The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 305 Weeks Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
i need help with this from you please
i will be adding tip
CMIT 350 WAN and SOHO Skills Implementation
Â
Course: CMIT 350 Interconnecting Cisco Devices (Part 2)
Professor: Rodolfo Solis
Created by: Chris Reagan
Date: 6/23/16
           I.       Worchester Subnetting Configurations and Boston Site Protocol, Route Summarization, and Topology Improvements
         II.       Bibliography
Â
Â
Subnetting Configurations:
Â
Currently, there are a total of four different VLAN’s made up for Faculty, Administrative, Instructional, and Server sites. The Worchester site has a total of 288 devices and there will be a need for growth in the future. The network has already been allocated the 10.20.0.0/16 IP’s which consists of 65,534 hosts in total. To break this down in a really easy way I’ve chosen to subnet the 10.20.0.0/16 network into /24 subnets which will accommodate the largest VLAN, which has 215 hosts. Also, the VLAN’s that only have a few hosts right now this configuration will allow for expansion when the time comes in the future.
Â
|
Net ID |
Usable Range |
Subnet Mask |
CIDR Value |
Broadcast |
|
10.20.0.0 – Faculty VLAN |
10.20.0.1-10.20.0.254 |
255.255.255.0 |
     /24             |
10.20.0.255 |
|
10.20.1.0 – Administrative VLAN |
10.20.1.1-10.20.1.254 |
255.255.255.0 |
     /24             |
10.20.1.255 |
|
10.20.2.0 – Instructional VLAN |
10.20.2.1-Â Â 10.20.2.254 |
255.255.255.0 |
     /24             |
10.20.2.255 |
|
10.20.3.0 – Server VLAN |
10.20.3.1-10.20.3.254 |
255.255.255.0 |
     /24             |
10.20.3.255 |
Â
Â
Boston Site Protocol, Route Summarization, and Topology Improvements:
Â
Routing Protocol:
Â
OSPF builds a database of routes to its neighbor’s and using Dijkstra’s algorithm, calculates the best possible path. OSPF needs to be aware of the up or down state of its neighbor’s in order to calculate the best path.RIP and RIP-2 are distance vector protocols. RIP uses "number-of-hops" as it’s metric and Bellman-Ford algorithm to calculate the best route based on the number of "hops" it takes to reach the specified subnet.
EIGRP is Cisco proprietary hybrid between link-state and distance vector. EIGRP combines OSPF and RIP to determine the best route for each subnet.
Â
Summarization:
Â
Summarizing IP addresses ensures that there are no entries for child routes, which are routes that are created for any combination of the individual IP addresses contained within a summary address in the routing table. In summary the routing table will be as follows;
Â
a)Â Â Â BostonRouter1:Â
10.10.0.1, 10.10.2.1, 10.10.4.1, 10.10.6.1Â Ã 10.10.0.0/21
10.10.10.1, 10.10.12.1, 10.10.14.1, 10.10.16.1Â Ã 10.10.0.0/19
b)Â Â Â BostonRouter2:
10.10.0.1, 10.10.2.1, 10.10.4.1, 10.10.6.1Â Ã 10.10.0.0/21
10.10.10.1, 10.10.12.1, 10.10.14.1, 10.10.16.1Â Ã 10.10.0.0/19
c)Â Â Â BostonRouter3:
10.10.0.1, 10.10.2.1, 10.10.4.1, 10.10.6.1Â Ã 10.10.0.0/21
10.10.10.1, 10.10.12.1, 10.10.14.1, 10.10.16.1Â Ã 10.10.0.0/19
Â
Default Route:
a)Â Â Â BostonRouter1
10.50.0.0/16Â Ã 165.128.63.1
10.40.0.0/16Â Ã 165.128.63.1
10.30.0.0/16Â Ã 10.255.255.248/30
10.20.0.0/16Â Ã 10.255.255.248/30
b)Â Â Â BostonRouter2
10.50.0.0/16Â Ã 10.10.255.250
10.40.0.0/16Â Ã 10.10.255.250
10.30.0.0/16Â Ã 10.10.255.250
10.20.0.0/16Â Ã 10.10.255.250
c)Â Â Â BostonRouter2
10.50.0.0/16Â Ã 10.10.255.254
10.40.0.0/16Â Ã 10.10.255.254
10.30.0.0/16Â Ã 10.10.255.254
10.20.0.0/16Â Ã 10.10.255.254
Proposed Network Security Measures:
Security in the hardware is a very important measure in network security. It is therefore very important that security is enhanced. The first measure to be taken is considering a back-up of data. This backup should be put in a different room with a lock and a camera to have surveillance in the perimeter. A firewall will also enhance the defense of the network. The firewall will limit the exposure of the network to threats in the network. The threats include the external attacks and hackers it also mitigates the risks of hacking should an attacker succeed in breaching the security of the network. A VPN is also another security measure that can be used to provide secure connectivity from outside the organization.
Topology Recommendations (Network):
Â
The recommendation is for additional leased lines from the Los Angeles Router to the internet and from the Boston Router to the internet.We can also have additional lines from the San Francisco Router to the internet, from the Springfield Router to the internet, and from the Worchester Router to the internet, as shown by red lines in the picture below.
Â
Los Angeles Router s0/0/2Â Â Â Â 165.128.63.4/26
Boston Router         s0/0/1    165.128.63.5/26
Sacramento Router  s0/0/1  10.255.255.253/30
Springfield Router   s0/0/1    10.255.255.247/30
Worchester Router   s0/0/1   10.255.255.249/30
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
I.Â
II.Â
Bibliography
Â
[1]B. Routing Protocol Selection Guide - IGRP, "Routing Protocol Selection Guide - IGRP, EIGRP, OSPF, IS-IS, BGP | LAN, Switching and Routing | Cisco Support Community | 6016 | 127851", Supportforums.cisco.com, 2016. [Online]. Available: https://supportforums.cisco.com/document/127851/routing-protocol-selection-guide-igrp-eigrp-ospf-bgp. [Accessed: 23- Jun- 2016].
[2]D. Teare and C. Paquet, "Route Summarization > CCNP Self-Study: Advanced IP Addressing", Ciscopress.com, 2016. [Online]. Available: http://www.ciscopress.com/articles/article.asp?p=174107&seqNum=3. [Accessed: 23- Jun- 2016].
[3]"Networking 101: Understanding OSPF Routing", Enterprisenetworkingplanet.com, 2016. [Online]. Available: http://www.enterprisenetworkingplanet.com/netsp/article.php/3610496/Networking-101-Understanding-OSPF-Routing.htm. [Accessed: 23- Jun- 2016].
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly