yulia_zoNe

Biarkan hamparan keindahan terpancar dalam hatimu lewat nada innerbeauty yang selalu kamu pancarkan................

Lab 6.1.4 Using CIDR to Ensure Route Summarization

Step 1: Cable and configure the network
Referring to the topology diagram, connect the console (or rollover) cable to the console port on the router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port. Ensure that power has been applied to both the host computer and router.

Step 2: Perform basic router configurations
Establish a HyperTerminal, or other terminal emulation program, from PC1 to each of the three routers in turn and perform the following configuration functions:
Clear any existing configurations on the routers.
Configure the router hostname.
Disable DNS lookup.
Configure an EXEC mode password.
Configure a message-of-the-day banner.
Configure a password for console connections.
Configure a password for vty connections.

Step 3: Configure the interfaces on the three routers
Configure the interfaces on the three routers with the IP addresses from the table.
Save the running configuration to the NVRAM of the router.

Step 4: Configure the Ethernet interfaces
Configure the Ethernet interfaces of Hosts PC1, PC2, and PC3 with the IP addresses from the addressing
table provided under the topology diagram.

Step 5: Verify connectivity of routers
Verify that each router can ping each of the neighboring routers across the WAN links. You should not have connectivity between end devices yet. However, you can test connectivity between two routers and between an end device and its default gateway. Troubleshoot if connectivity is not achieved.

Step 6: Verify connectivity of Host PCs
Verify that PC1, PC2, and PC3 can ping their respective default gateways. Troubleshoot if connectivity is not achieved.

Step 7: Configure EIGRP routing on router R1
Consider the networks that need to be included in the EIGRP updates that are sent out by the R1 router.
What directly connected networks exist on R1?
_____________ 172.17.0.0
_____________ 172.18.0.0
_____________ 172.19.0.0
What commands are required to enable EGIRP and include the connected networks in the routing updates?
_____________ router eigrp 1
_____________ network 172.17.0.0
_____________ network 172.18.0.0
_____________ network 172.19.0.0
Are there any router interfaces that do not need to have EIGRP updates sent out? ____ Ya
If yes, which ones? ________ Fa0/0 and Fa0/1
What command is used to disable EIGRP updates on these interfaces?
passive-interface FastEthernet0/0 and passive-interface FastEthernet0/1

Step 8: Configure EIGRP on router R2
Consider the networks that need to be included in the EIGRP updates that are sent out by the R2 router.
What directly connected networks exist on R2?
_____________ 172.16.0.0
_____________ 172.17.0.0
______________ 172.20.0.0
What commands are required to enable EGIRP and include the connected networks in the routing updates?
______________ router eigrp 1
______________ network 172.16.0.0
______________ network 172.17.0.0
______________ network 172.20.0.0
Are there any router interfaces that do not need to have EIGRP updates sent out? ____ Ya
If yes, which ones? ______ Fa0/0 and Fa0/1
What command is used to disable EIGRP updates on these interfaces?
______________ passive-interface FastEthernet0/0

Step 9: Configure EIGRP routing on the R3 router
Consider the networks that need to be included in the EIGRP updates that are sent out by the R3 router.
What directly connected networks exist on R3?
______________ 172.20.0.0
______________ 10.1.0.0
What commands are required to enable EGIRP and include the connected networks in the routing updates?
______________ router eigrp 1
______________ network 172.20.0.0
______________ network 10.1.0.0
Are there any router interfaces that do not need to have EIGRP updates sent out? ___ Ya
If yes, which ones? ________ Fa0/0 and Fa0/1
What command is used to disable EIGRP updates on these interfaces?
_______________ passive-interface FastEthernet0/0

Step 10: Verify the configurations
Ping between devices to confirm that each router can reach each device on the network and that there is
connectivity between all the PCs. If any of the above pings failed, check your physical connections and configurations. Troubleshoot until connectivity is achieved.

