Premium Essay

Packet Tracer

In:

Submitted By amanpsingh
Words 493
Pages 2
------------------------------------------------- Name: Amanpreet Singh
Date: 05/31/2015
Week# 4
-------------------------------------------------
Activity# 6.6.1.2 – Skills Integration Challenge
-------------------------------------------------

Activity Report 1. Write a short paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, what challenges you faced.
-------------------------------------------------
This week’s packet tracer was arguably difficult but at the same time, they were very informative and educational. I had to refer to the book several times to learn the commands for configuration. In the end, it was a long packet tracer but it surely helped and I am glad I learned from it.
-------------------------------------------------

Packet Tracer – Skills Integration Challenge
Addressing Table Device | Interface | IP Address | Subnet Mask | Default Gateway | VLAN | R1 | S0/0/0 | 172.31.1.2 | 255.255.255.0 | N/A | N/A | | G0/0.10 | 172.31.10.1 | 255.255.255.0 | N/A | 10 | | G0/0.20 | 172.31.20.1 | 255.255.255.0 | N/A | 20 | | G0/0.30 | 172.31.30.1 | 255.255.255.0 | N/A | 30 | | G0/0.88 | 172.31.88.1 | 255.255.255.0 | N/A | 88 | | G0/0.99 | 172.31.99.1 | 255.255.255.0 | N/A | 99 | S1 | VLAN 88 | 172.31.88.33 | 255.255.255.0 | 172.31.88.1 | 88 | PC-A | NIC | 172.31.10.21 | 255.255.255.0 | 172.31.10.1 | 10 | PC-B | NIC | 172.31.20.22 | 255.255.255.0 | 172.31.20.1 | 20 | PC-C | NIC | 172.31.30.23 | 255.255.255.0 | 172.31.30.1 | 30 | PC-D | NIC | 172.31.88.24 | 255.255.255.0 | 172.31.88.1 | 88 |
VLAN Table VLAN | Name | Interfaces | 10 | Sales | F0/11-15 | 20 | Production | F0/16-20 | 30 | Marketing | F0/5-10 | 88 | Management | F0/21-24 | 99 | Native | G0/1 |
Scenario
In this activity, you will demonstrate

Similar Documents

Premium Essay

Packet Tracer

...Packet T P Tracer - Connec a Router to a LAN ct Topology T Addressing Table A g Device Interface G0 0/0 R1 R G0 0/1 S0 0/0/0 (DCE) G0 0/0 R2 R G0 0/1 S0 0/0/0 PC1 P PC2 P PC3 P PC4 P NIC NIC NIC NIC IP Addr ress 192.168.10 0.1 192.168.11 1.1 209.165.20 00.225 10.1.1.1 10.1.2.1 209.165.20 00.226 192.168.10 0.10 192.168.11 1.10 10.1.1.10 10.1.2.10 Subnet Mask S 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 Default G Gateway N/A N/A N/A N/A N/A N/A 192.168.10.1 192.168.11.1 10.1.1.1 10.1.2.1 Objectives O Part 1: Di isplay Route Information er Part 2: Co onfigure Rou uter Interface es Part 3: Ve erify the Con nfiguration © 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Public. d/or ed. ent Page 1 of 5 Packet Tracer - Connect a Router to a LAN Background In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations. Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands. Part 1: Display Router Information Step 1: Display interface information on R1. Note: Click a device and then click the CLI tab to access the...

Words: 1346 - Pages: 6

Free Essay

Implementación de Redes En Packet Tracer

...presentación 7 4.2.1.6. Nivel de sesión 7 4.2.1.7. Nivel de transporte 8 4.2.2. Experiencia 2 10 4.2.2.1. Router: 10 4.2.2.2. Switch 11 4.2.2.3. Hub y Repeater 12 4.2.2.4. Access Point 12 4.2.3. Experiencia 3 13 4.2.4. Experiencia 4 17 4.2.4.1. Red 1 17 4.2.4.2. Red 2 18 5. CONCLUSIÓN 20 6. REFERENCIAS 21 1. RESUMEN EJECUTIVO Se da a conocer la forma de implementación de redes virtuales en Packet Tracer, especificando características de los modelos y funcionalidades de cada dispositivo que en la plataforma se puede utilizar para montar redes. Posteriormente se presenta el Modelo OSI, donde se describe las funciones claras y específicas, de cada una de las capas existentes en el modelo, la capa de aplicación, presentación, sesión, red, enlace de datos y físico. Para facilitar la comprensión de la información entregada, se muestran algunas imágenes, clarificando los conceptos y para indicar el orden de trasporte de datos del mismo. A los conocimientos adquiridos del modelo OSI y la plataforma virtual Packet Tracer, se sumará un análisis y descripción detenido y...

