...Advanced Networks Lab Book 2015/2016 Module Leader: Nauman Israr Office Location: IT 1.06 Email: N.Israr@tees.ac.uk Telephone no: 2693 Course Number and Name: Advanced Networks(COM3038-N-BJ1-2015) Year: 2015/2016 Working Time: Timetable Tutorial Time Only in Lab Name of Student: Name of Lab Instructor: Submission Date: TBA Grade: Submission Method: Introduction The purpose of this lab book is to document your solution for a given set of exercises. The relevant concepts used in each exercise will be covered during the lecture. You must complete these exercises within your timetabled tutorial session. The lab book will count towards your final grade. You will be required to submit completed lab book before the submission deadline. Please check with your tutor about the deadline date, time and submission method. This lab book is 10% of your overall mark. 1 Exercise 1: Duration- One Hour You are a network engineer who has been asked to attend an initial meeting with the management team of ABC, LLC. ABC manufactures electric cars. Its new electric car was just picked up by a Government promotional scheme. ABC is upgrading its manufacturing capacity and hiring new employees. Recently, ABC employees have started saying, “The network is too slow.” They are also experiencing problems sending email, accessing web-based applications, and printing. In the past, when the company was small, it didn’t have these...
Words: 2719 - Pages: 11
...Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader is already somewhat familiar with IP addressing, the role of subnet masks, and the uses for subnetting. It proceeds quickly from a brief introduction to a thorough discussion of simple techniques for determining the number of subnets and hosts, calculating...
Words: 7956 - Pages: 32
...Binary Part 2: Use Bitwise ANDing Operation to Determine Network Addresses Part 3: Apply Network Address Calculations Background / Scenario Every IPv4 address is comprised of two parts: a network portion and a host portion. The network portion of an address is the same for all devices that reside in the same network. The host portion identifies a specific host within a given network. The subnet mask is used to determine the network portion of an IP address. Devices on the same network can communicate directly; devices on different networks require an intermediary Layer 3 device, such as a router, to communicate. To understand the operation of devices on a network, we need to look at addresses the way devices do—in binary notation. To do this, we must convert the dotted decimal form of an IP address and its subnet mask to binary notation. After this has been done, we can use the bitwise ANDing operation to determine the network address. This lab provides instructions on how to determine the network and host portion of IP addresses by converting addresses and subnet masks from dotted decimal to binary, and then using the bitwise ANDing operation. You will then apply this information to identify addresses in the network. Convert IPv4 Addresses from Dotted Decimal to Binary In Part 1, you will convert decimal numbers to their binary equivalent. After you have mastered this activity, you will convert IPv4 addresses and subnet masks from dotted decimal to their binary form. Convert...
Words: 1123 - Pages: 5
...Exercise 3: Duration: 3-4 weeks In Exercise 1, you learned about ABC, a manufacturer of new electric cars. ABC has chosen you to design a new network that will let the company scale to a larger size. The campus network will support about 1200 employees and a new data center. Another feature of the campus network will be a state-of-the-art manufacturing facility with networked equipment that communicates with servers in the data center that support real-time control and management. Engineers will access the servers from their PCs in the access layer of the campus network. ABC will sell its new Cars both online and through a large national car retail company. For online sales, ABC plans to have a DMZ that connects a public web server, a DNS server, and an email server. The web server needs to communicate with back-end servers in the data center that hold customer billing data. Design and draw a logical topology that will support ABC’s needs. In addition to meeting the specified needs, be sure to consider security. 1. Explain why you think your design meets the needs of ABC. 2. List the major user communities for your design. 3. List the major data stores and the user communities for each data store. 4. Identify major network traffic flows in your network topology drawing. 5. How does your design provide security for ABC’s network? 6. What questions will you ask ABC about this project as you do your work? ____________________________________________________________ ...
Words: 875 - Pages: 4
...Approach link for a challenge. You've got a number of tools available on the left bar of the main page to aid you in your lab. Here are brief notes on each. Diagram Task Index Task 1 – Computing Usable Subnets and Hosts Task 1 – Computing Usable Subnets and Hosts Step 1: You are given the Class C network address: 192.168.89.0. From this network, if you needed to create 2 subnets, how many bits would need to be borrowed at a minimum? Action: Count on your fingers to work out how many bits need to be borrowed to create 2 subnets. Explanation: You can use this simple trick to determine the number of bits needed. Hold out your hand and counting on your fingers from left to right, the first finger equals 2, the second finger is double that (4), the third finger is doubled again (8), and so on. As an example, let’s say you needed 10 subnets. Count on your fingers until you reach the first number that is equal to or exceeds the value 10. Going from left to right that would be 2..4..8..16.. Stop. You needed four fingers to get to a number that was equal to or exceeds 10. Four is also how many bits that need to be borrowed to create 10 subnets. Using the same method, determine how many bits need to be borrowed to create 2 subnets. CREATING 2 SUBNETS = 1 bit To create 2 subnets, you will need to borrow at least one bit. Using your hand,...
