Lab 6.1.4 Using CIDR to Ensure  Route Summarization
Step 1: Cable and configure the network
Referring to the topology diagram,  connect the console (or rollover) cable to the console port on the  router and the other cable end to the host computer with a DB-9 or DB-25  adapter to the COM 1 port. Ensure that power has been applied to both  the host computer and router.
Step 2: Perform basic router configurations
Establish a HyperTerminal, or other  terminal emulation program, from PC1 to each of the three routers in  turn and perform the following configuration functions:
Clear any existing configurations on  the routers.
Configure the  router hostname.
Disable  DNS lookup.
Configure an EXEC  mode password.
Configure a  message-of-the-day banner.
Configure  a password for console connections.
Configure a password for vty connections.
Step 3: Configure  the interfaces on the three routers
Configure the interfaces on the  three routers with the IP addresses from the table.
Save the running configuration to  the NVRAM of the router.
Step 4: Configure the Ethernet interfaces
Configure the Ethernet interfaces of  Hosts PC1, PC2, and PC3 with the IP addresses from the addressing
table provided under the topology  diagram.
Step 5: Verify connectivity of routers
Verify that each router can ping  each of the neighboring routers across the WAN links. You should
not have  connectivity between end devices yet. However, you can test connectivity  between two
routers and between  an end device and its default gateway. Troubleshoot if connectivity is  not achieved.
Step 6: Verify connectivity of Host PCs
Verify that PC1, PC2, and PC3 can  ping their respective default gateways. Troubleshoot if connectivity is  not achieved.
Step 7: Configure EIGRP routing on router R1
Consider the networks that need to  be included in the EIGRP updates that are sent out by the R1 router.
What directly connected networks  exist on R1?
172.17.0.0
172.18.0.0
172.19.0.0
What commands are required to enable  EGIRP and include the connected networks in the routing updates?
router eigrp 1
network 172.17.0.0
network 172.18.0.0
network 172.19.0.0
Are there any router interfaces that  do not need to have EIGRP updates sent out? Ya
If yes,  which ones? Fa0/0 and Fa0/1
What command is used to disable  EIGRP updates on these interfaces?
passive-interface FastEthernet0/0 and  passive-interface FastEthernet0/1
Step 8: Configure  EIGRP on router R2
Consider  the networks that need to be included in the EIGRP updates that are  sent out by the R2 router.
What  directly connected networks exist on R2?
172.16.0.0
172.17.0.0
172.20.0.0
What commands are required to enable  EGIRP and include the connected networks in the routing updates?
router eigrp 1
network 172.16.0.0
network 172.17.0.0
network 172.20.0.0
Are there any router interfaces that  do not need to have EIGRP updates sent out?Ya
If yes, which ones?
Fa0/0 and Fa0/1
What command is used to disable  EIGRP updates on these interfaces?
passive-interface FastEthernet0/0
Step 9: Configure  EIGRP routing on the R3 router
Consider the networks that need to be included in the EIGRP  updates that are sent out by the R3 router.
What directly connected networks  exist on R3?
172.20.0.0
10.1.0.0
What commands are required to enable  EGIRP and include the connected networks in the routing updates?
router eigrp 1
network 172.20.0.0
network 10.1.0.0
Are there any router interfaces that  do not need to have EIGRP updates sent out?Ya
If yes, which ones?Fa0/0 and Fa0/1
What command is used to disable EIGRP updates on these  interfaces?
passive-interface FastEthernet0/0
Step 10: Verify  the configurations
Ping  between devices to confirm that each router can reach each device on the  network and that there is
connectivity  between all the PCs. If any of the above pings failed, check your  physical connections and configurations. Troubleshoot until connectivity  is achieved.
Step 11: Display the EIGRP routing table for each router
Are there summary routes in any of  the routing tables?