Step 11: Display the EIGRP routing table for each router
Are there summary routes in any of the routing tables? ____ Ya, tetapi hanya untuk jaringan 10.1.0.0. Auto-summary EIGRP diaktifkan secara default dan merangkum subnetwork 10.1.0.0/16 ke jaringan 10.0.0.0 / 8 classful.
Are there any summary routes for the 172.x.0.0 networks? ____Tidak

Step 12: Remove automatic summarization
On each of the three routers, remove automatic summarization to force EIGRP to report all subnets. A sample command is given for R1.
R1(config)#router eigrp 1
R1(config-router)#no auto-summary

Step 13: Configure manual summarization on R2
On R2, configure manual summarization so that EIGRP summarizes the four networks 172.16.0.0/16,
172.17.0.0/16, 172.18.0.0/16, and 172.19.0.0/16 as one CIDR route, or 172.16.0.0/14.
You are summarizing multiple classful networks, which creates a supernet, and results in a classless (/14)
network address being advertised.
R2(config)#interface s0/0/1
R2(config-if)#ip summary-address eigrp 1 172.16.0.0 255.252.0.0

Step 14: Confirm that R2 is advertising a CIDR summary route
Examine the routing table of each router using the show ip route command.
R1#show ip route
Codes: C – connected, S – static, R – RIP, M – mobile, B – BGP
D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2
i – IS-IS, su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS level-2
ia – IS-IS inter area, * – candidate default, U – per-user static
route
o – ODR, P – periodic downloaded static route
Gateway of last resort is not set
C 172.17.0.0/16 is directly connected, Serial0/0/0
D 172.16.0.0/16 [90/2172416] via 172.17.0.2, 02:13:05, Serial0/0/0
C 172.19.0.0/16 is directly connected, Loopback0
C 172.18.0.0/16 is directly connected, FastEthernet0/0
D 172.20.0.0/16 [90/2681856] via 172.17.0.2, 02:05:21, Serial0/0/0
10.0.0.0/16 is subnetted, 1 subnets
D 10.1.0.0 [90/2684416] via 172.17.0.2, 00:04:25, Serial0/0/0
R2#show ip route
Codes: C – connected, S – static, R – RIP, M – mobile, B – BGP
D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2
i – IS-IS, su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS level-2
ia – IS-IS inter area, * – candidate default, U – per-user static
route
o – ODR, P – periodic downloaded static route
Gateway of last resort is not set
C 172.17.0.0/16 is directly connected, Serial0/0/0
C 172.16.0.0/16 is directly connected, FastEthernet0/0
D 172.19.0.0/16 [90/2172416] via 172.17.0.1, 02:14:37, Serial0/0/0
D 172.18.0.0/16 [90/2172416] via 172.17.0.1, 02:14:37, Serial0/0/0
C 172.20.0.0/16 is directly connected, Serial0/0/1
10.0.0.0/16 is subnetted, 1 subnets
D 10.1.0.0 [90/2172416] via 172.20.0.1, 00:05:57, Serial0/0/1
D 172.16.0.0/14 is a summary, 00:11:55, Null0
R3#show ip route
Codes: C – connected, S – static, R – RIP, M – mobile, B – BGP
D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2
i – IS-IS, su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS level-2
ia – IS-IS inter area, * – candidate default, U – per-user static
route
o – ODR, P – periodic downloaded static route
Gateway of last resort is not set
C 172.20.0.0/16 is directly connected, Serial0/0/1
10.0.0.0/16 is subnetted, 1 subnets
C 10.1.0.0 is directly connected, FastEthernet0/0
D 172.16.0.0/14 [90/2172416] via 172.20.0.2, 00:13:32, Serial0/0/1
Which router has a summarized route to the 172.x.0.0 networks in its routing table? __________ R3
D 172.16.0.0/14 [90/2172416] via 172.20.0.2, 00:13:32, Serial0/0/1

Step 15: Clean up
Erase the configurations and reload the routers. Disconnect and store the cabling. For PC hosts that are
normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
Reflection
In this lab, automatic summarization was used. Could route summarization still be applied if more effective use of the IPv4 address space had been made by using VLSM for those networks requiring fewer addresses, such as the serial links between routers?
 
