Free Essay

Fundamentals of Network Elements

In:

Submitted By ramyamenon3
Words 1354
Pages 6
SECTION 1: GENERAL QUESTIONS (Q1-Q4)
Q1: How many LANs and WANs are forming the enterprise network?
LANs: __________ WANs: _____________
Q2: How many subnetworks do you see? Answer: __________ subnetworks
List the subnetworks:
Q3: When PC1 communicates with Server 1, how many data links a message has to go through?
Answer: __________ data links
When PC1 communicates with Server 1, how many physical links a message has to go through?
Answer: __________ physical links
When PC1 communicates with Server 3, how many data links a message has to go through?
Answer: __________ data links
When PC7 communicates with Server 2, how many different routes a message can take?
Answer: __________ routes
Q4: What physical topology is used to interconnect the four routers? ____________________
SECTION 2: NOW, CREATE ALL NETWORK NODES (PCS, SERVERS, ROUTERS, AND SWITCHES) ON PACKET TRACER. NO CABLING YET.
CHANGE ALL LABELS OF NETWORK NODES AS IN THE FIGURE.
Questions (Q5-Q12) based on the R2 (1841 Router) in “out-of-the-box condition”.
Q5: How may Ethernet ports does the 1841 router have initially? Answer: __________
Q6: What are the port (interface) names assigned to the Ethernet ports?
Answer:
Q7: What are MAC addresses of Ethernet ports (or LAN ports)? Do not worry about VLAN1 now.
Q8: How may WAN ports (also called Serial ports) does the router have? Answer: _________
Q9: Do LAN/WAN ports have an IP address? Answer: _________
Q10: Are LAN/WAN ports currently up or down? Answer: _________
Q11: How many empty slots are available on the router to allow additional installation of LAN/WAN cards?
Answer: __________
Q12: What is the name of module (or network card) whose installation allows addition of an Ethernet LAN port to the router?
Answer: __________
Questions (Q13-Q20) based on the SW6 (2950-24 Switch) in “out-of-the-box condition”
Q13: How many Ethernet switch ports does it come with? Answer: __________
Q14: What are the names assigned to the Ethernet ports? (List the first three)
Answer:
Q15: How many MAC addresses are assigned to each switch port? Answer: __________
Q16: Are Ethernet switch ports (LAN ports) currently up or down? Answer: __________
Q17: Are there empty slots available to allow additional installation of LAN cards?
Answer: __________
Q18: All switch ports are initially assigned to one so called VLAN (or virtual LAN) when the switch is in the out-of-the-box condition. What is the VLAN ID assigned to all switch ports?
Answer: __________
Q19: What are MAC addresses of the first three switch ports?
Answer:
Q20: Manually translate the three MAC addresses in Q19 into 48-bit binary.
SECTION 3: START NETWORK CABLING BASED ON INSTRUCTIONS BELOW:
Complete the cabling between nodes as in Figure 1. If there are no serial ports necessary for WAN connections on the router, WAN cards (WICs) have to be installed. The network administrator decided to use the WIC-2T WAN card among many choices.
 Install the WIC-2T WAN network cards to all available router slots.
 Use following cabling to interconnect nodes.
LAN cabling: Use either copper straight-through or copper cross-over cabling.
Straight through cabling is used to connect different devices (ex. PC –switch, switch – router). Connecting similar devices (ex. switch – switch) needs cross-over cabling. Do NOT use the automatically choose connection type option. LAN links are shown in black.
WAN cabling: Serial lines should be used for the WAN connection. Choose the Serial DCE cable option that supports clocking (One end of the WAN connection needs to have clocking to regulate transmission speed). WAN links are shown in red.
 Note: When wrong ports are chosen for cabling, there will be an error message “This cable cannot be connected to the port”. When cabling is correctly done, you should see two small dots in red on both ends of the cable. If you see the dot only on one end of the connection, the cabling is incorrect. The red dots between computers and switches change to green automatically after a while indicating readiness for message exchange. Meanwhile, you will find that any cabling that involves a router port will remain in red. This means that, although the physical connection has been completed, additional router configuration is necessary in order to exchange messages via the router port.