Ya, tetapi hanya untuk jaringan 10.1.0.0. Auto-summary EIGRP  diaktifkan secara default dan merangkum subnetwork 10.1.0.0/16 ke  jaringan 10.0.0.0 / 8 classful.
Are there any summary routes for the  172.x.0.0 networks?Tidak
Step 12: Remove  automatic summarization
On each of the three routers, remove automatic summarization  to force EIGRP to report all subnets. A sample command is given for R1.
R1(config)#router eigrp 1
R1(config-router)#no auto-summary
Step 13: Configure  manual summarization on R2
On R2, configure manual summarization so that EIGRP  summarizes the four networks 172.16.0.0/16,
172.17.0.0/16, 172.18.0.0/16, and  172.19.0.0/16 as one CIDR route, or 172.16.0.0/14.
You are summarizing multiple  classful networks, which creates a supernet, and results in a classless  (/14)
network address being  advertised.
R2(config)#interface s0/0/1
R2(config-if)#ip summary-address eigrp 1  172.16.0.0 255.252.0.0
Step 14: Confirm that R2 is advertising a  CIDR summary route
Examine  the routing table of each router using the show ip  route command.
R1#show ip route
Codes: C – connected, S – static, R – RIP, M – mobile, B –  BGP
D – EIGRP, EX – EIGRP  external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF  external type 2
i – IS-IS,  su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS level-2
ia – IS-IS inter area, * – candidate  default, U – per-user static
route
o – ODR, P  – periodic downloaded static route
Gateway of last resort is not set
C 172.17.0.0/16 is directly  connected, Serial0/0/0
D  172.16.0.0/16 [90/2172416] via 172.17.0.2, 02:13:05, Serial0/0/0
C 172.19.0.0/16 is directly  connected, Loopback0
C  172.18.0.0/16 is directly connected, FastEthernet0/0
D 172.20.0.0/16 [90/2681856] via  172.17.0.2, 02:05:21, Serial0/0/0
10.0.0.0/16 is subnetted, 1 subnets
D 10.1.0.0 [90/2684416] via  172.17.0.2, 00:04:25, Serial0/0/0
R2#show ip route
Codes: C – connected, S – static, R –  RIP, M – mobile, B – BGP
D –  EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 –  OSPF NSSA external type 2
E1 –  OSPF external type 1, E2 – OSPF external type 2
i – IS-IS, su – IS-IS summary, L1 –  IS-IS level-1, L2 – IS-IS level-2
ia – IS-IS inter area, * – candidate default, U – per-user  static
route
o – ODR, P – periodic downloaded  static route
Gateway of last  resort is not set
C  172.17.0.0/16 is directly connected, Serial0/0/0
C 172.16.0.0/16 is directly  connected, FastEthernet0/0
D  172.19.0.0/16 [90/2172416] via 172.17.0.1, 02:14:37, Serial0/0/0
D 172.18.0.0/16 [90/2172416] via  172.17.0.1, 02:14:37, Serial0/0/0
C 172.20.0.0/16 is directly connected, Serial0/0/1
10.0.0.0/16 is subnetted, 1 subnets
D 10.1.0.0 [90/2172416] via  172.20.0.1, 00:05:57, Serial0/0/1
D 172.16.0.0/14 is a summary, 00:11:55, Null0
R3#show ip route
Codes: C – connected, S – static, R –  RIP, M – mobile, B – BGP
D –  EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 –  OSPF NSSA external type 2
E1 –  OSPF external type 1, E2 – OSPF external type 2
i – IS-IS, su – IS-IS summary, L1 –  IS-IS level-1, L2 – IS-IS level-2
ia – IS-IS inter area, * – candidate default, U – per-user  static
route
o – ODR, P – periodic downloaded  static route
Gateway of last  resort is not set
C  172.20.0.0/16 is directly connected, Serial0/0/1
10.0.0.0/16 is subnetted, 1 subnets
C 10.1.0.0 is directly connected,  FastEthernet0/0
D  172.16.0.0/14 [90/2172416] via 172.20.0.2, 00:13:32, Serial0/0/1
Which router has a summarized route  to the 172.x.0.0 networks in its routing table?