 

Lab 6.2.1 Determining an IP Addressing Scheme

Step 1: Consider VLAN issues
The initial step in determining the required VLANs is to group users and services into VLANs. Each of these VLANs will represent an IP subnet.
A VLAN can be considered to be a group of switch ports assigned to a broadcast domain. Grouping the
switch ports confines broadcast traffic to specified hosts so that bandwidth is not unnecessarily consumed in unrelated VLANs. It is therefore a recommended best practice to assign only one IP network or subnetwork to each VLAN.
When determining how to group users and services, consider the following issues:
Flexibility
The employees and hardware of the former AnyCompany will move into the building with the FilmCompany in the near future. The network from this newly acquired company needs to be tightly integrated with the FilmCompany network and a structure put in place to enhance the security of the network.
To support this integration, with improvements in security and performance, additional VLANs need to be
created on the network. These VLANs will also allow the personnel to move to the buildings without additional network changes or interruption in network services.
Security
Security can be better enforced between VLANs than within VLANs.
  • Access control lists can be applied to the Distribution Layer router subinterfaces that interconnect the VLANs to enforce this security.
  • The interfaces on the switches can be assigned to VLANs as appropriate to support the network for the connected device.
  • Additional Layer 2 security measures can also be applied to these switch interfaces.
WANs and VPNs
The contract with StadiumCompany adds a number of new requirements. Some FilmCompany personnel will be located at the stadium. Additional personnel and contract workers will also be present at the stadium during live events. These employees will use laptops and the wireless LAN at the FilmCompany branch as well as the wireless LAN at the stadium. To provide network connectivity for these laptops, they will be in their own VLAN. At the stadium, the FilmCompany laptop users will connect to a secure wireless VLAN and use a VPN over the Frame Relay connection between stadium and the FilmCompany branch. With this connection, the laptop users can be attached to the internal FilmCompany network regardless of physical location. To support the video feeds, FilmCompany will need resources available at the stadium. Some of the servers providing these resources will be located at the stadium. Other servers will be located at the branch office of the FilmCompany. For security and performance reasons, these servers, regardless of location, will be on secured VLANs. A separate VPN over the Frame Relay link will be created to connect the servers at the stadium to the servers located at the FilmCompany office.
What are the advantages and disadvantages of using a VPN to extend the wireless and video server
networks over the Frame Relay connection from FilmCompany to the stadium?
Advantages:
Memperluas VLAN melalui VPN di WAN memiliki keuntungan dari keamanan tindakan yang dilakukan terhadap VLAN yang juga sedang diterapkan pada semua host di manapun lokasinya.
Disadvantages:
Kerugiannya adalah bahwa semua siaran VLAN juga melintasi bandwidth sempit pada WAN link, yang mungkin mempengaruhi throughput data
Redundancy
The VLAN structure will support load balancing and redundancy, which are major needs of this new network design. With such a large portion of the FilmCompany operations and revenues dependent on the network operation, a network failure could be devastating. The new VLAN arrangement allows the FC-ASW1 and FCASW2 switches to share the load of the traffic and be backups for each other.
This redundancy is accomplished by sharing the RSTP primary and secondary root duties for the traffic for the different VLANs:
  • FC-ASW1 will be the primary root for approximately one-half of the VLAN traffic (not necessarily one half of the VLANs) and FC-ASW2 will be the secondary root for these VLANs.
  • The remaining VLANs will have FC-ASW2 as the primary root and FC-ASW1 as the secondary root.
Step 2: Group network users and services
Examine the planned network topology. Applying the issues considered in Step 1, list all the possible groupings of users and services that may require separate VLANs and subnets.
_________ default VLAN for the Layer 2 devices
_________ voice VLAN to support Voice over IP
_________ VLAN for management hosts and secure peripherals (payroll printer)
_________ VLAN for administrative hosts
_________ VLAN for support hosts
_________ VLAN for high performance production workstations (stationary)
_________ VLAN for mobile production hosts
_________ VLAN for stadium to FilmCompany mobile access VPN
_________ VLAN for network support
_________ VLAN for peripherals for general use (printers, scanners)
_________ VLAN for servers to support video services and storage
_________ VLAN for stadium to FilmCompany video services VPN
_________ VLAN for servers that are publicly accessible
_________ VLAN for terminating unwanted or suspicious traffic
_________ VLAN for undefined future services
_________ Block of addresses are required for NAT pool for BR4
_________ DSL link to the ISP
_________ Addresses for the Frame Relay link to the stadium