Completing the network cabling, therefore, does not mean that end devices (PC stations and servers) can communicate because routers have not been configured. Switches do not need additional configuration to enable the switch port function. Once cabling is complete, answer following questions:
Questions (Q21-Q31) based on Router R1:
Q21: List all names (identifiers) of LAN and WAN ports (again no worry on VLAN):
Ports
List
LAN (Ethernet)
WAN (Serial)
Q22: How many LAN ports (interfaces) are physically connected? Answer: __________
Q23: What is the name of the LAN port being connected?
Answer:
Q24: What is the speed of R1’s LAN port? Answer: __________
Q25: What is the MAC address of R1’s LAN port in use? Answer: ______________________
Q26: How many WAN ports (interfaces) are physically connected? Answer: __________
Q27: List the name of the WAN ports being connected.
Ports
Names
WAN (Serial)
Q28: Do we know the speed of the WAN ports? Yes [ ], No[ ]
Q29: Does the WAN port have a unique MAC address? Yes [ ], No[ ]
Q30: Is any of the LAN and WAN ports active? Yes [ ], No[ ]
If not, explain the reason:
Answer:
Q31: Create a console connection from PC1 to R1 for router configuration. What is the PC1 port used to connect to the R1’s console port? Make sure to choose the console cable, not LAN cable.
Answer: ______________
Once console connection is made, click on R1 and zoom in the ‘physical device view’ and observe the shape of the console port. The console port resembles (literally identical) the:
LAN port [ ] or Serial port [ ]
Questions (Q32-Q40) based on Switch SW2:
Q32: List the names (identifiers) of the LAN ports being connected.
Answer:
.
Q33: What are MAC addresses of ports being connected? Fill out the table.
Ports
MAC addresses
Q34: Manually convert all connected MAC addresses into 48bit binary combination.
MAC addresses Binary combinations
Q35: Among the connected ports, which ports are in the ‘up’ state? List them.
Answer:
Q36: Among the connected ports, which port is in the ‘down’ state?
Why do you think that particular port is down when others are up? Explain.
Answer:
Q37: How many ports are still unused and therefore available for additional connection? (Again do not count
VLAN) Answer: _____________
SECTION 4: CONFIGURATION OF ROUTER PORTS AND THEIR ACTIVATION.
 Assume that the Headquarter network IP is 192.168.0.x. Then, configure PC1 with an IP address of
192.168.0.1 and subnet mask of 255.255.255.0. Also, configure Server1 with an IP address of 192.168.0.2 and subnet mask of 255.255.255.0. With the configuration, both PC1 and Server1 belong to the same subnetwork.  Click on R1 and then Config tab (see Figure 2 for sample screen). Then, among the interfaces (ports) on the side bar (within the red square), click on the port that connects Switch 2 (therefore, connects the
Headquarter network). Then, activate the port by clicking the ‘Port Status’ and entering the IP address of
192.168.0.250. Leave the choice of ‘Bandwidth’ and ‘Duplex’ to the default (auto) value. Then, wait for a moment until the port changes to green on the network.
Figure 2. Router port configuration window
Q38: Open the Command Prompt (for Command Line Interface) on PC1. At the prompt, issue ‘ping 192.168.0.2’. Answer following questions
 Was pinging successful? Yes [ ], No[ ]
 How many ping responses are received? Answer: _____________
 If pinging was not successful, troubleshoot the problem.
 Briefly explain the meaning of successful pinging?
Answer:
Q39: At the Command Prompt of PC1, issue ‘ping 192.168.0.250’.
 Was pinging successful? Yes [ ], No[ ]
 Briefly explain the meaning of successful pinging?
Answer:
Q40: Are all connected ports of SW2 in ‘up’ state? Yes [ ], No[ ]
Briefly explain why the change from Q30?
Answer:
Congratulations, you just completed this assignment! Save the Packet Tracer work.