Words: 3485 - Pages: 14
... Introduction In the mid-1990's, the Internet is a dramatically different network than when it was first established in the early 1980's. Today, the Internet has entered the public consciousness as the world's largest public data network, doubling in size every nine months. This is reflected in the tremendous popularity of the World Wide Web (WWW), the opportunities that businesses see in reaching customers from virtual storefronts, and the emergence of new types and methods of doing business. It is clear that expanding business and social awareness will continue to increase public demand for access to resources on the Internet. There is a direct relationship between the value of the Internet and the number of sites connected to the Internet. As the Internet grows, the value of each site's connection to the Internet increases because it provides the organization with access to an ever expanding user/customer population. Internet Scaling Problems Over the past few years, the Internet has experienced two major scaling issues as it has struggled to provide continuous and uninterrupted growth: - The eventual exhaustion of the IPv4 address space - The ability to route traffic between the ever increasing number of networks that comprise the Internet The first problem is concerned with the eventual depletion of the IP address space. The current version of IP, IP version 4 (IPv4),...
Words: 7368 - Pages: 30
...Checkpoint: TCP/IP LAN Plan 1. An IPv6 address is made up of how many bits? a. 32 b. 48 c. 64 d. 128 e. 256 The answer to this question is d. Ipv6 address has 128 bits which is better than Ipv4 which has only 32 bit addresses. If I understand it with Ipv4 the amount of addresses will soon run out. With Ipv6 as stated in the book unless every star in the universe were assigned an address it is unlikely to run out of addresses. With Ipv4 it was stated that there are only 4 billion possible addresses. With Ipv6 there are 3.4x10^38 or 34 followed by 37 zeroes. Ipv6 resolves some problems found in Ipv4 such as limited addresses, security, sometimes complicated setup and quality of service (QoS). QoS describes the ability of a network to prioritize data packets based on the type of information. Ipv6 makes the handling of special packets easier to implement, such as applications that use video or audio. Whereas Ipv4 uses a dotted decimal in 8 bit sections, Ipv6 uses a hexadecimal format in 16 bit sections. At first I was a bit confused over what this meant and looking at the address example further confused me. Then after further reading I discovered that each 16 bit section was ended with a colon. It was explained that there are three sections to the address they are public topology, a site topology, and an interface identifier. If I am right then the address giving in the book would break down like this: 2001:DB8:0:0:0:2ed3:340:ab The first 3 16 bit sections 2001:DB8:0: represent...
Words: 1749 - Pages: 7
...Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader is already somewhat familiar with IP addressing, the role of subnet masks, and the uses for subnetting. It proceeds quickly from a brief introduction to a thorough discussion of simple techniques for determining the number of subnets and hosts, calculating...
Words: 7956 - Pages: 32
...role of the classless interdomain routing (CIDR) standard in making efficient use of scarce IPv4 addresses? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary at the end of the book. classful IP addressing page 280 prefix aggregation page 285 network prefix page 286 contiguous page 294 discontiguous address assignment page 280 supernet page 280 private addressing page 281 high-order bits page 282 supernetting page 294 This is a prepublication draft of the manuscript. The final book will publish in December and will be available for purchase at http://www.ciscopress.com/title/9781587132063. raft Manuscript Draft Ma cript Draft Manuscript Dra Manuscript Draft Manuscri raft Manuscript Draft Ma uscript Draft Manuscript raft Manuscript Draft Ma script Draft Manuscript D ft Manuscript Draft Manu ript Draft Manuscript Dra Manuscript Draft Manuscri t Draft Manuscript Draft M nuscript Draft Manuscript 280 Routing Protocols and Concepts, CCNA Exploration Companion Guide Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address, limiting the Internet—then known as ARPANET—to 256 networks. Early on, it became obvious that this was not going to be enough address space. In...
Words: 10468 - Pages: 42
...UNIVERSITY SUBJECT: NETWORK AND COMMUNICATION Presentation Topic: Subnet Masking MBA IN E-GOVERNANCE - Programme III Prepared and Narrated by : KDU/MEG/03/11 – Theshantha Mukirigala Submission Date : 26 November 2015 Subnet Mask • An IP address has 2 parts: – The Network identification. – The Host identification. • Frequently, the Network & Host portions of the address need to be separately extracted. • In most cases, if you know the address class, it’s easy to separate the 2 portions. Subnet Mask (Cont.) • With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks. • Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Subnet Mask (Cont.) • The subnet masking process was developed to identify & extract the Network part of the address. • A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network. • If it is not, the process of routing it to an outside network begins. Subnet Mask (Cont.) • The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network. • It is applied to a message’s destination address to extract the network address. •...