Step 3: Tabulating the groupings
The new addressing design needs to be scalable to allow easy inclusion of future services, such as voice.
The current addressing scheme does not allow for managed growth. Correcting this scheme will mean that most devices will be placed on new VLANs and new subnets. In some cases, a device address may not be able to be changed; for example, some of the servers have software registered to their IP addresses. In such cases, the server VLAN will keep its current addressing even though it may not be consistent with the remaining addressing scheme. Other addresses that cannot be changed are the addresses used with the WAN links and the addresses for NAT pool used to access the Internet.
This table shows a possible grouping and addressing scheme. The number of hosts required for the FilmCompany branch office, including growth, has been determined. Assigning one subnet to each VLAN, the host count for each has been rounded up to the next logical network size supported by the binary patterns used in the subnet mask. Rounding up prevents underestimating the total number of host addresses required.

VLAN number
Network name
Nomor alamat host
Predetermined
Network Address
Deskripsi
1
default
14

Default VLAN for the Layer 2 devices
10
voice
254

Voice VLAN to support Voice over IP
20
management
14

Management hosts and secure peripherals (payroll printer)
30
administrative
62

Administrative hosts
40
support
126

Support hosts
50
production
126

High performance production workstations (stationary)
60
mobile
62

Mobile production hosts
70
net_admin
14

Network support
80
servers
65534
172.17.0.0 /16
Servers to support video services
and storage
90
peripherals
62

Peripherals for general use (printers,scanners)
100
web_access
14

VLAN for servers that are publicly
accessible
120
future
126

VLAN for future services
999
null
126

VLAN for terminating unwanted or
suspicious traffic
NA
NAT_pool
6
209.165.200.224/29
Addresses for NAT pool for BR4 or
interface to ISP4
NA
DSL_Link
2
192.0.2.40 /30
DSL link to the ISP
NA
Frame_Link
2
172.18.0.16/30
Address of the FR link to the
stadium

Step 4: Determine the total number of hosts to be addressed
To determine the block of addresses to be used, count the number of hosts. To calculate the addresses,
count only the hosts that will receive addresses from the new block. Use the information in the table in Step 3 to complete this chart to calculate the total number of hosts in the new FilmCompany network requiring addresses.

Reflection / Challenge
This lab provided a step-by-step process for determining an addressing scheme for a corporate network.
Discuss and consider the issues that would arise if this planning process was not methodically used.
 
 
 

Lab 6.2.2 Determining the Number of IP Networks

Task 1: Review Address Block Size
Review and record the total number of hosts to be addressed.
Complete this table with the information determined in Lab 6.2.1.
Network/VLAN Name
#Number of host addresses
Default
14
Voice
254
Management
14
Administrative
62
Support
126
Production
126
Mobile
62
Peripherals
62
Net_admin
14
Web_access
14
Future
126
Null
126
Total
1000
What is the smallest address block size that can potentially satisfy the FilmCompany network needs? __ 1024
Task 2: Choose or Obtain an Address Block

Step 1: Choose public or private addresses?
A block of addresses needs to be acquired to support the addressing scheme. This block of addresses could be private space addresses or public addresses. In most cases, the network users require only outbound connections to the Internet. Only a few hosts, such as web servers, require public addresses. These often exist on the local LAN with private addresses and have static NAT entries on the border router to translate to public addresses. Public address, however, are expensive and often difficult to justify. Can you make a justification of the use public addresses in this network? ___ Tidak
If so, write this justification to forward to the ISP:

Step 2: Ensure that the private space addresses do not conflict
Although you are allowed to use private space addresses any way you choose, you must make sure that the addresses used do not conflict with another private space address to which this network will be connected. You must identify other networks to which you are connected and make sure that you are not using the same private addresses. In this case, you need to examine the addresses used by the StadiumCompany.
What address private space block does the StadiumCompany use?
_________172.18.0.0 /16
What address blocks are used by the WAN links?
_________172.18.0.16/30
_________192.0.2.40 /30
Are there other devices or connections that need to be excluded from use? ___ Ya
What types? _________ servers
What address block? ________172.17.0.0 /16

