.255.192 192.168.100.129
Public Wireless
192.168.100.6 - 121
255.255.255.128 192.168.100.1
Table 3
TCP/IP settings for router and two printers
Device
Interface
IP Address
Subnet Mask
Default Gateway
Router
FastEthernet0/0.100
n/a
FastEthernet0/0.110
n/a
FastEthernet0/0.120
n/a
Staff Printer
FastEthernet0
Patron
Printer
FastEthernet0
You will need the information in Tables 1, 2, and 3 as you work through the rest of the lab.
Activity
Part 2: Build the Network in Packet Tracer
Follow these steps to build the network in Packet Tracer:
1.
Add the following devices. Arrange the devices as shown in Figure 1. Do not worry about
configuring any of the devices yet.
Cisco 1841 Router
Cisco 2960 Switch
Generic AccessPoint-PT-AC
Four Generic PC-PT Desktop Computers
Two Generic Printer-PT Printers
Smart Device SMARTPHONE-PT Smartphone
Wireless Tablet TabletPC-PT Tablet PC
Figure 1:
Arrangement of devices in Packet Tracer
2.
Use Copper Straight-Through cables to connect the devices (except the two wireless
devices) to ports on the switch, as listed in Table 4. Be sure each device is connected to
the correct switch port.
Packet Tracer Device Type
Device Port
Switch Port
Device Name
1841
FastEthernet0/0 FastEthernet0/24
LibraryRTR
2960-24TT
n/a
n/a
LibrarySW
AccessPoint-PT-AC
Port 0
GigabitEthernet 0/1
LibraryAP
PC-PT
FastEthernet0
FastEthernet0/1
Staff01
PC-PT
FastEthernet0
FastEthernet0/2
Staff02
Printer-PT
FastEthernet0
FastEthernet0/22
StaffPrinter
PC-PT
FastEthernet0
FastEthernet0/11
Patron01
PC-PT
FastEthernet0
FastEthernet0/12
Patron02
Printer-PT
FastEthernet0
FastEthernet0/23
PatronPrinter
SMARTPHONE-PT
Wireless
n/a
PublicSmartphone
TabletPC-PT
Wireless
n/a
PublicTabletPC
Table 4
Device ports, interfaces, and names
3.
Change each device name as shown in the Device Name column in Table 4.
4.
You’re now ready to set up the VLAN Database on the router. Click on
the
LibraryRTR
(1841 Router) and click the
Config
tab. In the left pane, click
VLAN
Database.
5.
Create three VLANs, one for Staff, one for Patron and one for PublicWireless:
Enter the following information for the first new VLAN, and then click
Add
:
VLAN Number: 100
VLAN Name:Staff
Enter the following information for the second new VLAN, and then click
Add
:
VLAN Number: 110
VLAN Name:Patron
Enter the following information for the third new VLAN, and then click
Add
:
VLAN Number: 120
VLAN Name:PublicWireless
b.
Confirm that the three new VLANs appear in the middle pane as shown in Figure 2.
Figure 2:
LibraryRTR VLAN configuration in Packet Tracer
c.
Repeat steps 5 and 6 on the LibrarySW (2960-24TT switch) to add three new VLANs to
the VLAN Database on the switch.
d.
You are now ready to assign each interface on the switch to a VLAN. Let’s start with the
Staff01 (PC-PT) workstation. On the LibrarySW Config tab, click the
Interface
FastEthernet 0/1
to select it. In the dropdown menu, select
Access
mode. In the VLAN
dropdown menu, select
100:Staff
(see Figure 3).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
UDP Echo ApplicationA UDP Echo program is a simple network application that demonstrates the basicprinciples of UDP communication. In this program, a server listens for incoming UDPpackets from clients, and when it receives a packet, it echoes (sends back) the samepacket to the client. The client sends a message to the server, and the server returns thesame message. It's often used for testing network connectivity and understanding thefundamentals of UDP communication.
(Answer the following question using python)
Implement both the server and client components of this UDP Echo program whileadhering to the features outlined below. Please ensure that your implementation followsgood coding practices and provides clear prompts and feedback to the user, making ituser-friendly and robust. Please refer to the class example to guide your implementation.
1) UDP Echo Server
Receiving and Displaying Messages: The UDP Echo server should be able toreceive messages sent by clients. For each…
arrow_forward
Task2: In packet switching technology the packet size is an import parameter when it comes
to efficiency and reducing the network latency. Let us assume a network which consists of a
sender host and a receiver host at nh hops faraway from each other's (nh-1 routers R).
s>R>R> ...>S. If we assume that all links have a bit-rate B bps and originally the
message to be send from the sender to the receiver is of size L bits.