Words: 770 - Pages: 4
...Running head: DETERMINING SUBNET CONFIGURATION Determining Subnet Configuration for Variety of Networks Alvin Miles AIU Online 09/20/2012 Determining Subnet Configuration for Variety of Networks In this final week IP assignment we are given some IP addresses and are ask several questions on anything from what is the broadcast address of this IP, what are the range of valid host IP addresses, to subnet ranges. Before we go too deep in trying to answer these questions I must first explain what classful routing protocol is as this will help explain some of my answers. In classful routing protocol all your networks will be using different classes and are separated only by a router (Lewis, 2011). Also classful routing protocol will only look at IP addresses and not the subnet mask. This is a problem as you can’t change the subnet mask in any of your network (Lewis, 2011). Most networks today use the classless routing protocol. This protocol supports VLSM and different sizes network within the same IP address class (Lewis, 2011). The first IP address we are given is 12.2.201.2, from this we are ask the question of what is the network address or network number? The network address would fall within the Class “A” and would give us 12.0.0.0. The second question asks us to find out what the broadcast address of the IP address 211.106.32.0 that has a subnet mask of 255.255.255.224. To get the broadcast address we will need to find out how many subnets and hosts that we have...
Words: 1211 - Pages: 5
...How to Calculate Subnets Subnets and Hosts Borrow 2 bits S S H H H H H H # of subnets = 22 = 4 Subnet mask = 2 bits = 128 + 64 = 192 Range of hosts = 26 = 64 TT Range Useable Range Network ID 0 – 63 64 – 127 65 - 126 128 – 191 129 - 190 Broadcast 192 – 255 Address Borrow 3 bits S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 Range of hosts = 25 = 32 Range 0 – 31 32 – 63 64 – 95 96 – 127 128 – 159 160 – 191 192 – 223 224 – 255 Useable Range 33 - 62 65 - 94 97 -126 129 -158 161 -190 193 -222 Network ID Broadcast Address ©1999 Dan Foss How to Calculate Subnets Decimal/Binary Subnet Ranges Borrow 2 bits S S H H H H H H # of subnets = 22 = 4 = 00000100 Subnet mask = 2 bits = 128 + 64 = 192 = 11000000 Range of hosts = 26 = 64 = 01000000 [Range ……………………………] [Useable Range …………………...] Network ID 0 – 63 00 000000 – 00 111111 64 – 127 01 000000 – 01 111111 65 - 126 01 000001 – 01 111110 128 – 191 10 000000 – 10 111111 129 – 190 10 000001 – 10 111110 Broadcast 192 – 255 11 000000 – 11 111111 Address Borrow 3 bits S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 = 11100000 Range of hosts = 25 = 32 = 00100000 [Range ……………………………] Network ID 0 – 31 000 00000 – 000 11111 32 – 63 001 00000 – 001 11111 64 – 95 010 00000 – 010 11111 96 – 127 011 00000 – 011 11111 128 – 159 100 00000 – 100 11111 160 – 191 101 00000 – 101 11111 192 – 223 110 00000 – 110 11111 Broadcast 224 – 255 111 00000 – 111 11111 Address...
Words: 942 - Pages: 4
...IP addresses: Networks and hosts (http://support.microsoft.com/kb/164015) An IP address is a 32-bit number that uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network. IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation. For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32 bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits. These eight bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers separated by periods are the octets converted from binary to decimal notation. For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks do not know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is...
Words: 884 - Pages: 4
...8 equal subnets using the following IP range: 205.32.16.0/24. They have offices in 5 different locations: 1. New York with 17 workstations 2. Chicago with 15 workstations 3. Los Angeles with 20 workstations 4. Phoenix with 11 workstations 5. Boston with 22 6th site anticipated. NOTE: There are only 6 locations, requiring 6 subnets of EQUAL size. This does NOT mean you will use the entire /24 block of addresses. In other words, there WILL be enough space for 2 more subnets (8 equal subnets total) but we WILL NOT allocate the remaining space to sites. Simply document the beginning and ending address of the unused space for the final 10 points of the project. Here is what we know: 205.32.16.0 /24 belongs to ACME 205.32.16.x = the CURRENT Network Portion (unusable address as it defines the network beginning) /24 means we have 256 total available addresses (explained below) 205.32.16.255 is the Broadcast IP Resulting a USABLE IP RANGE OF 205.32.16.1 – 205.32.16.254 (254 usable hosts) /24 defines our subnet and the total addresses we CAN use. Let’s understand subnets… SUBNETS – Define the addresses we can USE /24 means we are using 24 of the 32 possible bits in the subnet mask. This can be determined by this: 255.255.255.0 = 11111111.11111111.11111111.00000000 OR 8bits.8bits.8bits.0bits = 24 total bits out of 32 possible bits Each 1 in the subnet equals a bit and each octet is a field of potentially 8 bits Each placement of a bit indicates a numeric...
Words: 1080 - Pages: 5
...Unit 4 Labs [pic] Detailed Lab Step Answers: 38 Answers Step 3. | | |1 and 192.168.16.01/24 | | | | | Step 5. |Show IP route connected command/ see no connection routes | | | | | | | Step 6: |172.30.10.2 / has no IP address admin down | | | | ...
Words: 1716 - Pages: 7