Step 3: Ensure that the private space addresses are consistent with policy
The company should have a network policy and method of allocating addresses. This is true even when using private addresses. You should contact the FilmCompany network administrators to request a block of addresses. In this case, ask your instructor if there is a preferred set of addresses to use.
Did your instructor assign a block of addresses?
If so, what block?
If your instructor does not assign addresses, you may choose any private space block that does not conflict.
What block of addresses are you using for this FilmCompany Branch? ________192.168.0.0 /22


Task 3: Allocate Addresses for the Network
When assigning addresses to the different networks, start the assignments with the subnet that requires the largest address block and progress to the network that requires the smallest.

Step 1: Order the networks from largest to smallest
Using the information from Lab 6.2.1, list the networks in order of size, from the network that requires the
largest address block to the network that requires the smallest block.
Network/VLAN Name
Number of host addresses
Voice
254
support
126
production
126
Future
126
Null
126
administrative
62
Mobile
62
peripherals
62
Web_access
14
Default
14
management
14
Net_admin
14

Step 2: Assign address blocks to the networks
From the address block chosen in the previous task, begin calculating and assigning the address blocks to these networks. You should use contiguous blocks of addresses when making these assignments.
Network/VLAN Name
Number of host addresses
Network address
Voice
254
192.168.0.0 /24
support
126
192.168.1.0 /25
production
126
192.168.1.128 /25
Future
126
192.168.2.0 /25
Null
126
192.168.2.128 /25
administrative
62
192.168.3.0 /26
Mobile
62
192.168.3.64 /26
Peripherals
62
192.168.3.128 /26
web_access
14
192.168.3.192 /28
Default
14
192.168.3.208 /28
management
14
192.168.3.224 /28
net_admin
14
192.168.3.240 /28

Step 3: Complete the address planning table
Using the addresses you calculated in the previous step, complete this table from Lab 6.2.1. This plan will be used in future labs.

VLAN #
Network/VLAN Name
Number of host addresses

Network Address
Description
1
default
14
192.168.3.208 /28
Default VLAN for the Layer 2 devices
10
voice
254
192.168.0.0 /24
Voice VLAN to support Voice over IP
20
management
14
192.168.3.224 /28
Management hosts and secure
peripherals (payroll printer)
30
administrative
62
192.168.3.0 /26
Administrative hosts
40
support
126
192.168.1.0 /25
Support hosts
50
production
126
192.168.1.128 /25
High performance production
workstations (stationary)
60
mobile
62
192.168.3.64 /26
Mobile production hosts.
70
net_admin
14
192.168.3.240 /28
Network support
80
servers
65534
172.17.0.0 /16
Servers to support video services and storage.
90
peripherals
62
192.168.3.128 /26
Peripherals for general use (printers, scanners)
100
web_access
14
192.168.3.192 /28
VLAN for server that are publicly
accessible
120
future
126
192.168.2.0 /25
VLAN for future services
999
null
126
192.168.2.128 /25
VLAN for terminating unwanted or
suspicious traffic
NA
NAT_pool
6
209.165.200.224/29
Addresses for NAT pool for BR4 or interface to ISP4
NA
DSL_Link
2
192.0.2.40 /30
DSL link to the ISP
NA
Frame_link
2
172.18.0.16/30
Address of the FR link to the stadium