1) Give the formula to compute the network latency if we assume circuit switching
(switching time per switch is s seconds).
2) Same as in 1) but we assume packet switching with packet size p bits.
3) From 2) drive the best packet size p which give the best performance (minimum
network latency). Hint. One way to find out the minimum of a function f is to find its
derivative f'(0).
4) Verify your result by providing prove example.
arrow_forward
NAT translation table
LAN side addr
WAN side addr
135.122.200.215
10.0.1.15
10,0.1.13
address 135.122.200.215
S:
10,0,1.27
2
D:
1
D:
S:
S:
D:
S:
10,0.1.15
D:
135.122,200,215
10.०.1.22
arrow_forward
1. Build a Router network which has three Generic
Routers and totally of Six networks in it. From each
Router the required switch shall be connected
through Fast Ethernet port and the switch is
connected to two users. On the whole there are '6'
networks in the configuration.
Along with the network diagram do the packet
transfer in simulation mode and write results
for three different combinations.
arrow_forward
Using packet tracer, implement a network that has the following components: 1- At least five routers
2- At least 7 subnets
3- At least 12 PCs
4- At least 4 switches
5- Use RIP routing protocol
To assign IP addresses of the routers and PCs, use the IP address from your ID as follows Assume your id is 118zyxw, Consider the numbers z, y, x and w as deciemal You have the subnet 118.0.0.0/24 If your ID is 1181234 then the IP is 118.0.0.0/24 Use this subnet to get at least 7 subnets.
arrow_forward
An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most signi cant bits are used as a network ID, and the 16 least signi cant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's.
How many hosts (i.e., host IDs) can there be on a class B network?
arrow_forward
Course name: Networking
Question Type: MCQ
An HTTP client requests a web page with 12 (additional) objects in it.
The client can only figure out that the page contains 12 objects after downloading the first object (i.e., the web page HTML content).
Assume that each packet exchange with the server incurs an RTT of delay and that other processing delays (e.g., parsing the web page) are negligible.
Suppose the client uses 5 persistent connections.
How many RTTs elapse until the page and its objects are fully downloaded?
A: 8
B: 14
C: 4
D: 5
arrow_forward
Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, answer the following question 1-5. The devices in each subnet are connected locally to each other through layer two intermediate devices such as Ethernet switch and ethernet hub. For each device in the subnets, both its Internet Protocol (IP )address and its MAC address (also called the Physical address or the Ethernet address are shown. The subnet mask used by all devices is 255.255.255.240 (which is the same as the prefix length “/28”).
1. If Client #1 wants to send a broadcast packet to all the devices on the left subnet (containing client #1, client #2, client #3) what destination IP address should be used? (Mention in both binary and decimal format.)
2. What is the first and last assignable IP address for the left subnet above (containing client #1 and #3)? (Mention in both binary and decimal format.)
arrow_forward
Consider the following virtual circuit network with three reserved virtual circuits:
уC1: H1, А, С, Е, Н2
VC2: H3, A, F, D, H4
ус3: НЗ, А, F, D, E, H2
Host H4
Host H3
Нost H2
Host H1
Draw the routing table of router D and the routing table of router C.
*you may design a table using the HTML editor or write the content of routing table
record by record (record per line).
arrow_forward
Suppose we have a web page which contains 10 objects including: a html main file, 8 jpg image, and a .mp3
background music. For simplicity, assume each of the 10 objects has a size of 4 Kbits and that each object
can be completely transferred in one TCP packet. Furthermore, assume the round-trip time between the server
and client is RTT= 250 ms, and the download rate is 1 Mbps.
What will be the time it takes to complete transferring the web page running in the non-persistent mode?
Total delay =
ms
arrow_forward
sWin an international IT solutions company, is launching 11 new branches in a new country where they currently have no existing branches. The sWin CIO has asked that each subnet should host at least 2000 devices.
sWin has obtained a network address of 10.11.0.0/17.This address needs to be subnetted further and the CIO has decided that the internal subnet mask will be /21
The company’s subnet plan allows for:
Router Pool: 2 router interfaces for each subnet – the last 2 IP addresses from each subnet.
Managed Network Device Pool: The first 64 IP addresses are reserved for switches and other network devices
Server Pool: The first 64 IP addresses following the Managed Network Device Pool are reserved for servers.
Workstation Static Pool: The first 16 IP addresses following the Server Pool are reserved for Workstations that require static IP addresses.
Workstation DHCP Pool: The remaining IP addresses are reserved for automatic IP configuration.