R3
D 172.16.0.0/14 [90/2172416] via  172.20.0.2, 00:13:32, Serial0/0/1
Step 15: Clean up
Erase the configurations and reload the routers. Disconnect  and store the cabling. For PC hosts that are
normally connected to other networks  (such as the school LAN or to the Internet), reconnect the appropriate  cabling and restore the TCP/IP settings.
Reflection
In this lab, automatic summarization  was used. Could route summarization still be applied if more effective  use of the IPv4 address space had been made by using VLSM for those  networks requiring fewer addresses, such as the serial links between  routers?
Lab 6.2.1  Determining an IP Addressing Scheme
Step 1: Consider VLAN issues
The initial step in determining the  required VLANs is to group users and services into VLANs. Each of these  VLANs will represent an IP subnet.
A VLAN can be considered to be a group of switch ports  assigned to a broadcast domain. Grouping the
switch ports confines broadcast  traffic to specified hosts so that bandwidth is not unnecessarily  consumed in unrelated VLANs. It is therefore a recommended best practice  to assign only one IP network or subnetwork to each VLAN.
When determining how to group users  and services, consider the following issues:
Flexibility
The employees and hardware of the  former AnyCompany will move into the building with the FilmCompany in  the near future. The network from this newly acquired company needs to  be tightly integrated with the FilmCompany network and a structure put  in place to enhance the security of the network.
To support this integration, with  improvements in security and performance, additional VLANs need to be
created on the network. These VLANs  will also allow the personnel to move to the buildings without  additional network changes or interruption in network services.
Security
Security can be better enforced between VLANs than within VLANs.
- • Access control lists can be applied to the Distribution Layer router subinterfaces that interconnect the
VLANs to enforce this  security.
- • The interfaces on the switches can be assigned to VLANs as appropriate to support the network for
the connected device.
- • Additional Layer 2 security measures can also be applied to these switch interfaces.
WANs and VPNs
The contract with StadiumCompany adds a number of new  requirements. Some FilmCompany personnel will be located at the stadium.  Additional personnel and contract workers will also be present at the  stadium during live events. These employees will use laptops and the  wireless LAN at the FilmCompany branch as well as the wireless LAN at  the stadium. To provide network connectivity for these laptops, they  will be in their own VLAN. At the stadium, the FilmCompany laptop users  will connect to a secure wireless VLAN and use a VPN over the Frame  Relay connection between stadium and the FilmCompany branch. With this  connection, the laptop users can be attached to the internal FilmCompany  network regardless of physical location. To support the video feeds,  FilmCompany will need resources available at the stadium. Some of the  servers providing these resources will be located at the stadium. Other  servers will be located at the branch office of the FilmCompany. For  security and performance reasons, these servers, regardless of location,  will be on secured VLANs. A separate VPN over the Frame Relay link will  be created to connect the servers at the stadium to the servers located  at the FilmCompany office.
What  are the advantages and disadvantages of using a VPN to extend the  wireless and video server
networks  over the Frame Relay connection from FilmCompany to the stadium?
Advantages:
Memperluas VLAN  melalui VPN di WAN memiliki keuntungan dari keamanan tindakan yang  dilakukan terhadap VLAN yang juga sedang diterapkan pada semua host di manapun  lokasinya.
Disadvantages:
Kerugiannya adalah  bahwa semua siaran VLAN juga melintasi bandwidth sempit pada WAN link, yang mungkin mempengaruhi throughput data
Redundancy
The VLAN structure will support load balancing and  redundancy, which are major needs of this new network design. With such a  large portion of the FilmCompany operations and revenues dependent on  the network operation, a network failure could be devastating. The new  VLAN arrangement allows the FC-ASW1 and FCASW2 switches to share the  load of the traffic and be backups for each other.