Reflection / Challenge
This lab specifically used private IPv4 addresses. Discuss the issues to be considered if it was decided to use public IP addresses throughout the network. Are there any situations that would require this?
Alamat IP versi 4 (sering disebut dengan Alamat IPv4) adalah sebuah jenis pengalamatan jaringan yang digunakan di dalam protokol jaringan TCP/IP yang menggunakan protokol IP versi 4. Panjang totalnya adalah 32-bit, dan secara teoritis dapat mengalamati hingga 4 miliar host komputer atau lebih tepatnya 4.294.967.296 host di seluruh dunia, jumlah host tersebut didapatkan dari 256 (didapatkan dari 8 bit) dipangkat 4(karena terdapat 4 oktet) sehingga nilai maksimal dari alamt IP versi 4 tersebut adalah 255.255.255.255 dimana nilai dihitung dari nol sehingga nilai nilai host yang dapat ditampung adalah 256x256x256x256=4.294.967.296 host. Alamat publik adalah alamat-alamat yang telah ditetapkan oleh InterNIC dan berisi beberapa buah network identifier yang telah dijamin unik (artinya, tidak ada dua host yang menggunakan alamat yang sama) jika intranet tersebut telah terhubung ke Internet. Ketika beberapa alamat publik telah ditetapkan, maka beberapa rute dapat diprogram ke dalam sebuah router sehingga lalu lintas data yang menuju alamat publik tersebut dapat mencapai lokasinya.
 
 

 

Lab 6.2.5 Creating an Address Allocation Spreadsheet

Step 1: Record the network address block
In the first column, record the address block used for the entire FilmCompany network chosen in the previous lab.

Step 2: Define the 254-host networks
Based on the requirements for the FilmCompany network, the address block is divided into twelve separate networks using four different masks.
In the second column of the table above, record the network blocks that will support 254 hosts per
network. In the last column, record the names of the networks that need to be assigned to these blocks.
The CIDR notation mask for the 254-host network is /24. What is the dotted decimal equivalent mask? _____ 255.255.255.0

Step 3: Define the 126-host networks
In the third column of the table above, choose the first unused 254 host address block to subdivide
into 126-host networks. In the last column, record the names of the networks assigned to these 126-host blocks.
The CIDR notation mask for the 126-host network is /25. What is the dotted decimal equivalent mask?
_____ 255.255.255.128

Step 4: Define the 62-host networks
In the fourth column of the table above, choose the first unused 126-host address block to subdivide
into 62-host networks.
In the last column, record the names of the networks assigned to these 62-host blocks.
The CIDR notation mask for the 62-host network is /26. What is the dotted decimal equivalent mask?
_____ 255.255.255.192

Step 5: Define the 14-host networks
In the fifth column of the table above, choose the first unused 62-host address block to subdivide into
14-host networks. In the last column, record the names of the networks assigned to these 14-host blocks.
The CIDR notation mask for the 14-host network is /28. What is the dotted decimal equivalent mask?
_____ 255.255.255.240


Task 2: Define the Host Address Assignments
For each network, determine and document the host addresses and broadcast addresses. Use the table
below to document these networks and host information.

Step 1: Record the network names and addresses in the addressing table
In the table below, record the network names for the FilmCompany in the first column and the corresponding network address in the second column.

Step 2: Calculate the lowest host address in the addressing table
The lowest address for a network is one greater than the address of the network. Therefore, to calculate the lowest host address, add a 1 to the network address. For each of these networks, calculate and record the lowest host address in the second column of the table.

Step 3: Calculate the broadcast address in the addressing table
The broadcast address uses the highest address in the network range. This is the address in which the bits in the host portion are all 1s. To calculate the broadcast for each of the networks listed, convert the last octet of the network address into binary. Then fill the remaining host bits with 1s. Finally, convert the binary back to decimal. For each of these networks, calculate and record the broadcast address in the last column.