Words: 3576 - Pages: 15

Free Essay

Nt2580 Lab 2.2

... Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.5, timeout is 2 seconds: .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 0/0/2 ms PC>ping 192.168.1.5 Pinging 192.168.1.5 with 32 bytes of data: Reply from 192.168.1.5: bytes=32 time=1ms TTL=128 Reply from 192.168.1.5: bytes=32 time=0ms TTL=128 Reply from 192.168.1.5: bytes=32 time=0ms TTL=128 Reply from 192.168.1.5: bytes=32 time=0ms TTL=128 Ping statistics for 192.168.1.5: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 1ms, Average = 0ms Packet Tracer PC Command Line 1.0 PC>ping 192.168.1.4 Pinging 192.168.1.4 with 32 bytes of data: Reply from 192.168.1.4: bytes=32 time=1ms TTL=128 Reply from 192.168.1.4: bytes=32 time=0ms TTL=128 Reply from 192.168.1.4: bytes=32 time=0ms TTL=128 Reply from 192.168.1.4: bytes=32 time=0ms TTL=128 Ping statistics for 192.168.1.4: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 1ms, Average =...

Words: 277 - Pages: 2

Free Essay

Implementing Firewall Configurations

...configure, maintain and monitor rules for multiple profiles, notifications and authenticated exceptions and he would also like me to be able to create and manage inbound and outbound rules and with windows firewall I can accomplish both of these task because Windows Firewall with Advanced Security works by examining the source and destination addresses, source and destination ports, and protocol numbers of a packet, and then comparing them to the rules that are defined by the administrator. When a rule matches a network packet then the action specified in the rule (to allow or block the packet) is taken. Windows Firewall with Advanced Security also lets you allow or block network packets based on whether they are protected by IPsec authentication or encryption. Then I could also have capabilities of Data encryption and connection security rules with Windows Firewall Data protection includes both data integrity and data encryption. Data integrity uses message hashes to ensure that information is not being changed while in transit. Hash message authentication codes (HMAC) sign packets to verify that the information received is exactly the same as the information sent. This is called integrity and it is critical when data is exchanged over unsecured...

Words: 344 - Pages: 2

Free Essay

Sec 402 Wk 8 Assignment 2 Implementing Network

...SEC 402 WK 8 ASSIGNMENT 2 IMPLEMENTING NETWORK To purchase this visit here: http://www.activitymode.com/product/sec-402-wk-8-assignment-2-implementing-network/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 402 WK 8 ASSIGNMENT 2 IMPLEMENTING NETWORK SEC 402 WK 8 Assignment 2 - Implementing Network and Personnel Security Measures Write a four to five (4-5) page paper in which you: 1. Create an information flow diagram, using Visio or Dia, which: a. Illustrates how remote users will securely connect to the government agency’s network. b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to server. Note: The graphically depicted solution is not included in the required page length. 2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list: a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items. b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment. 3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you: a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan...

Words: 832 - Pages: 4

Premium Essay

Term Paper: Ripe

...Game.............2 Logging Packets...............3 Sending Packets...............3-4 Dynamic Packets..............5 Packet Blocking...............6 Packet Modification........6 Opcode Labeling..............7 Introduction to RiPEST...7 RiPEST Database.............8 Further Reading................8 1 RiPE Injecting RiPE: If you are using RiPE Launcher: Select the game or process that you want to inject into, and then click the "Inject" button. RiPE Launcher comes with RiPE. Make sure that RiPE Launcher is in the same folder / directory as RiPE.dll. If you are using Injector Gadget: Select the game or process that you want to inject into from the left. Add RiPE.dll to the DLLs to Inject list by browsing for it or dragging the .dll and dropping it into the DLLs to Inject box. After that is done, click the "Inject" button. Do NOT check "Cloak DLL." RiPE uses its own cloaking methods. Selecting a Game: After injecting, you should now see a "Game Selection" dialog. Select the game that you want to use RiPE for from the left, and the version from the right. Click on "Continue." You may additionally "Search for a Plugin" to search the RiPEST plugin database for other plugins. Plugins appear on the Game Selection menu just like any other game. 2 RiPE Logging Packets: To log packets, simply click "Hook Send" or "Hook Recv." Hook Send will log packets sent FROM the client TO the server. Hook Recv will log packets sent FROM the server TO...

Words: 1937 - Pages: 8

Premium Essay

Nt1310 Unit 3 Assignment 3

...Wireshark Wireshark, a network analysis tool formerly known as Ethereal, collects packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and numerous other features that allows deep analysis of network traffic and scrutinizes specific packets. It is used for networking troubleshooting, Malware analysis and education purposes. NMAP Nmap ("Network Mapper") is a Free Security Scanner for Network Exploration and Hacking. It is utilised to scan a network and collects data about the target network. It reports on open ports, Services running in the host, OS information and packet filters and firewall information. John the Ripper John the Ripper (JTR) is free and fast password cracker. Its main purpose is to detect susceptible UNIX passwords. It is one of the most widespread password...