This redundancy is accomplished by  sharing the RSTP primary and secondary root duties for the traffic for  the different VLANs:
- • FC-ASW1 will be the primary root for approximately one-half of the VLAN traffic (not necessarily one half of the VLANs) and FC-ASW2 will be the secondary root for these VLANs.
- • The remaining VLANs will have FC-ASW2 as the primary root and FC-ASW1 as the secondary root.
Step 2: Group network users and services
Examine the planned network  topology. Applying the issues considered in Step 1, list all the  possible
groupings of users and  services that may require separate VLANs and subnets.
default VLAN for  the Layer 2 devices
voice VLAN to support Voice over IP
VLAN for  management hosts and secure peripherals (payroll printer)
VLAN for  administrative hosts
VLAN for support hosts
VLAN for high  performance production workstations (stationary)
VLAN for mobile production hosts
VLAN for stadium  to FilmCompany mobile access VPN
VLAN for network support
VLAN for  peripherals for general use (printers, scanners)
VLAN for servers  to support video services and storage
VLAN for stadium  to FilmCompany video services VPN
VLAN for servers  that are publicly accessible
VLAN for terminating unwanted or suspicious  traffic
VLAN for undefined future services
Block of addresses  are required for NAT pool for BR4
DSL link to the  ISP
Addresses for the Frame Relay link to the stadium
Step 3: Tabulating  the groupings
The new  addressing design needs to be scalable to allow easy inclusion of future  services, such as voice.
The  current addressing scheme does not allow for managed growth. Correcting  this scheme will mean that most devices will be placed on new VLANs and  new subnets. In some cases, a device address may not be able to be  changed; for example, some of the servers have software registered to  their IP addresses. In such cases, the server VLAN will keep its current  addressing even though it may not be consistent with the remaining  addressing scheme. Other addresses that cannot be changed are the  addresses used with the WAN links and the addresses for NAT pool used to  access the Internet.
This table  shows a possible grouping and addressing scheme. The number of hosts  required for the
FilmCompany  branch office, including growth, has been determined. Assigning one  subnet to each VLAN, the host count for each has been rounded up to the  next logical network size supported by the binary patterns used in the  subnet mask. Rounding up prevents underestimating the total number of  host addresses required
| VLAN number | Network name | Nomor alamat host | PredeterminedNetwork Address | Deskripsi | 
| 1 | default | 14 | Default VLAN for the Layer 2 devices | |
| 10 | voice | 254 | Voice VLAN to support Voice over IP | |
| 20 | management | 14 | Management hosts and secure peripherals (payroll printer) | |
| 30 | administrative | 62 | Administrative hosts | |
| 40 | support | 126 | Support hosts | |
| 50 | production | 126 | High performance production workstations (stationary) | |
| 60 | mobile | 62 | Mobile production hosts | |
| 70 | net_admin | 14 | Network support | |
| 80 | servers | 65534 | 172.17.0.0 /16 | Servers to support video servicesand storage | 
| 90 | peripherals | 62 | Peripherals for general use (printers,scanners) | |
| 100 | web_access | 14 | VLAN for servers that are publiclyaccessible | |
| 120 | future | 126 | VLAN for future services | |
| 999 | null | 126 | VLAN for terminating unwanted orsuspicious traffic | |
| NA | NAT_pool | 6 | 209.165.200.224/29 | Addresses for NAT pool for BR4 orinterface to ISP4 | 
| NA | DSL_Link | 2 | 192.0.2.40 /30 | DSL link to the ISP | 
| NA | Frame_Link | 2 | 172.18.0.16/30 | Address of the FR link to thestadium | 
Step 4: Determine the total number of hosts to be addressed
To determine the block of addresses  to be used, count the number of hosts. To calculate the addresses,
count only the hosts that will  receive addresses from the new block. Use the information in the table  in Step 3 to complete this chart to calculate the total number of hosts  in the new FilmCompany network requiring addresses.