Similar Documents

Premium Essay

Network Administrator

...Services (Voice, Data & Video Services).‎ To contribute to the growth of a progressive company with quality products and services in the field of Telecommunications and Information Technology (ICT).‎ SUMMARY OF SKILLS AND EXPERIENCE • Total 2 years and 4 months of experience with Advanced Diploma in Telecommunication Engineering and Cisco Certified Network Associate (CCNA). • 2 years and 8 months of experience as Network Engineer (Windows/Linux/Network). Possess the expertise in the following: Networking • Installations, Configurations and Troubleshooting of; • Wireless local Area network (WLAN) • Local Area Network (LAN) and Wide Area Network (WAN) Security • Wimax CPE (Alvarion) for SAFARICOM and ACCESSKENYA networks • Free Space Optic link (FSO) • Mikrotik CPE and router. • Nanostation 2.4Ghz and 5Ghz • Cisco routers and switches • Firewalls rules implementation • VoIP servers using IP PABX • Network IP planning • Software and hardware Windows •...

Words: 1141 - Pages: 5

Premium Essay

Essay On Smart Environment

...Currently, we are in the post-PC era where smart-phones and other handheld devices are changing our environment by making it more interactive as well as informative. Mark Weiser, the forefather of ubicomp, defined a smart environment as ‘‘the physical world that is richly and invisibly interwoven with sensors, actuators, displays, and computational elements, embedded seamlessly in the everyday objects of our lives, and connected through a continuous network.’’ The creation of the Internet has marked a foremost milestone toward achieving ubicomp’s vision which enables individual devices to communicate with any other device in the world. The amount of distributed computing resources and storage owned by various...

Words: 986 - Pages: 4

Premium Essay

It Appication

...students with the fundamental knowledge of IT. • This course will cover the outline and topics which defined as syllabus of the course and upon successful completion of the course, the main outcome for students will be as below: Understanding the basic terminology of computer and IT Getting familiar with programming language - Exploring some ethical and social issues associated with IT Network and growth of Internet The role of IT in system development stages. Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour ASSESSMENT • Assignment 30% • Class participation 10% • Examinations 60% Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Information Technology Application – IT App. Part I: Computer Hardware Part II: Computer Software Part III: Basic Concepts of Network Part IV: IT and Organization Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Outline of the Course • Fundamentals of Information Technology (IT) • Fundamentals of Computer Hardware – – – – CPU Peripherals Input / Output Memory • • • • • • • • • • Computer Software The Number System Basic Assembly Coding Programming Languages (Overview) Understanding Operating System Networking Fundamentals Internet (Intranet-LAN-WAN-MAN) Information Technology in Organizations System Development Future Computing Erican College – IT App. – Session 01 – 21 Jan 2014 – By: Hosseinpour Fundamentals of IT Fundamentals of IT is the first...

Words: 1881 - Pages: 8

Free Essay

Asdf

...it relates to network design considerations. It describes the rise of big data and the transition of traditional enterprise data models with the addition of crucial building blocks to handle the dramatic growth of data in the enterprise. According to IDC estimates, the size of the "digital universe" in 2011 will be 1.8 zettabytes (1.8 trillion gigabytes). With information growth exceeding Moore's Law, the average enterprise will need to manage 50 times more information by the year 2020 while increasing IT staff by only 1.5 percent. With this challenge in mind, the integration of big data models into existing enterprise infrastructures is a critical element when considering the addition of new big data building blocks while considering the efficiency, economics and privacy. This document also shows that the Cisco Nexus ® architectures are optimized to handle big data while providing integration into current enterprise infrastructures. In reviewing multiple data models, this document examines the effects of Apache Hadoop as a building block for big data and its effects on the network. Hadoop is an open source software platform for building reliable, scalable clusters in a scaled-out, "shared-nothing" design model for storing, processing, and analyzing enormous volumes of data at very high performance. The information presented in this document is based on the actual network traffic patterns of the Hadoop framework and can help in the design of a scalable network with the right...

Words: 1384 - Pages: 6

Premium Essay

Cmgt/441

...situations related to complaints as well as harassment, are cataloged using Microsoft Excel that has got no real safety measures apart from a meager password protection alternative. In addition to that, hardcopy files of organization, worker, and customer information are saved in manager’s offices which are just protected by a wooden door (Apollo Group, 2004). Recommendations Because of a terrific lack in data protection features, the following suggestions are recommended: technique as well as risk evaluation, update on physical protection parts, and perform computer system and network protection. Strategy and risk assessment. All around data protection starts with the detection of dangers and the technique on the means to fix those dangers. This can easily be achieved by a Strengths, Weaknesses, Opportunities, and Threats (SWOT) assessment. Weaknesses and strengths are based on internal elements, for example workers, whereas possibilities and risks are based on...

Words: 540 - Pages: 3

Free Essay

Netw420 Week 2 Assignment

...Basic Components of Network Management Systems Matthew D. Miller DeVry University A network management system is a system that is made up of hardware and software, whose job it is to manage the communications, software, and computer hardware of a network (Hill Associates, 2008). There are many different tools and components that help to make up a network management system. Some of these tools include trouble ticket systems, help desk systems, alarm correlation, maintenance tools, etc (Hill Associates, 2008). Along with all these tools there are four basic components that a network management system consists of. They are the agent, network management station, network management protocol, and the management information (Hill Associates, 2008). As mentioned before a network management system has many tools available to use. Trouble ticket systems are used to manage and keep track of any and all issues relating to the network (OTRS Team, 2012). A very useful feature of trouble ticket systems is that they save and archive the tickets with all pertinent information like who was involved, the problem and any notes or solutions (OTRS Team, 2012). In case a particular event occurs again the help desk team has a reference to look to for assistance. With any kind of machine or system, maintenance must take place in order for it to perform to its full potential. Software and hardware updates are essential for the smooth running of a network (TWD & Associates, Inc., 2012)...