Step 4: Calculate the highest host address in the addressing table
The highest address for each address is the network address is one less than the broadcast address for that network. Therefore, to calculate the highest host address, subtract a 1 from the broadcast address. For each of these networks, calculate and record the highest host address in the second column.
Network Names
Network Address
Lowest Host
Address
Highest Host
Address
Broadcast Address
voice
192.168.0.0 /24
192.168.0.1
192.168.1.254
192.168.1.255
support
192.168.1.0 /25
192.168.1.1
192.168.1.126
192.168.1.127
production
192.168.1.128 /25
192.168.1.129
192.168.1.254
192.168.1.255
future
192.168.2.0 /25
192.168.2.1
192.168.2.126
192.168.2.127
null
192.168.2.128 /25
192.168.2.129
192.168.2.254
192.168.2.255
administrative
192.168.3.0 /26
192.168.3.1
192.168.3.62
192.168.3.63
mobile
192.168.3.64 /26
192.168.3.65
192.168.3.126
192.168.3.127
peripherals
192.168.3.128 /26
192.168.3.129
192.168.3.190
192.168.3.191
Web_access
192.168.3.192 /28
192.168.3.193
192.168.3.206
192.168.3.207
default
192.168.3.208 /28
192.168.3.209
192.168.3.222
192.168.3.223
management
192.168.3.224 /28
192.168.3.225
192.168.3.238
192.168.3.239
net_admin
192.168.3.240 /28
192.168.3.241
192.168.3.254
192.168.3.255

Task 3: Examine Address Blocks for Overlapping Addresses
One of the major issues of planning network addresses is overlapping addresses. This is especially true when using VLSM addressing. Examine the table in the previous step to ensure that each network has a unique address range.
Are there any overlapping addresses in the networks? ___ Tidak
If there are any overlapping addresses, recalculate the addressing plan for the FilmCompany network.
 

Lab 6.2.6 Diagramming the Network

Step 1: Identify the appropriate VLAN
In the previous labs, you identified VLANs and subnets to be used in the FilmCompany network expansion. For each device listed in the table in the final section of this lab, assign each host the appropriate VLAN based on its description. Record these VLAN assignments in the third column of the table in Step 5.

Step 2: Assign addresses to the devices
In the previous lab, an address range was established for each subnet and VLAN. Using these established ranges and the VLAN assignments to the devices in the previous step, assign a host address to each of the selected hosts. Record this information in the last column of the table in Step 5 of this lab.

Step 3: Define the codes for device naming
From the device information, develop and apply a naming convention for the hosts.
A good naming scheme follows these guidelines:
  • Keep the names as short as possible; using fewer than twelve characters is recommended.
  • Indicate the device type, purpose, and location with codes, rather than words or abbreviations.
  • Maintain a consistent scheme. Consistent naming makes it easier to sort and report on the devices, and to set up management systems.
  • Document the names in the IT department files and on the network topology diagrams.
  • Avoid names that make it easy to find protected resources.
For each naming criteria, assign a code for type. You will use these codes in different combinations to create device names. In the tables below, create codes for the elements of the device names. Use as many or as few codes as needed.
Device Type
Type code
Device Purpose
Purpose code
Device Location
Location code
Laptop
LT
Management
MGMT
Stadium
STAD
Desktop PC
PC
Production
PROD
1st Floor
1FLR
Workstation
WS
Netadmin
NETA
3rd Floor
3FLR
Printer
PT


ServerRoom
SVRM
Scanner
SC




Server
SV





Step 4: Establish the naming convention
In the spaces below, indicate the order and the number of letters to be used in the device naming. Again, use as many or as few letters as necessary. List the criteria in the blanks and draw a line to indicate the number of letters used. You may also choose to use hyphens (-) or underscores (_) to separate fields.

Step 5: Apply a naming convention
For each of the twelve devices shown in this table, apply the naming convention. Then add these device
names in the appropriate boxes in the topology at the beginning of the lab.
Number
Device Name
VLAN
Description
IP Address
1

servers
Server for capturing raw video feeds from stadium

2

servers
Server for storing finished (post
production) video

3

web_access
Public web server for on demand video access

4

management
Branch manager’s computer

5

production
Live event production worker (switched)

6

support
Human resource clerk

7

support
Payroll Manager

8

mobile
Live event mobile worker (audio producer)

9

mobile
Live event mobile worker (camera coordinator)

10

support
Receptionist’s computer

11

management
Financial Manager’s computer

12

net_admin
Information Technology manager’s computer

 

 

 

 

 

0 komentar:

Posting Komentar

>

About this blog

smile......
n
welcome......

my picture

my picture

You can replace this text by going to "Layout" and then "Page Elements" section. Edit " About "

widget

Powered By Blogger
Diberdayakan oleh Blogger.

Popular Posts

Followers

About Me