Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

LABON1

Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme

Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme

Topology

Addressing Table

Device

Interface

IP Address

Subnet Mask

Default Gateway

R1

G0/0

N/A

G0/1

N/A

Lo0

N/A

Lo1

N/A

S1

VLAN 1

N/A

N/A

N/A

PC-A

NIC

PC-B

NIC

Objectives

Part 1: Design a Network Subnetting Scheme

Part 2: Configure the Devices

Part 3: Test and Troubleshoot the Network

Background / Scenario

In this lab, starting from a single network address and network mask, you will subnet the network into multiple subnets. The subnet scheme should be based on the number of host computers required in each subnet, as well as other network considerations, like future network host expansion.

After you have created a subnetting scheme and completed the network diagram by filling in the host and interface IP addresses, you will configure the host PCs and router interfaces, including loopback interfaces. The loopback interfaces are created to simulate additional LANs attached to router R1.

After the network devices and host PCs have been configured, you will use the
ping command to test for network connectivity.

This lab provides minimal assistance with the actual commands necessary to configure the router. However, the required commands are provided in Appendix A. Test your knowledge by trying to configure the devices without referring to the appendix.

Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table at this end of the lab for the correct interface identifiers.

Note: Make sure that the routers and switches have been erased and have no startup configurations. If you are unsure, contact your instructor.

Required Resources

1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)

1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)

2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)

Console cables to configure the Cisco IOS devices via the console ports

Ethernet cables as shown in the topology

Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing. An Ethernet straight-through cable may be used between the router and PC-B. If using another Cisco router model, it may be necessary to use an Ethernet crossover cable.

Design a Network Subnetting Scheme

Create a subnetting scheme that meets the required number of subnets and required number of host addresses.

In this scenario, you are a network administrator for a small subdivision within a larger company. You must create multiple subnets out of the 192.168.0.0/24 network address space to meet the following requirements:

The first subnet is the employee network. You need a minimum of 25 host IP addresses.

The second subnet is the administration network. You need a minimum of 10 IP addresses.

The third and fourth subnets are reserved as virtual networks on virtual router interfaces, loopback 0 and loopback 1. These virtual router interfaces simulate LANs attached to R1.

You also need two additional unused subnets for future network expansion.

Note: Variable length subnet masks will not be used. All of the device subnet masks will be the same length.

Answer the following questions to help create a subnetting scheme that meets the stated network requirements:

How many host addresses are needed in the largest required subnet? _____________________

What is the minimum number of subnets required? _________________________________

The network that you are tasked to subnet is 192.168.0.0/24. What is the /24 subnet mask in binary?

________________________________________________________________________________

The subnet mask is made up of two portions, the network portion, and the host portion. This is represented in the binary by the ones and the zeros in the subnet mask.

In the network mask, what do the ones represent? ________________________________________

In the network mask, what do the zeros represent? _______________________________________

To subnet a network, bits from the host portion of the original network mask are changed into subnet bits. The number of subnet bits defines the number of subnets. Given each of the possible subnet masks depicted in the following binary format, how many subnets and how many hosts are created in each example?

Hint: Remember that the number of host bits (to the power of 2) defines the number of hosts per subnet (minus 2), and the number of subnet bits (to the power of two) defines the number of subnets. The subnet bits (depicted in bold type face) are the bits that have been borrowed beyond the original network mask of /24. The /24 is the slash prefix notation and corresponds to a dotted decimal mask of 255.255.255.0.

(/25) 11111111.11111111.11111111.
10000000

Dotted decimal subnet mask equivalent: ________________________________

Number of subnets? ________________, Number of hosts? ________________

(/26) 11111111.11111111.11111111.
11000000

Dotted decimal subnet mask equivalent: ________________________________

Number of subnets? ________________, Number of hosts? ________________

(/27) 11111111.11111111.11111111.
11100000

Dotted decimal subnet mask equivalent: ________________________________

Number of subnets? ________________ Number of hosts? ________________

(/28) 11111111.11111111.11111111.
11110000

Dotted decimal subnet mask equivalent: ________________________________

Number of subnets? ________________ Number of hosts? _________________

(/29) 11111111.11111111.11111111.
11111000

Dotted decimal subnet mask equivalent: ________________________________

Number of subnets? ________________ Number of hosts? _________________

(/30) 11111111.11111111.11111111.
11111100

Dotted decimal subnet mask equivalent: ________________________________

Number of subnets? ________________ Number of hosts? _________________

Considering your answers, which subnet masks meet the required number of minimum host addresses?