You have been asked to use subnet 10 for…
arrow_forward
An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most significant bits are used as a network ID, and the 16 least significant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's. How many hosts (i.e., host IDs) can there be on a class B network?
arrow_forward
) For the Internerwork shown in Figure Q4 below, Show the base configuration (do not
include IP Routing) of RouterA assuming it is a DCE device connected to an El camer
Take the IP addresses of the senal interfaces for RoutetA and RouterB to be
192.168.10 21/30 and 192 168.10.22/30 respectively.
RouterA
RouterB
EO 192.168.10.65/26
EO 192.168.10 33/28
arrow_forward
Design a classfull network addressing scheme that will supply the minimum number of
hosts per subnet, and allow enough extra subnets and hosts for 25% growth in all areas.
IP Address 172.16.0.0
FO/0
S/0/1
FO/O
Sales
Administrative
Router A
FO/1
SO/0/0
185 Hosts
30 Hosts
Marketing
50 Hosts
arrow_forward
MC9: In wireless LAN communication, MACA is widely used. In this protocol, in
order to avoid collision, a sender can send
sender is granted the privilege to send a frame to the receiver only after it receives
request signal to a receiver. The
replied from the receiver.
RTS, RTS
CTS, CTS
RTS, CTS
CTS, RTS
arrow_forward
Design a classfull network addressing scheme that will supply the minimum number of
hosts per subnet, and allow enough extra subnets and hosts for 25% growth in all areas.
IP Address 172.16.0.0
FO/O
S//0/1
FO/O
Sales
Administrative
FO/1
185 Hosts
30 Hosts
SO/0/0
Marketing
50 Hosts,
arrow_forward
Computer Science
Networks and should be done in C language.
Create a UDP client and server program that not only is able to locally transfer files but it gives the client the ability to send multiple copies of the file to multiple servers. Once the server program is initiated, it waits until it receives client packets. It then reads and saves the payload of the packets. The client reads a file from the disk and sends it to each server over a UDP socket by breaking the file up into mtu-byte sized packets. Client needs to be concurrent in sending the packets to all of the servers using threads
arrow_forward
In IPV4, consider sending a 4,000 byte datagram (20 bytes of IP header) into a link that has an MTU of
1,500 bytes. The datagram will be allocated to
fragments, and the offset value of the third segment
is
3, 370
3, 185
4, 185
4, 370
arrow_forward
Registration Number: 193046 Consider a network with 3 hosts and a NAT router. Suppose that the network address of the home network is 192.168.NNN/24, where NNN are the last 3 digits of your Reg#. For example, if your Reg# is BSE193046, NNN = 046 and therefore the network address wil be 192168.46/24. (If NNN>255, consider NNN=254) (a) Assign any public IP address to NAT router’s outgoing interface. (b) Assign IP addresses to all 3 hosts and local interface of the NAT router in the home network. (
arrow_forward
Given the following topology of a network, the router Node 3 connects the two subnets
together: Nodes 1 and 2 are 'inside' of the subnet neta, Nodes 4 and 5 are 'outside' of neta
and Node 3 with a firewall is the gateway of neta. The two networks have the prefix 192.168
as the first two octets in their IP addresses, e.g, Node 1 has IP address 192.168.1.11.
eth1: 1.11
eth1: 2.21
1
2
eth1: 1.12
neta
eth 1: 1.1
3
eth2: 2.1
netb
4
5
eth1: 2.22
(i) Suppose in the firewall on Node 3 the default policy is ACCEPT. Write packet
filtering rules for the following goal.
Suppose Node 5 hosts a web server supporting both HTTP and HTTPs. Set rules in Node 3
that prevents Node 2 from browsing any web pages at Node 5.
Now change in Node3 the default policy as DROP and write packet filtering rules for the
following goal.
(ii) Allow all nodes in the subnet neta to browsing HTTP pages hosted at Node 5.
(iii) Allow hosts in netb to SSH into Nodel.
arrow_forward
Computer Networks - Internet Architecture & Application Layer
Please answer the question
Someone suggested to use a local file called hosts.txt on each machine instead of DNS. Discuss the advantages (at least 2) and disadvantages (at least 2) of such suggestion. What is ‘saw-tooth’ behavior in TCP, and what is causing it?
arrow_forward
A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent to. An endpoint is a combination of an IP address and a port number.Discuss about the different types of socket calls using in TCP &UDP.
arrow_forward
Draw a network design that you think will be useful in the future for the industry that you have visited. Network should include the following requirements:
3 routers
4 switches
10 PCs
4 VLANs.
Suitable IP addressing scheme in tabular form (assume as many hosts as necessary for each department).
