Preview

Ccna2

Satisfactory Essays
Open Document
Open Document
51893 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ccna2
This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program.

Lab 1.3.1: Review of Concepts from Exploration 1
Topology Diagram

Learning Objectives
Upon completion of this lab, you will be able to: • • • • • • Create a logical topology given network requirements Create subnets to meet host requirements Configure the physical topology Configure the logical topology Verify network connectivity Configure and verify passwords

Scenario
In this lab, you will design and configure a small routed network and verify connectivity across multiple network devices. This requires creating and assigning two subnetwork blocks, connecting hosts and network devices, and configuring host computers and one Cisco router for basic network connectivity. Switch1 has a default configuration and does not require additional configuration. You will use common commands to test and document the network. The zero subnet is used.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

Page 1 of 11

CCNA Exploration LAN Switching and Wireless: LAN Design

Lab 1.3.1: Review of Concepts from Exploration 1

Task 1: Design a Logical LAN Topology
Step 1: Design an IP addressing scheme. Given the IP address block of 192.168.7.0 /24, design an IP addressing scheme that satisfies the following requirements:

Subnet Subnet A Subnet B

Number of Hosts 110 54

The 0 subnet is used. No subnet calculators may be used. Create the smallest possible subnets that satisfy the requirements for hosts. Assign the first usable subnet to Subnet A. Subnet A Specification Number of bits in the subnet IP mask (binary) New IP mask (decimal) Maximum number of usable subnets (including the 0 subnet)



Links: s routers to their inside LAN/wireless IP addresses (192.168.30.1) must be successful. DHCP must not give out IP addresses in a range that includes the addresses for PC2 and PC3. The two wireless networks must not interfere with each other. Wireless Network Solution Record your solution below. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 5

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    e. One thing all Ethernet networks have in common is their access method, known as…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Lab 1 Essay

    • 553 Words
    • 3 Pages

    Now that we understand the codes and standards needed to create this building, it’s time to put stuff in it. Our task at hand is to start wiring the building for a new computer science and electrical engineering labs. This building will have a lot of devices that need to be connected to the school campus network and we will need a lot of tools to do it.…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 4 B IP Subnetting Lab

    • 2462 Words
    • 19 Pages

    Develop a subnetting plan and implement it in the lab. Configure RIP as a routing protocol.…

    • 2462 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    Subnetting Lab 3 Unit 4 Lab 1. Connected Routes - Page 61 2. Configuring IP Addresses I - Page 64 3. Configuring IP Addresses II - Page 66 4. Static Routes I - Page 68 5.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    You want to divide a class B network into 100 subnets. Which subnet mask will you use to get the most hosts on each subnet? How many hosts will be on each subnet? Explain your answer.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Overview|In Exercise 7.2, you use local Group Policy to enable Network Map to display a diagram of the network, so you can plan the software deployments for the lab network at a later time.|…

    • 740 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    However, taking the time to study and practice with routers or a router simulator is the real key to success. You will learn the following information in this book: Chapter 1 introduces you to internetworking. You will learn the basics of the Open Systems Interconnection (OSI) model the way Cisco wants you to learn it. There are written labs and plenty of review questions to help you. Do not skip the fundamental written labs in this chapter! Chapter 2 will dive into Ethernet networking and standards. Data encapsulation is discussed in detail in this chapter as well. There are written labs and plenty of review questions in this chapter to help you. Chapter 3 provides you with the background necessary for success on the exam as well as in the real world by discussing TCP/IP. This indepth chapter covers the very beginnings of the Internet Protocol stack and then goes all the way to IP addressing and understanding the difference between a network address and a broadcast address before finally ending with network troubleshooting. Chapter 4 introduces you to easy subnetting. You will be able to subnet a network in your head after reading this chapter if you really want to. Plenty of help is found in this chapter if you do not skip the written labs and review questions. Chapter 5 will have you learn about Variable Length Subnet Masks (VLSMs) and how to design a network using VLSMs. This chapter will finish…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    References: Hallberg, B.A. (2010). Networking: A beginner’s guide (5th ed.). New York, NY: McGraw-Hill. https://portal.phoenix.edu/classroom/coursematerials/it_230/20130715/OSIRIS:45023271…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For the ElementK Computing Usable Subnets and Hosts Lab you must show your work in finding the needed bits to borrow and maximum number of hosts.…

    • 1560 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 2250 Words
    • 13 Pages

    User name: Eidson Jr, Jerry Eidson Jr, Jerry Book: Introduction to Networking Lab Manual Page: 2. No part of any book may be reproduced or transmitted by any means without the…

    • 2250 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    Computers use network protocols to communicate with computer network there are many network protocols as Hallberg (2005, p92) said “for example, transmission control protocols/internet protocols (TCP/IP) defines a set of rules used to send data from one node on a network to another node”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    NT1210: Introduction to Networking_V1.0 > Week 1 > Submit Short Answer Assessment > Short Answer…

    • 544 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In order to get more subnets out of the current network, host bits will need to be used as network bits. To get 250 subnets the subnet mask will need to fit 250 subnets into a range of 0-255. 11111111=255 256-255=1 256/1=256 possible subnets therefore each network will increase in the second octet by 1 (1,2,3,4,5,6,7…) It would work similar if there was a need for say 124 subnets 11111110=254 256-254=2 256/2=128 possible subnets. So to get the adequate subnets from 255.0.0.0 the second octet or host bits from the second octet need to be used for network bits to increase the number of subnets thus giving the new subnet mask of 255.255.0.0…

    • 996 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Travis, Tim. (2013). 12 Years After The Bubble Cisco Is Ripe For The Taking: Update.…

    • 6261 Words
    • 26 Pages
    Powerful Essays

Related Topics