Words: 861 - Pages: 4

Premium Essay

Management Sciences

...Chapter 1 Data Communications Introduction 1 Chapter Objectives: Defined data communications Introduced data communications needs Communications model Overview of networks Introduce Internet 2 Data, Data Communication Data is an entity that convey some meaning based on some mutually agreed upon rules/conventions between a sender and a receiver. Data Communication deals with the transmission of signals in a reliable and efficient manner 3 Data Communication Topics covered include: Signal Transmission Transmission Media Signal Encoding Interfacing Data link control Multiplexing 4 Computer Science and Data Communications Merger In 1970s and 1980s The computer communications revolution has produced several remarkable facts. There is no fundamental difference between data processing (computers) and data communications (transmission and switching equipment). There is no fundamental difference among data, voice, and video communications. The distinction among single processor computer, multiprocessor computer, local network, metropolitan network, and long-haul network has blurred. 5 Today’s Trends Three different forces have consistently driven the architecture and evolution of data communications and networking facilities: Traffic growth Development of new services Advances in technology 6 Communication Traffic Both local (within a building or building complex) and Long distance having transmission of Voice, video and data The increased emphasis on office automation...

Words: 2260 - Pages: 10

Premium Essay

Course Syllabus Cmgt 554

...for telecommunications and computer networks. This course covers the concepts and application of the Internet; server and storage architectures; and regulatory considerations. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Fitzgerald, J. & Dennis, A. (2009). Business data communications & networking (10th ed.). Hoboken, NJ: Wiley. Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience. Turban, E. & Volonino, L. (2009). Information technology for management: Improving performance in the digital economy (7th ed.). Hoboken, NJ: Wiley. Supplemental Resources Element K. (2010). Fundamentals of Data Communication: Level 1. Element K. (2010). Fundamentals of Data Communication: Level 2. Element K. (2010). Network Security Fundamentals. Article References Aird, C....

Words: 2439 - Pages: 10

Premium Essay

Information Use

...in a safe way, an organization might invest in an Enterprise Resource Planning system, or ERP for short. This system, although expensive, can monitor and control all aspects of data transfer within an organization. Using an ERP system can accurately report inventories, product details, work audits, and several other aspects of running a business (www.netsuite.com, 2001). Most important of all is accuracy. By Utilizing an ERP system the business will have several checkpoints where products and the processes for creating them are monitored. By always sending out the right product or information an organization can save a fortune in clean up costs and legal fees in the event of an error. An organization must also look at physical and network security options to protect all their assets, the integrity of the ERP system, and any other critical data flowing through or stored in the company. External Information Flow Mentioned before, external information flow can be represented as coming into or coming out of the company. This flow can be represented as supplies or finished product respectively. Each aspect has different challenges and requirements for effectively managing data and other resources. Incoming external information flow is all...

Words: 1041 - Pages: 5

Premium Essay

Network

...Network Design Following the acquisition of new premises comprising a two-story office in Adeplhi, Maryland this provides UMUC with the ability to revise and improve their network topology accordingly and ensure that not only is connectivity provided in a consistent fashion but also to provide the required security for information accordingly. One of the fundamental requirements is to ensure that data is segregated in terms of staff and students so this will require the creation of dedicated subnets accordingly to follow through and implement the solution, while there is also a requirement to provide wireless connectivity for students in the lobby area. Given that there is a specific opportunity to develop a comprehensive infrastructure it is important that the fundamental basis in terms of cabling is of a sufficiently high quality to support current and future operational requirements. Due to the size of the building there would be limitations if using Cat 5 based Ethernet cables for example and so therefore there should be a requirement to utilize Cat 6 based Ethernet as this will support a maximum cable length in excess of 300 ft without there being any connectivity or performance issues (Mitchell, 2014). Each of the two floors will have a designated server room that is designed to provide a central point of connectivity for all locations on that floor, and each of the rooms on the first and second floor will require a certain number of data ports based on their expected utilization...