Reflection /  Challenge
This lab  provided a step-by-step process for determining an addressing scheme for  a corporate network.
Discuss  and consider the issues that would arise if this planning process was  not methodically used.
Lab 6.2.2  Determining the Number of IP Networks
Task 1: Review Address Block Size
Review and record the total number  of hosts to be addressed.
Complete  this table with the information determined in Lab 6.2.1.
| Network/VLAN Name | #Number of host addresses | 
| Default | 14 | 
| Voice | 254 | 
| Management | 14 | 
| Administrative | 62 | 
| Support | 126 | 
| Production | 126 | 
| Mobile | 62 | 
| Peripherals | 62 | 
| Net_admin | 14 | 
| Web_access | 14 | 
| Future | 126 | 
| Null | 126 | 
| Total | 1000 | 
What is  the smallest address block size that can potentially satisfy the  FilmCompany network needs?
1024
Task 2: Choose or Obtain an Address Block
Step 1: Choose  public or private addresses?
A block of addresses needs to be acquired to support the  addressing scheme. This block of addresses could be private space  addresses or public addresses. In most cases, the network users require  only outbound connections to the Internet. Only a few hosts, such as web  servers, require public addresses. These often exist on the local LAN  with private addresses and have static NAT entries on the border router  to translate to public addresses. Public address, however, are expensive  and often difficult to justify. Can you make a justification of the use  public addresses in this network?
Tidak
If so, write this justification to forward to the ISP:
Step 2: Ensure  that the private space addresses do not conflict
Although you are allowed to use  private space addresses any way you choose, you must make sure that the  addresses used do not conflict with another private space address to  which this network will be connected. You must identify other networks  to which you are connected and make sure that you are not using the same  private addresses. In this case, you need to examine the addresses used  by the StadiumCompany.
What  address private space block does the StadiumCompany use?
172.18.0.0 /16
What address blocks are used by the  WAN links?
172.18.0.16/30
192.0.2.40 /30
Are there other devices or  connections that need to be excluded from use?
Ya
What types?
servers
What address block?
172.17.0.0 /16
Step 3: Ensure  that the private space addresses are consistent with policy
The company should have a network  policy and method of allocating addresses. This is true even when using
private addresses. You should  contact the FilmCompany network administrators to request a block of
addresses. In this case, ask your  instructor if there is a preferred set of addresses to use.
Did your instructor assign a block  of addresses?
If so, what block?
If your instructor does not assign  addresses, you may choose any private space block that does not  conflict.
What block of addresses  are you using for this FilmCompany Branch?
192.168.0.0 /22
Task 3: Allocate Addresses for the Network
When assigning addresses to the  different networks, start the assignments with the subnet that requires  the largest address block and progress to the network that requires the  smallest.
Step 1: Order the networks from largest to smallest
Using the information from Lab  6.2.1, list the networks in order of size, from the network that  requires the
largest address  block to the network that requires the smallest block.
| Network/VLAN Name | Number of host addresses | 
| Voice | 254 | 
| support | 126 | 
| production | 126 | 
| Future | 126 | 
| Null | 126 | 
| administrative | 62 | 
| Mobile | 62 | 
| peripherals | 62 | 
| Web_access | 14 | 
| Default | 14 | 
| management | 14 | 
| Net_admin | 14 | 
Step 2: Assign address blocks to the networks
From the address block chosen in the  previous task, begin calculating and assigning the address blocks to  these networks. You should use contiguous blocks of addresses when  making these assignments.