Words: 541 - Pages: 3

Premium Essay

Nt1310 Unit 1 Case Study

...oversubscribed port occurs, some of the packets must end up being dropped. Those client packets are being dropped will experience a slow-down in their file transfers or in the responsiveness of the network-based applications they are running. Overall network performance congestion could cause even though by subscribed high bandwidth ISP to internet access but hardware cannot utilizes the bandwidth ISP provide. b. Corruption If packets is corrupted by faulty cabling, electrical interference, or switch hardware faults then the corrupted packets will be dropped by the receiving switch. If corrupt packets at high rate it will cause a slow-down in network performance. Because servers/hosts require to resend the dropped packets again to the clients. If this issues did not fix it will cause the network traffic busy because the same data is resend again. It will occupied the network bandwidth cause another client on the network experience slow network. c. Collisions...

Words: 978 - Pages: 4

Free Essay

Foss

...for a change in the way data is delivered. Currently it’s by one packet of information (data) at a time. After some research I have learned there are a number of ways people are trying to change this method of data delivery. Some of them are: • Packets • Capsules • Holograms and Lasers • Teleportation I will give a brief explanation of each one and include the advantages and disadvantages. The current technology uses packets which are small files of information wrapped by a header and footer with security information on the both sides. These are the destination the packets are being sent to and the source that the packets are coming from. The advantages are: Packets are very secure because they can use encryption. Key exchange algorithms are used to securely exchange a shared secret value between two computers over an unsecured network connection. The computers exchange information that, when processed by the algorithm, produces the shared secret value. A third computer listening on the network and intercepting network packets between the first two computers cannot determine the shared secret value. The shared secret value can then be used as a session key, or to generate a session key, to encrypt the rest of the communications used in the IPsec negotiations. (Technet) • Small enough to send quickly The disadvantages are: • high learning curve • only sent one packet at a time Bottom line with packets it is like downloading a two-hour movie in 3 hours with a Fast-Ethernet...

Words: 1069 - Pages: 5

Premium Essay

Abc: Foodles Finance of Foodles

...Cost of yoodles is Rs. 10. 2. Sales Pattern in two halfs of 2011 is in the ratio 45:55. 3. The Duzy Pasar Retail Chain is available in 77 cities Working: | Demeter | Category | Total sales Ytd. 2011(Rs.) | 15381861.56 | 314249823.08 | Projected Yearly sales FY 2011(Rs.) | 34147733 | 697634607 | Target Market share | 15% | - | New Projected Sales FY 2011 | 104645191 | - | Incremental Sale | 69995007 | | Total Cost of BTL | 109152928 | - | ROI | 64% | - | Calculation of the cost: The following are the various costs for the BTL activities: Sample explanation: 1. Wet Sampling: 1 packet will serve 5 customers No. of customers per day: 40 (metros)+ 30(B & C Class cities) No. of packets per day per hyper per metro: 8+5.2=13.2 Total no. of packets: 8*15 (metros)+ 5.2* (77-15)= 442 Cost per day: 442* 7(unit cost of a packet)= 3097 per month Total cost for the next six month (2nd half-year): Rs. 557424 Similar calculations are done for other BTL Strategies. Analysis of the data provided: 1. For yoodles, in terms of cities. , the highest growth in sales nos.is in Mini metros & town class (‘C’ & ’D’ Class cities). 2. Also, the growth is highest for Modern Stores- Urban. 3. Region wise: * In Ytd. 2010, South & East did decently whereas North & west had extremely poor sales. * In Ytd. 2011, North & West picked up in sales. But Still we have highlighted North & West to strengthen its Market...

Words: 283 - Pages: 2

Free Essay

Term Paper

...Expectations from students: The aim of this Term Paper is to produce a Programming logic or Animation on the assigned Topic. The assignment is to read the existing system/problem and create a program of your concept to obtain the expected results. Assistance from text and reference books, articles and reports on the concerned topics from Internet can be taken but the animation logic should be your own piece of work. Along with, students are supposed to write an abstract of the topic with example, real world applications, and impact on society or solutions recommended. Abstract submission: (3-4 pages) • Description of the topic • Example of the given topic • Future plan of the given work. The Abstract (Synopsis) of the topic must be submitted latest by 15thof Sept and submission will be accepted thereafter. Final submission: a) A report containing following contents: 1. Introduction Provide a brief textual description of the problem. Elaborate on the given problem statement, providing some more detail. 2. Background a. What was the weakness in the previous algorithm/concepts and requirement of existing algorithm/concept? 3. Methodology : a. Steps of making the program (graphics be used to showcase the output) 4. Observation a. Result in the form of output and a well formatted report. 5. Future Scope and Suggestion --- Suggestion to improve the existing...

