CSC3407 Assignment 1, S1 2014 CSC3407 Assignment 1 S1 2014 Due date: 11 April 2014, Friday Full Mark for this assignment: 100 Weighting: 25% of the course mark Submission Requirements: Complete the assignment yourself. Submit your assignment on-line via the submission link in the course web page. Submit Packet Tracer files produced by Packet Tracer version 6.0.1. No other version of Packet Tracer files will be accepted. Submit a PDF containing all the answers (except Packet Tracer files) and screen dumps. No other format is accepted. Do not zip or archive your files. Show your working wherever possible. Question 1 (5 marks) What are the benefits of using a layered model for computer networks? Question 2 (10 marks) The three network topologies shown below are all valid Ethernet networks. a) How many collision domains and broadcast domains are there in each topology? b) Explain which topology is preferred. Question 3 (10 marks) Explain why 22.214.171.124/26 is not a valid host IP address. Topology 1 Topology 2 Topology 3 CSC3407 Assignment 1, S1 2014 Question 4 (10 marks) In the following network topology, assume static routes are set and the routers are working properly. Explain why PC A can talk to PC C but PC B cannot talk to PC D. Question 5 (65 marks) USQ has allocated 172.17.0.0/16 to 6 PC laboratories in Wonderland campus. Each laboratory will have a subnet of its own. The number of hosts in each laboratory is as follows: Lab 1 Subnet A Lab 2 Subnet B Lab 3 Subnet C Lab 4 Subnet D Lab 5 Subnet E Lab 6 Subnet F Number of Hosts 2 47 532 6 39 125 The hosts in each laboratory are linked together using switches. The six laboratories are linked together using a router with six Ethernet interfaces as shown below. In the topology, only two hosts in each laboratory are shown. For each subnet, the gateway will use the first host IP address. The two PCs (for example, PC_B1 and PC_B2) in each subnet shown will be using the second available host IP address and the last available host IP address respectively. PC A 192.168.102.73/27 Gateway 192.168.102.65/27 PC C 192.168.102.123/27 Gateway 192.168.102.97/27 PC D 192.168.102.148/27 Gateway 192.168.102.97/27 Router 2 192.168.102.97/27 Router 1 192.168.102.65/27 PC B 192.168.102.81/27 Gateway 192.168.102.65/27 CSC3407 Assignment 1, S1 2014 a) Taking into account of possible expansion of laboratory facilities in the future, we have to pack the subnets so that they use minimal IP address space. With this in mind, please assign IP addresses to the PCs and router Ethernet interfaces (gateways) using the table below: Device IP Gateway Broadcast IP Subnet IP PC_A1 PC_A2 PC_B1 PC_B2 PC_C1 PC_C2 PC_D1 PC_D2 PC_E1 PC_E2 PC_F1 PC_F2 CSC3407 Assignment 1, S1 2014 b) Implement the network using Packet Tracer 6.0.1 subject to the following conditions: 1. Use one Cisco 2811 router with added Ethernet interfaces. 2. Use one Cisco 2960 24 port switch for each laboratory assuming other access switches can be added later on. 3. The router Ethernet interfaces use the first host IP address of the corresponding subnet assigned to the laboratory. 4. The two PCs shown in the topology should have the second available host IP address and the last available address of the subnet assigned. c) When a TCP/IP packet travels from PC_A1 to PC_F1, we can capture the packets on their way using simulation mode. Use a Packet Tracer screen capture of the packets to explain where inside a packet/frame you can find: 1) Source MAC address and destination MAC address; 2) Source IP address and destination IP address. *** End of Assignemnt 1 ***
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more