| Network/VLAN Name | Number of host addresses | Network address | 
| Voice | 254 | 192.168.0.0 /24 | 
| support | 126 | 192.168.1.0 /25 | 
| production | 126 | 192.168.1.128 /25 | 
| Future | 126 | 192.168.2.0 /25 | 
| Null | 126 | 192.168.2.128 /25 | 
| administrative | 62 | 192.168.3.0 /26 | 
| Mobile | 62 | 192.168.3.64 /26 | 
| Peripherals | 62 | 192.168.3.128 /26 | 
| web_access | 14 | 192.168.3.192 /28 | 
| Default | 14 | 192.168.3.208 /28 | 
| management | 14 | 192.168.3.224 /28 | 
| net_admin | 14 | 192.168.3.240 /28 | 
Step 3: Complete the address planning table
Using the addresses you calculated  in the previous step, complete this table from Lab 6.2.1. This plan will  be used in future labs.
| VLAN # | Network/VLAN Name | Number of host addresses | Network Address | Description | 
| 1 | default | 14 | 192.168.3.208 /28 | Default VLAN for the Layer 2 devices | 
| 10 | voice | 254 | 192.168.0.0 /24 | Voice VLAN to support Voice over IP | 
| 20 | management | 14 | 192.168.3.224 /28 | Management hosts and secureperipherals (payroll printer) | 
| 30 | administrative | 62 | 192.168.3.0 /26 | Administrative hosts | 
| 40 | support | 126 | 192.168.1.0 /25 | Support hosts | 
| 50 | production | 126 | 192.168.1.128 /25 | High performance productionworkstations (stationary) | 
| 60 | mobile | 62 | 192.168.3.64 /26 | Mobile production hosts. | 
| 70 | net_admin | 14 | 192.168.3.240 /28 | Network support | 
| 80 | servers | 65534 | 172.17.0.0 /16 | Servers to support video services and storage. | 
| 90 | peripherals | 62 | 192.168.3.128 /26 | Peripherals for general use (printers, scanners) | 
| 100 | web_access | 14 | 192.168.3.192 /28 | VLAN for server that are publiclyaccessible | 
| 120 | future | 126 | 192.168.2.0 /25 | VLAN for future services | 
| 999 | null | 126 | 192.168.2.128 /25 | VLAN for terminating unwanted orsuspicious traffic | 
| NA | NAT_pool | 6 | 209.165.200.224/29 | Addresses for NAT pool for BR4 or interface to ISP4 | 
| NA | DSL_Link | 2 | 192.0.2.40 /30 | DSL link to the ISP | 
| NA | Frame_link | 2 | 172.18.0.16/30 | Address of the FR link to the stadium | 
Reflection / Challenge
This lab specifically used private  IPv4 addresses. Discuss the issues to be considered if it was decided to  use public IP addresses throughout the network. Are there any  situations that would require this?
Alamat IP versi 4 (sering disebut  dengan Alamat IPv4) adalah sebuah jenis  pengalamatan jaringan yang digunakan di dalam protokol jaringan TCP/IP  yang menggunakan protokol IP versi 4. Panjang totalnya  adalah 32-bit, dan secara teoritis dapat mengalamati hingga 4 miliar  host komputer atau lebih tepatnya 4.294.967.296 host di seluruh dunia,  jumlah host tersebut didapatkan dari 256 (didapatkan dari 8 bit)  dipangkat 4(karena terdapat 4 oktet) sehingga nilai maksimal dari alamt  IP versi 4 tersebut adalah 255.255.255.255 dimana nilai dihitung dari  nol sehingga nilai nilai host yang dapat ditampung adalah  256x256x256x256=4.294.967.296 host. Alamat publik adalah alamat-alamat  yang telah ditetapkan oleh InterNIC dan berisi  beberapa buah network identifier yang telah dijamin  unik (artinya, tidak ada dua host yang menggunakan alamat yang sama)  jika intranet tersebut telah terhubung ke Internet. Ketika beberapa  alamat publik telah ditetapkan, maka beberapa rute dapat diprogram ke  dalam sebuah router sehingga lalu lintas data yang menuju alamat  publik tersebut dapat mencapai lokasinya.