Indicate where do you use static routing, dynamic routing protocols (name the protocols, RIP, EIGRP, OSPF, etc.), Access Control List (ACL) as per the network preferences. Justify your choices.
arrow_forward
Detailed assessment involves scanning all 65,536 TCP and SCTP ports for each IP address withinscope, along with testing of common UDP ports (to save time). I have yet to find a UDP servicerunning on a nonstandard port during testing, and so running a UDP scan with Nmap’s default serviceslist is sufficient
arrow_forward
Computer Science
Suppose We Are Going To Import A Capture Dump File Via WIRESHARK(Networking Analysis) Version 3.6.0
Show all steps on how to solve the following problems:
A) Explore specific packet number let's suppose number 4 and give its source IP and MAC addresses (Show How To Do It With Steps - ScreenShots)
B) Identify the Application protocols used in the communication (Show How To Do It With Steps - ScreenShots)
C) Filter all TCP traffic and identify the login name and password (Show How To Do It With Steps - ScreenShots)
arrow_forward
Lab-2 Exercise:
Design a bus network which consists of 2 routers. Attach 3 PC's and a Server with router 1
switch. At the end of the configuration, any of the attached users can access the Server
arrow_forward
Metric is used to choose between multiple paths learned via the different
protocols
True
False
is the interface that allow you to include an IP subnet in the
routing protocol without sending updates out of the interface *
O Loopback interface
Passive interface
Physical Interface
Ethernet interface
In Equal Cost Multi Path, If you have one particular host that is talking to a
web server, its traffic for that flow will be divided between routers. *
False
True
arrow_forward
14. In ethernet ring protection the protected link is selected by…
A: lowest cost setting
B: highest priority setting
C: explicitly defining protection link
D: lowest link speed
15. In STP the following parameters are used directly to determine whether the port will end up as forwarding or blocked:
A: port number
B: bridge MAC address
C: cost setting
D: port priority setting
E: link speed
F: A and B
G: B and D
H: B, C and D
○ I: A, C and D
J: none of the above
arrow_forward
In network administration, many admins will use a VLAN (Virtual Local Area Network) to create logical subnetworks. The advantages of this type of a setup is better confinement of broadcast domains, reduced broadcast traffic and more efficient maintenance of the network. The admin can group network nodes that are physically dispersed into similar broadcast domains for improved network traffic management.
Configuration of VLANS on multiple switches can be very time consuming. Python scripts can help automate tasks reducing the need to physically go from switch to switch. Minimal configuration variables may include VLAN name, VLAN number, and Network device.
The main.py template provides a list of 5 network switch names. The script will simulate the configuration of those 5 devices.
Define the VLANSetup class in VLANSetup.py with a constructor to initialize a VLAN's information. The constructor should by default initialize the VLAN's name to "None" and the VLAN number to 0.
Define the…
arrow_forward
Task 3: Implement OSPF on the given topology.
11.0.0.0
Router-PT
Routero
Router-PT
Roureri
10.0.0.0
12.0.0.0
Swie-PT
Switcho
Switch-PT
Switchi
PC-PT
PC2
PC-PT
PC-PT
PC-PT
PC3
PCO
PC1
arrow_forward
Sliding Window Algorithms This question considers a sliding window implementation across a full-duplex point-to-point link. The link has a bandwidth of 327 kbps in each direction and a one-way propagation delay of 100 milliseconds. All packets sent across the link are 1,024 bytes long, including all headers and trailers. What send window size (SWS) is necessary to fully utilize the network?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- UDP Echo ApplicationA UDP Echo program is a simple network application that demonstrates the basicprinciples of UDP communication. In this program, a server listens for incoming UDPpackets from clients, and when it receives a packet, it echoes (sends back) the samepacket to the client. The client sends a message to the server, and the server returns thesame message. It's often used for testing network connectivity and understanding thefundamentals of UDP communication. (Answer the following question using python) Implement both the server and client components of this UDP Echo program whileadhering to the features outlined below. Please ensure that your implementation followsgood coding practices and provides clear prompts and feedback to the user, making ituser-friendly and robust. Please refer to the class example to guide your implementation. 1) UDP Echo Server Receiving and Displaying Messages: The UDP Echo server should be able toreceive messages sent by clients. For each…arrow_forwardTask2: In packet switching technology the packet size is an import parameter when it comes to efficiency and reducing the network latency. Let us assume a network which consists of a sender host and a receiver host at nh hops faraway from each other's (nh-1 routers R). s>R>R> ...>S. If we assume that all links have a bit-rate B bps and originally the message to be send from the sender to the receiver is of size L bits. 1) Give the formula to compute the network latency if we assume circuit switching (switching time per switch is s seconds). 2) Same as in 1) but we assume packet switching with packet size p bits. 3) From 2) drive the best packet size p which give the best performance (minimum network latency). Hint. One way to find out the minimum of a function f is to find its derivative f'(0). 4) Verify your result by providing prove example.arrow_forwardNAT translation table LAN side addr WAN side addr 135.122.200.215 10.0.1.15 10,0.1.13 address 135.122.200.215 S: 10,0,1.27 2 D: 1 D: S: S: D: S: 10,0.1.15 D: 135.122,200,215 10.०.1.22arrow_forward