Words: 1451 - Pages: 6

Premium Essay

Technology

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Free Essay

Manage Personal Work Priorities

...Name and SSN: Robert Boss 789-78-9789 8. Organizational Unit: Network Services SECTION 2. PRIMARY PURPOSE OF POSITION | Develop an integrated (linked) comprehensive surveillance system that tracks community-level data, program services delivered and meets all minimum data element requirements by the end of the first fiscal year. Designs network installations and expansions to include all hardware, devices and cabling schemes, and performs, directs and/or coordinates network installations with personnel. Organize efficient communication between staff. SECTION 3. WORK AREA AND INFORMATION TECHNOLOGY ENVIRONMENT Supports personnel with telecommunications systems, data and voice integration, network architecture and engineering, and network operations. Ethernet, FDDI networking, some token ring, Centrex telephone environment, Novell, Banyan, peer-to-peer networking over IP, SNA, connections used by mainframe, and 120+ dial-in modems. SECTION 4. MAJOR JOB FUNCTIONS JOB FUNCTIONS | PERCENT OF TOTAL WORKING TIME | ADA (E OR M) | Comp Level of Function (CL 1, 2 or 3) | Network Design and ImplementationConsults with departments interested in expanding existing voice and data communications networks or installing new networks. Analyzes and determines capacity and access needs and recommends cost-effective system proposals, including estimates of cost and installation time frame. Designs network...

Words: 1884 - Pages: 8

Premium Essay

Unit 4 Assignment 2: Acceptable Use Policy (Aup) Definition

...sustain a certain level of Security for this, so that nobody can enter from the outside, only the IT Department may grant access privilege for Remote Access.   The User Domain will enforce an acceptable use policy (AUP) to define which user can and cannot do with any company data that he or she has access to.   Also, every user on the company is responsible for the safekeeping of the environment. 2. LAN Domain The Local Area Network Domain is a group of computers that are all connected to a single LAN domain. The LAN Domain is a collection of computers connected to each another or to a common medium. All LAN domains have data closets, physical elements of the LAN, and logical elements as designated by authorized personnel. It involves strong security and access controls. This domain can access company-wide systems, applications, and data from anyplace within the LAN. The LAN support group is in control of maintaining and securing the domain. The biggest threat to the LAN domain is an Un-authorized access to anything on the network. For example: LAN, the systems, and data. One thing we can do is require strict security protocols for this domain, such as disabling all external access ports for the workstation. This would cause a no access protocol. 3. Workstation Domain Workstation Domain is where all the users work. Before a user can log into the machine, he or she will need to be confirmed in order to gain admission.   At Richman Investments, we will...

Words: 358 - Pages: 2

Premium Essay

Strorage Tech Nas

...Network Attached Storage ITMO 557 Research Paper Submitted by: Ashif Anwar CWID: A20318587 Date of Submission: This is a research paper on Network attached storage covering the various areas given in the contents below. Fall 2014 ASHIF ANWAR Illinois Institute of Technology-Chicago 11/30/2014 Contents: 1. Introduction. 2. History. 3. Product demonstration. 4. NAS future perspective. 5. Introduction Network Attached Storage is basically defined as a file level computer data storage server connected to a computer network. It is specialized for file server operation by its hardware, software or configuration of elements to provide data access to wide range of clients (Wikipedia, 2014). In simple words we can say “a network attached storage is a external hard drive which is a computer storage system that access and remains on a computer network via Ethernet and wireless connections. The drive is then accessible to all computers in a network, instead of one just hard wired computer”(Networking, 2014). Figure-1: NAS Storage on a network infrastructure. (slideshare, 2013). NAS is one of the popular approaches which allow homes and business to store and retrieve large amounts of data in an efficient and affordable manner. One can wirelessly backup their computer files such as music, videos and other important documents...

Words: 661 - Pages: 3

Premium Essay

Computer Security

...Foundations of Network Security Fundamentals of Network Security 2 Firewall Fundamentals 43 VPN Fundamentals 79 Network Security Threats and Issues 111 CHAPTer Fundamentals of Network Security 1 C OMPUTER NETWORK SECURITY is very complex. New threats from inside and outside networks appear constantly. Just as constantly, the security community is always developing new products and procedures to defend against threats of the past and unknowns of the future. As companies merge, people lose their jobs, new equipment comes on line, and business tasks change, people do not always do what we expect. Network security configurations that worked well yesterday, might not work quite as well tomorrow. In an ever-changing business climate, whom should you trust? Has your trust been violated? How would you even know? Who is attempting to harm your network this time? Because of these complex issues, you need to understand the essentials of network security. This chapter will introduce you to the basic elements of network security. Once you have a firm grasp of these fundamentals, you will be well equipped to put effective security measures into practice on your organization’s network. While this textbook focuses on general network security, including firewalls and virtual private networks (VPNs), many of the important basics of network security are introduced in this chapter. In Chapters 1–4, network security fundamentals, concepts...

Words: 16205 - Pages: 65