Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Information Systems help with packet tracer assignment DHCP

DHCP assigment with packet tracer, need help completing the assignment. 

Introduction to Routing and Switching Week 2 Guided Practice: DHCP

Objective

In this Guided Practice you will be connecting and configuring a small subnetted network with multiple routers.

Technology

You will use Packet Tracer in this practice. Anytime you see a 50 in an IP address replace with your assigned number.

Task 1 – Configuring DHCP

You will start with the network you previously connected and configured in the VLSM Guided Practice. Notice the labeling of the VLANs and network addresses below. Make sure to make similar labels to your network before moving to the next step.

In week 1 you configured DCHP pools on a router. A more common way to configure DCHP on a network is to have DCHP pools configured on a server. Follow the steps below to configure DHCP pools on Server1 of your network. Your PCs and Wi-Fi Router will use DCHP and the servers will both have static IP addresses.

Reference the previous Guided Practice for any IP addressing information that you may need.

Assign Server1 and Server2 static IP addresses. As a reminder, use your assigned number for the third octet where 50 is used for instructional purposes.

Double click on Server1 and under Services at the top click DHCP on the left.

You will now begin to add the DHCP pools for your PCs and the Wi-Fi Router . Under Interface at the top click On for Service.

Start by adding the first DCHP pool that PC1 will use. Once you fill in the information click on Add at the bottom. You will then see the PC1 DCHP pool at the bottom of the screen.

Continue creating the other four DCHP pools using the same steps as above. Take a screenshot.

Next we need to tell the R1 and R3 routers where these DCHP pools are located. Console into the R3 router. We will add the ip helper command to our four sub-interfaces. This will tell the router where to go to for a DHCP request.

Verify your PCs all receive IP addresses via DCHP. Take a screenshot of each.

Deliverables for Task 1

· Screenshot of your DCHP pools on Server1.

· Screenshot of your PCs with IP addresses via DHCP.


Task 2 – Configuring SSH and Telnet


You will now set up SSH and Telnet communications on your routers. This is the typical way network administrators set up their systems so they can communicate to each router from a central location. Otherwise you will need to physically travel to each router with your laptop and a console cable.

You will set up SSH for communications across the network. You will need to do the following for the R1, R2 and R3 routers on your network. Below is an example for the R1 router.

1. Create a secret password on the R1 router.

2. Create a domain and logon username.

3. Now we are going to create the crypto key for the SSH session.

4. Now enable SSH version 2, set time out duration and login attempt time on the router.

5. Enable VTY lines and configure access protocols.



Testing Connectivity

Ping from PC2 to the R2 router. Take a screenshot.

Let’s now SSH from PC2 to the R2 router from the same command prompt. You will use class for the first password and hit enter. Then type enable and enter then cisco for the second password. You will now enter the R2 router. Take a screenshot. Go ahead and SSH to the R1 and R3 routers as well and take screenshots like the one below for the R1 router.

Next we will Telnet from PC4 to the R1 router. The sequence is similar to SSH, see example below. Open a command prompt and type telnet 192.168.___.241. Your username and passwords are the same as you used for SSH. Take a screenshot. Go ahead and Telnet to the R2 and R3 routers as well and take screenshots like the one below for the R1 router.


What are some differences between SSH and Telnet? Why should you use SSH and not Telnet?


Deliverables for Task 2

· Screenshot of ping from PC2 to the R2 router.

· Screenshot of SSH and Telnet to each router on the network.

· Answer the questions about Telnet vs SSH: What are some differences between SSH and Telnet? Why should you use SSH and not Telnet

Task 3 – DNS

In this task you will be using DNS that is configured on the Internet Server where there are three DNS a records configured.

What is a DNS A record? The “A” stands for “address” and this is the most fundamental type of DNS record: 
it indicates the IP address of a given domain. For example, if you pull the DNS records of cloudflare.com, the A record currently returns an IP address of: 104.17. 210.9. A records only hold IPv4 addresses.

Double click on the Internet server and under Services at the top click on DNS.

You will see three different A records- we will use server.com.

Go to PC4 and open a command prompt. Ping 11.1.1.10 and then server.com. Take screenshots. Finally bring up a Web Browser and put server.com in the URL box. Take a screenshot.


Deliverables for Task 3

· Screenshot of ping from PC4 to 11.1.1.10

· Screenshot of ping from PC4 to server.com

· Screenshot of Web Browser using server.com

image3.png

image4.png

image5.png

image6.png

image7.png

image8.png

image9.png

image10.png

image11.png

image12.png

image13.png

image14.png

image15.png

image16.png

image17.png

image18.png

image19.png

image20.png

image21.png

image22.png

image23.png

image24.png

image25.png

image1.png

image2.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Connecting Everything – The Internet of Things

1) How can existing and emerging technologies (IoT, Artificial Intelligence, Cloud Computing, Machine Learning, Collaboration Technologies, etc,) inform and enhance the administration and delivery of Public Sector services, i.e., 2) What is possible? 3) How to maximize?