Lab 6.2.5 Creating an Address Allocation  Spreadsheet
Step 1: Record the network address block
In the first column, record the  address block used for the entire FilmCompany network chosen in the  previous lab.
Step 2: Define the 254-host networks
Based on the requirements for the  FilmCompany network, the address block is divided into twelve separate  networks using four different masks.
In the second column of the table above, record the network  blocks that will support 254 hosts per
network. In the last column, record the names of the networks  that need to be assigned to these blocks.
The CIDR notation mask for the  254-host network is /24. What is the dotted decimal equivalent mask?
255.255.255.0
Step 3: Define the  126-host networks
In  the third column of the table above, choose the first unused 254 host  address block to subdivide
into  126-host networks. In the last column, record the names of the networks  assigned to these 126-host blocks.
The CIDR notation mask for the 126-host network is /25. What  is the dotted decimal equivalent mask?
255.255.255.128
Step 4: Define the  62-host networks
In  the fourth column of the table above, choose the first unused 126-host  address block to subdivide
into  62-host networks.
In the  last column, record the names of the networks assigned to these 62-host  blocks.
The CIDR notation mask  for the 62-host network is /26. What is the dotted decimal equivalent  mask?
255.255.255.192
Step 5: Define the 14-host networks
In the fifth column of the table  above, choose the first unused 62-host address block to subdivide into
14-host networks. In the last  column, record the names of the networks assigned to these 14-host  blocks.
The CIDR notation mask  for the 14-host network is /28. What is the dotted decimal equivalent  mask?
255.255.255.240
Task 2: Define the Host Address Assignments
For each network, determine and  document the host addresses and broadcast addresses. Use the table
below to document these networks and  host information.
Step 1: Record the network names and addresses in the  addressing table
In  the table below, record the network names for the FilmCompany in the  first column and the corresponding network address in the second column.
Step 2: Calculate  the lowest host address in the addressing table
The lowest address for a network is  one greater than the address of the network. Therefore, to calculate the  lowest host address, add a 1 to the network address. For each of these  networks, calculate and record the lowest host address in the second  column of the table.
Step 3: Calculate the broadcast address in the addressing  table
The broadcast  address uses the highest address in the network range. This is the  address in which the bits in the host portion are all 1s. To calculate  the broadcast for each of the networks listed, convert the last octet of  the network address into binary. Then fill the remaining host bits with  1s. Finally, convert the binary back to decimal. For each of these  networks, calculate and record the broadcast address in the last column.
Step 4: Calculate  the highest host address in the addressing table
The highest address for each address  is the network address is one less than the broadcast address for that  network. Therefore, to calculate the highest host address, subtract a 1  from the broadcast address. For each of these networks, calculate and  record the highest host address in the second column.
| Network Names | Network Address | Lowest HostAddress | Highest HostAddress | Broadcast Address | 
| voice | 192.168.0.0 /24 | 192.168.0.1 | 192.168.1.254 | 192.168.1.255 | 
| support | 192.168.1.0 /25 | 192.168.1.1 | 192.168.1.126 | 192.168.1.127 | 
| production | 192.168.1.128 /25 | 192.168.1.129 | 192.168.1.254 | 192.168.1.255 | 
| future | 192.168.2.0 /25 | 192.168.2.1 | 192.168.2.126 | 192.168.2.127 | 
| null | 192.168.2.128 /25 | 192.168.2.129 | 192.168.2.254 | 192.168.2.255 | 
| administrative | 192.168.3.0 /26 | 192.168.3.1 | 192.168.3.62 | 192.168.3.63 | 
| mobile | 192.168.3.64 /26 | 192.168.3.65 | 192.168.3.126 | 192.168.3.127 | 
| peripherals | 192.168.3.128 /26 | 192.168.3.129 | 192.168.3.190 | 192.168.3.191 | 
| Web_access | 192.168.3.192 /28 | 192.168.3.193 | 192.168.3.206 | 192.168.3.207 | 
| default | 192.168.3.208 /28 | 192.168.3.209 | 192.168.3.222 | 192.168.3.223 | 
| management | 192.168.3.224 /28 | 192.168.3.225 | 192.168.3.238 | 192.168.3.239 | 
| net_admin | 192.168.3.240 /28 | 192.168.3.241 | 192.168.3.254 | 192.168.3.255 | 
Task 3: Examine Address Blocks for Overlapping Addresses
One of the major issues of planning  network addresses is overlapping addresses. This is especially true when  using VLSM addressing. Examine the table in the previous step to ensure  that each network has a unique address range.