Words: 835 - Pages: 4

Free Essay

Tech Support

...William Kollie IS3120: Convergence of IP Based Network MR. McMiller July 20 2014 The dial up connection is made from a computer through modem and telephone line to the ISP's computer. The computer uses data in digital form. It means that it the computer can transmit data in 1's and 0's on and off also called digital or binary form. On other hand, telephone lines transmit data in analog form. It means that they transmit data by sound. the telephone line from your house is joined to a special terminal that sends the data received from their computers in form of audio signals from to enter the Public Switched Telephone Network PSTN. From PSTN, it is routed to the person or ISP that the modem is calling through the internet. Dial-up connection face connectivity problem which the user has to deal with. Dial up connection is unstable, dialup demand phone line connection which block incoming calls access, the chief disadvantage of dialup Internet, as compared with broadband Internet, is its slowness. Access to modern broadband networks is essential in the information age, said FCC Chairman Tom Wheeler. Yet 15 million Americans live in areas where they can’t get wireline broadband no matter how much they want it. These funds will jump-start broadband access in areas that would otherwise be bypassed by the digital economy. At least 100 million U.S. homes should have affordable access to actual download speeds of at least 100 megabits per second and actual upload speeds...

Words: 687 - Pages: 3

Premium Essay

It321 Unit 1

... Step 11- 192.168.1.97 Step 12- No Step 13- None Step 14- No it could not ping default gateway, 192.168.1.15 Step 15- No Step 18- R1, R2, and R3 are connected, because it use PPP Step 19- Fa0/0 192.168.1.65 255.255.255.224 Step 21- Yes Step 22- 192.168.1.49, 192.168.1.98, 192.168.1.33, 192.168.1.78; R1 forward the packet to R3 which send it to R2 which sends it to PC2 Step 24- 192.168.1.98 R3 S0/0/0 Step 26- 192.168.1.34 belongs to R3 S0/0/1; 192.168.1.17 belongs to R1 S0/0/0 Step 27- Yes, Serial interface S0/0/1 Step 28- Yes, passive interface S0/0/1 Lab 7 Step 2- R2 Fa0/0 192.168.2.254, PC2 192.168.2.2 Step 3- 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24, 192.168.12.0/24, 192.168.13.0/24, and 192.168.23.0/24 Step 4- Yes, All route exist on table Step 5- R3 S0/0/0 192.168.13.3, R1 S0/0/1 192.168.13.1 Step 6- Goes to R3 then back to R1 Step 8- 192.168.2.0/24 via 192.168.13.3 Step 9- there is no route to 192.168.2.0/24 Step 10- use static default 0.0.0.0 S0/0/0 Step 11- R1 use a static route to 192.168.2.0 that send the packet to R3 and R3 use default to send it back to R1 Step 12- No Step 13- No, from R1 to R2 Step 14- ip route 192.168.2.0 255.255.255.0 192.168.13.3 Step 15- Use command “configure terminal” then command “no ip route” 192.168.2.0 255.255.255.0 192.168.13.3 Step 16- It will take 192.168.12.2 Step 17- Takes route 192.168.12.2 Step...

Words: 610 - Pages: 3

Free Essay

Nt1210 Lab 6. 1-4

...Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. It has a very very short range and is unable to penetrate walls and other objects. 3. It is able to maintain connection anywhere in the house it is setup in without the need of trailing a connection cable like wired connections so you get a tradeoff of speed vs versatility Lab 6.2 Review 1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on. 2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting Lab 6.3 Review 1. Um well I could write a book but simply a guest having access to your network could result in any imaginable results on your network to name a few rootkits,Trojan droppers, Remote Access Terminals, Keyloggers, Viruse’s. 2. Setting a MAC filter is a good way to filter who has access to your network its simply like saying Fred has access to the building with his fingerprint being scanned by a biometric scanner. Although this can be spoofed by spoofing your mac but you would still have to find out which macs are allowed and have to make sure the mac your spoofing is not connected so that you do not receive a duplicate error. Lab Review 6...

Words: 393 - Pages: 2

Premium Essay

Unit5

...something like a spoken language that uses electricity. A header and/or trailer as a place to store a message that needs to flow through the network with the user data. Leased line creates the equivalent of a cable directly between two remote sites. T Internet Protocol (IP), list the rules so that the network can forward data from end to end through the entire TCP/IP network. IP address identifies that device in a TCP/IP network. Remember, computer networks, including TCP/IP networks, need to deliver bits from one device to another. IP routing defines exactly how routers makes their choices of how to forward data in a TCP/IP network. : frame and packet. The term frame specifically refers to encapsulated data that includes the data-link header and trailer, plus everything in between—including the IP header. The term packet refers to what sits between the data-link header and trailer, but not including the data-link header and...

Words: 257 - Pages: 2