EXERCICE VLSM CORRIG PDF

Activity 6. Design an appropriate addressing scheme using VLSM. In this activity, you have been given the network address All contents are Copyright? All rights reserved. If you need help with this exercise see Section 1.

Author:Dokus Gardazil
Country:Azerbaijan
Language:English (Spanish)
Genre:Marketing
Published (Last):23 March 2019
Pages:329
PDF File Size:19.67 Mb
ePub File Size:1.84 Mb
ISBN:329-4-55844-358-6
Downloads:83128
Price:Free* [*Free Regsitration Required]
Uploader:Kat



Last Updated on January 31, by Admin. Answers Note : Red font color or Gray highlights indicate text that appears in the instructor copy only. With VLSM, a network is subnetted and then re-subnetted. This process can be repeated multiple times to create subnets of various sizes based on the number of hosts required in each subnet.

Effective use of VLSM requires address planning. In this lab, use the After you have designed the VLSM address scheme, you will configure the interfaces on the routers with the appropriate IP address information. Other routers and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the correct interface identifiers.

Note : Make sure that the routers have been erased and have no startup configurations. If you are unsure, contact your instructor. This lab can be performed in multiple sessions if time is an issue. Parts 1 and 2 are paper based and can be assigned as homework. Part 3 is Hands-on and requires lab equipment. It is worth noting to the students that as a network administrator, you would not have a single network with over hosts.

You would break these down further in a production network. In Part 1, you will examine the network requirements to develop a VLSM address scheme for the network displayed in the topology diagram using the What is the total number of host addresses needed in the topology diagram?

How many subnets are needed in the network topology? What is the subnet description e. How many IP addresses are required in the largest subnet? How many total host addresses can that subnet mask support? Can you subnet the What are the two network addresses that would result from this subnetting? What is the subnet description? How many IP addresses are required for the second largest subnet? Can you subnet the remaining subnet again and still support this subnet?

How many IP addresses are required for the next largest subnet? How many host addresses are required for each serial subnet link? Use the information that you obtained in Part 1 to fill in the following table. Assign the first host address in the subnet to the Ethernet interfaces. BR1 should be given the first host address for the serial link to BR2. In Part 3, you will cable the network topology and configure the three routers using the VLSM address scheme that you developed in Part 2.

Note: Pings to the GigabitEthernet interfaces on other routers will not be successful. A routing protocol needs to be in place for other devices to be aware of those subnets. The focus of this lab is on VLSM and configuring the interfaces. Answers may vary. BR1 sh run. Building configuration…. Current configuration : bytes. Warning: Unauthorzed access is prohibited! HQ sh run. BR2 sh run. Posted on January 31, by Admin. Last Updated on January 31, by Admin 8. Step 1: Determine how many host addresses and subnets are available.

Step 3: Determine the second largest subnet. Step 4: Determine the next largest subnet. Step 5: Determine the next largest subnet.

Step 6: Determine the next largest subnet. Step 7: Determine the next largest subnet. Step 8: Determine the subnets needed to support the serial links. Step 1: Cable the network as shown in the topology. Step 2: Configure basic settings on each router.

Assign the device name to the router. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as though they were hostnames. Assign class as the privileged EXEC encrypted password. Assign cisco as the console password and enable login.

Assign cisco as the VTY password and enable login. Encrypt the clear text passwords. Create a banner that will warn anyone accessing the device that unauthorized access is prohibited.

Step 3: Configure the interfaces on each router. Assign an IP address and subnet mask to each interface using the table that you completed in Part 2. Configure an interface description for each interface. Set the clocking rate on all DCE serial interfaces to HQ config-if clock rate Activate the interfaces. Step 4: Save the configuration on all devices. Step 5: Test Connectivity. Troubleshoot connectivity issues if pings were not successful. There is no way to effectively list all the combinations of configurations for each router class.

This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one.

The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface. Note : To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has.

GIOVANNOZZI COSTRUZIONE DI MACCHINE PDF

introduction to networks (version 6.00) - examen de fin de chapitre 1 itn

Last Updated on January 31, by Admin. Answers Note : Red font color or Gray highlights indicate text that appears in the instructor copy only. With VLSM, a network is subnetted and then re-subnetted. This process can be repeated multiple times to create subnets of various sizes based on the number of hosts required in each subnet. Effective use of VLSM requires address planning. In this lab, use the

CZY IRFANVIEW CZYTA PDF

Ccna3 Mod 1.1-Vlsm

.

KLV 46BX450 PDF

exercice ACL + corrigé

.

Related Articles