Information Systems Advances in Technology Assignment

Advances in Technology Assignment Overview In this assignment, you will examine how advances in technology and telehealth have improved health care in rural communities. Transportation, health monitoring, timelines, and communication within the health care system are key areas where telehealth can reduce or minimize challenges and burdens with patient encounters.

Telehealth and Virtual Medicine

 2 paragraphs, include reference. Student response will be posted under NOTE PAD.  How have health care providers taken advantage of telehealth and virtual medicine to promote access to patient care during the COVID-19 pandemic? What are some advantages and disadvantages of virtual health care? Be sure to respond to at

Assignment 1

Due 5/23/2024 A professional and appealing document is expected. As required by the Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state ideas in your own words or use quotation marks. image1.png image2.png image3.png

Information Systems Assignment 1-2

Written Essay Assignment 1-3: Due May 23,2024 No more than 3 pages · Relate the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security rules to NIST standards and encryption technologies to ensure confidentiality of ePHI transmission · Evaluate the requirements for a health care organization to become compliant

1-1

Written Essay Assignment 1-1: Due May 23,2024 No more than 3 pages · Research the Enron fraud case as well as SOX requirements · Identify the key elements of fraud committed by Enron that led to the Sarbanes-Oxley (SOX) compliance law. · Identify other compliance laws in the United States

INTRODUCTION TO OM FOR DX

Assignment #2 Assignment Submission: Submit your assignment on d2l that has a SINGLE ZIP file that has 1. All Visio/draw.io/Modelio Diagrams 2. The PDF document that has all the diagrams and the answers inline below every question including the essay/textual questions. Assignment Deliverables: Provide your answers for the following requirements

DNS, IP, and TCP Traffic Streams

Please see file Preparation 1. Download and install the TCP/IP packet capture program 2. Decide on a website of your choice for which you will capture and analyze TCP/IP traffic streams and identify the URL of your selected website (e.g., 3. Use the  Week 7 Assignment Template  Download Week 7

Response 2

200 word response due 5/17/2024 Franco 2a When recruiting employees for cybersecurity focused work, the vetting process is very important. These prospective employees are more thoroughly vetted than in non-security positions because of the nature of the work. A cyber employee’s main objectives will be to strengthen the cybersecurity posture

Response 1

200 word response due 5/17/2024 2a. Why is it incumbent on employers of cybersecurity personnel to vet prospective employees more thoroughly than in non-security positions? Employers, in charge of hiring cybersecurity professionals are required to assess employees more than those in no security roles. This rigorous vetting process is crucial

Topic 2

Topic 2 Answer the following questions Due 5/17/2024 2a. Why is it incumbent on employers of cybersecurity personnel to vet prospective employees more thoroughly than in non-security positions? (answer with 100 words) 2b. To what extent should the workplace peruse applicants through social media sites? (i.e. Facebook, LinkedIn). At what

Response 2

200 word response 1 reference/intext citation Due 5/16/2024 Jackson The Sarbanes-Oxley Act, or Sox, is a United States law “to protect investors by preventing fraudulent accounting and financial practices at publicly traded companies” (Fruhlinger, 2020). Specifically, the section of the SOX compliance law that requires proper controls and integrity of

Response 1

300 word response 1 reference/intext citation Due 5/16/2024 Quintana HIPAA regulations require health care organizations to have an incident response plan and team that handles potential security incidents and breaches in order to protect and safeguard patient privacy and information and to properly respond to security incidents. The data and

Discussion 1

Discussion #1 The Scope of an IT Compliance Audit 300 word response 1 reference/intext citation Due 5/14/2024 Under the HIPAA Security Rule, it is a requirement for a health care organization to have a security incident response plan and team to handle potential security incidents and breaches. Why is this

Data Analysis Using R

2 paragraph, include reference. 1 student response  Describe what R programming language is and how R programming is used in health care. What are the advantages and disadvantages of R in daily health care IT? Be sure to respond to at least one of your classmates’ posts.

R Programming Activity

Week 7 Activity – R Programming Overview In this learning activity, you will explore the use of R programming in health care. R is an open-source free software used for statistical computing and graphics. You will write an essay to examine how R is used for data analytics and decision-making

Summative assessment

Summative assessment UU – MBA – 714 Summative Assessment Point 2 1 | P a g e Summative Assessment Point 2 Brief, Guidelines and Marking Criteria For this assignment, you are required to find and promote an innovative product/service within an organization of your choice. In your assignment, you need

Database Analysis Using Python

2 paragraph include reference and 1 student response List the components of a relational database and how they are used for Python programming. How is Python programming used in health care IT? List some advantages and disadvantages of Python programming. Be sure to respond to at least one of your