Are there any overlapping addresses  in the networks?Tidak
If there are any overlapping  addresses, recalculate the addressing plan for the FilmCompany network.
Lab 6.2.6  Diagramming the Network
Step 1: Identify the appropriate VLAN
In the previous labs, you identified  VLANs and subnets to be used in the FilmCompany network expansion. For  each device listed in the table in the final section of this lab, assign  each host the appropriate VLAN based on its description. Record these  VLAN assignments in the third column of the table in Step 5.
Step 2: Assign  addresses to the devices
In the previous lab, an address range was established for  each subnet and VLAN. Using these established ranges and the VLAN  assignments to the devices in the previous step, assign a host address  to each of the selected hosts. Record this information in the last  column of the table in Step 5 of this lab.
Step 3: Define the  codes for device naming
From the device information, develop and apply a naming  convention for the hosts.
A  good naming scheme follows these guidelines:
- • Keep the names as short as possible; using fewer than twelve characters is recommended.
- • Indicate the device type, purpose, and location with codes, rather than words or abbreviations.
- • Maintain a consistent scheme. Consistent naming makes it easier to sort and report on the devices,
and to set up management  systems.
- • Document the names in the IT department files and on the network topology diagrams.
- • Avoid names that make it easy to find protected resources.
For each naming  criteria, assign a code for type. You will use these codes in different  combinations to create device names. In the tables below, create codes  for the elements of the device names. Use as many or as few codes as  needed.
| Device Type | Type code | Device Purpose | Purpose code | Device Location | Location code | 
| Laptop | LT | Management | MGMT | Stadium | STAD | 
| Desktop PC | PC | Production | PROD | 1st Floor | 1FLR | 
| Workstation | WS | Netadmin | NETA | 3rd Floor | 3FLR | 
| Printer | PT | ServerRoom | SVRM | ||
| Scanner | SC | ||||
| Server | SV | 
Step 4: Establish the naming convention
In the spaces below, indicate the  order and the number of letters to be used in the device naming. Again,  use as many or as few letters as necessary. List the criteria in the  blanks and draw a line to indicate the number of letters used. You may  also choose to use hyphens (-) or underscores (_) to separate fields.
Step 5: Apply a  naming convention
For  each of the twelve devices shown in this table, apply the naming  convention. Then add these device
names in the appropriate boxes in the topology at the  beginning of the lab.
| Number | Device Name | VLAN | Description | IP Address | 
| 1 | servers | Server for capturing raw video feeds from stadium | ||
| 2 | servers | Server for storing finished (postproduction) video | ||
| 3 | web_access | Public web server for on demand video access | ||
| 4 | management | Branch manager’s computer | ||
| 5 | production | Live event production worker (switched) | ||
| 6 | support | Human resource clerk | ||
| 7 | support | Payroll Manager | ||
| 8 | mobile | Live event mobile worker (audio producer) | ||
| 9 | mobile | Live event mobile worker (camera coordinator) | ||
| 10 | support | Receptionist’s computer | ||
| 11 | management | Financial Manager’s computer | ||
| 12 | net_admin | Information Technology manager’s computer | 
 
 
Tidak ada komentar:
Posting Komentar