- 1. Build a Router network which has three Generic Routers and totally of Six networks in it. From each Router the required switch shall be connected through Fast Ethernet port and the switch is connected to two users. On the whole there are '6' networks in the configuration. Along with the network diagram do the packet transfer in simulation mode and write results for three different combinations.arrow_forwardUsing packet tracer, implement a network that has the following components: 1- At least five routers 2- At least 7 subnets 3- At least 12 PCs 4- At least 4 switches 5- Use RIP routing protocol To assign IP addresses of the routers and PCs, use the IP address from your ID as follows Assume your id is 118zyxw, Consider the numbers z, y, x and w as deciemal You have the subnet 118.0.0.0/24 If your ID is 1181234 then the IP is 118.0.0.0/24 Use this subnet to get at least 7 subnets.arrow_forwardAn IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most signi cant bits are used as a network ID, and the 16 least signi cant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's. How many hosts (i.e., host IDs) can there be on a class B network?arrow_forward
- Course name: Networking Question Type: MCQ An HTTP client requests a web page with 12 (additional) objects in it. The client can only figure out that the page contains 12 objects after downloading the first object (i.e., the web page HTML content). Assume that each packet exchange with the server incurs an RTT of delay and that other processing delays (e.g., parsing the web page) are negligible. Suppose the client uses 5 persistent connections. How many RTTs elapse until the page and its objects are fully downloaded? A: 8 B: 14 C: 4 D: 5arrow_forwardRefer to the network figure above, showing two Ethernet Subnets connected through an IP Router, answer the following question 1-5. The devices in each subnet are connected locally to each other through layer two intermediate devices such as Ethernet switch and ethernet hub. For each device in the subnets, both its Internet Protocol (IP )address and its MAC address (also called the Physical address or the Ethernet address are shown. The subnet mask used by all devices is 255.255.255.240 (which is the same as the prefix length “/28”). 1. If Client #1 wants to send a broadcast packet to all the devices on the left subnet (containing client #1, client #2, client #3) what destination IP address should be used? (Mention in both binary and decimal format.) 2. What is the first and last assignable IP address for the left subnet above (containing client #1 and #3)? (Mention in both binary and decimal format.)arrow_forwardConsider the following virtual circuit network with three reserved virtual circuits: уC1: H1, А, С, Е, Н2 VC2: H3, A, F, D, H4 ус3: НЗ, А, F, D, E, H2 Host H4 Host H3 Нost H2 Host H1 Draw the routing table of router D and the routing table of router C. *you may design a table using the HTML editor or write the content of routing table record by record (record per line).arrow_forward
- Suppose we have a web page which contains 10 objects including: a html main file, 8 jpg image, and a .mp3 background music. For simplicity, assume each of the 10 objects has a size of 4 Kbits and that each object can be completely transferred in one TCP packet. Furthermore, assume the round-trip time between the server and client is RTT= 250 ms, and the download rate is 1 Mbps. What will be the time it takes to complete transferring the web page running in the non-persistent mode? Total delay = msarrow_forwardsWin an international IT solutions company, is launching 11 new branches in a new country where they currently have no existing branches. The sWin CIO has asked that each subnet should host at least 2000 devices. sWin has obtained a network address of 10.11.0.0/17.This address needs to be subnetted further and the CIO has decided that the internal subnet mask will be /21 The company’s subnet plan allows for: Router Pool: 2 router interfaces for each subnet – the last 2 IP addresses from each subnet. Managed Network Device Pool: The first 64 IP addresses are reserved for switches and other network devices Server Pool: The first 64 IP addresses following the Managed Network Device Pool are reserved for servers. Workstation Static Pool: The first 16 IP addresses following the Server Pool are reserved for Workstations that require static IP addresses. Workstation DHCP Pool: The remaining IP addresses are reserved for automatic IP configuration. You have been asked to use subnet 10 for…arrow_forwardAn IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most significant bits are used as a network ID, and the 16 least significant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's. How many hosts (i.e., host IDs) can there be on a class B network?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education