________________________________________________________________________________

Considering your answers, which subnet masks meets the minimum number of subnets required?

________________________________________________________________________________

Considering your answers, which subnet mask meets both the required minimum number of hosts and the minimum number of subnets required?

________________________________________________________________________________

When you have determined which subnet mask meets all of the stated network requirements, you will derive each of the subnets starting from the original network address. List the subnets from first to last below. Remember that the first subnet is 192.168.0.0 with the newly acquired subnet mask.


Subnet Address / Prefix Subnet Mask (dotted decimal)

___________________ / ____ __________________________

___________________ / ____ __________________________

___________________ / ____ __________________________

___________________ / ____ __________________________

___________________ / ____ __________________________

___________________ / ____ __________________________

___________________ / ____ __________________________

___________________ / ____ __________________________

___________________ / ____ __________________________

___________________ / ____ __________________________

Complete the diagram showing where the host IP addresses will be applied.

On the following lines provided, fill in the IP addresses and subnets masks in slash prefix notation. On the router, use the first usable address in each subnet for each of the interfaces, Gigabit Ethernet 0/0, Gigabit Ethernet 0/1, loopback 0, and loopback 1. Fill in an IP address for both PC-A and PC-B. Also enter this information into the Addressing Table on Page 1.

Configure the Devices

In Part 2, set up the network topology and configure basic settings on the PCs and router, such as the router Gigabit Ethernet interface IP addresses, and the PC’s IP addresses, subnet masks, and default gateways. Refer to the Addressing Table for device names and address information.

Note: Appendix A provides configuration details for the steps in Part 2. You should attempt to complete Part 2 prior to reviewing Appendix A.

Configure the router.

Enter into privileged EXEC mode and then global config mode.

Assign the
R1 as the hostname for the router.

Configure both the
G0/0 and
G0/1 interfaces with IP addresses and subnet masks, and then enable them.

Loopback interfaces are created to simulate additional LANs on R1 router. Configure the loopback interfaces with IP addresses and subnet masks. After they are created, loopback interfaces are enabled, by default. (To create the loopback addresses, enter the command
interface loopback 0 at the global config mode)

Note: You can create additional loopbacks for testing with different addressing schemes, if desired.

Save the running configuration to the startup configuration file.

Configure the PC interfaces.

Configure the IP address, subnet mask, and default gateway settings on PC-A.

Configure the IP address, subnet mask, and default gateway settings on PC-B.

Test and Troubleshoot the Network

In Part 3, you will use the
ping command to test network connectivity.

Test to see if PC-A can communicate with its default gateway. From PC-A, open a command prompt and ping the IP address of the router Gigabit Ethernet 0/1 interface. Do you get a reply? _________________

Test to see if PC-B can communicate with its default gateway. From PC-B, open a command prompt and ping the IP address of the router Gigabit Ethernet 0/0 interface. Do you get a reply? ________________

Test to see if PC-A can communicate with PC-B. From PC-A, open a command prompt and ping the IP address of PC-B. Do you get a reply? _________________

If you answered “no” to any of the preceding questions, then you should go back and check all of your IP address and subnet mask configurations, and ensure that the default gateways have been correctly configured on PC-A and PC-B.

If you verify that all of the settings are correct, and you can still not ping successfully, then there are a few additional factors that can block ICMP pings. On PC-A and PC-B within Windows, make sure that the Windows Firewall is turned off for the Work, Home, and Public networks.

Experiment by purposely misconfiguring the gateway address on PC-A to 10.0.0.1. What happens when you try and ping from PC-B to PC-A? Do you receive a reply?

____________________________________________________________________________________

____________________________________________________________________________________

Reflection

Subnetting one larger network into multiple smaller subnetworks allows for greater flexibility and security in network design. However, what do you think some of the drawbacks are when the subnets are limited to being the same size?

_______________________________________________________________________________________

_______________________________________________________________________________________

Why do you think the gateway/router IP address is usually the first usable IP address in the network?

_______________________________________________________________________________________

© 2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page
1 of
5

© 2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page
5 of
5

image1.png

image2.png

image3.jpeg

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?