13
.docx
keyboard_arrow_up
School
Schoolcraft College *
*We aren’t endorsed by this school
Course
NETWORKS
Subject
Computer Science
Date
Apr 29, 2024
Type
docx
Pages
4
Uploaded by ChefTankFox27 on coursehero.com
Packet Tracer - Use Ping and Traceroute to Test Network Connectivity
Addressing Table
Device
Interface
IP Address / Prefix
Default Gateway
R1
G0/0
2001:db8:1:1::1/64
N/A
G0/1
10.10.1.97
255.255.255.224
N/A
S0/0/1
10.10.1.6
255.255.255.252
N/A
2001:db8:1:2::2/64
fe80::1
R2
S0/0/0
10.10.1.5
255.255.255.252
N/A
2001:db8:1:2::1/64
S0/0/1
10.10.1.9
255.255.255.252
N/A
2001:db8:1:3::1/64
fe80::2
R3
G0/0
2001:db8:1:4::1/64
N/A
G0/1
10.10.1.17
255.255.255.240
N/A
S0/0/1
10.10.1.10
255.255.255.252
N/A
2001:db8:1:3::2/64
fe80::3
PC1
NIC
10.10.1.98
255.255.255.224
10.10.1.97
PC2
NIC
2001:db8:1:1::2/64
fe80::1
PC3
NIC
10.10.1.18
255.255.255.240
10.10.1.17
PC4
NIC
2001:db8:1:4::2/64
fe80::1
Objectives
Part 1: Test and Restore IPv4 Connectivity Part 2: Test and Restore IPv6 Connectivity
Scenario
There are connectivity issues in this activity. In addition to gathering and documenting information about the network, you will locate the problems and implement acceptable solutions to restore connectivity.
Note: The user EXEC password is cisco
. The privileged EXEC password is class
.
Instructions
Part 1: Test and Restore IPv4 Connectivity
Step 1: Use ipconfig and ping to verify connectivity.
•
Click PC1 and open the Command Prompt
.
•
Enter the ipconfig /all command to collect the IPv4 information. Complete the Addressing Table with the IPv4 address, subnet mask, and default gateway.
•
Click PC3 and open the Command Prompt
.
•
Enter the ipconfig /all command to collect the IPv4 information. Complete the Addressing Table with the IPv4 address, subnet mask, and default gateway.
•
Use the ping command to test connectivity between PC1 and PC3
. The ping should fail.
Step 2: Locate the source of connectivity failure.
•
From PC1
, enter the necessary command to trace the route to PC3
.
What is the last successful IPv4 address that was reached?
10.10.1.97
•
The trace will eventually end after 30 attempts. Enter Ctrl
+
C to stop the trace before 30 attempts.
•
From PC3
, enter the necessary command to trace the route to PC1
.
What is the last successful IPv4 address that was reached?
10.10.1.17
•
Enter Ctrl
+
C to stop the trace.
•
Click R1
. Press ENTER and log in to the router.
•
Enter the show ip interface brief command to list the interfaces and their status.
There are two IPv4 addresses on the router. One should have been recorded in
Step 2a.
What is the other?
10.10.1.6
•
Enter the show ip route command to list the networks to which the router is connected. Note that there are two networks connected to the Serial0/0/1 interface.
What are they?
Type your answers here.10.10.1.10, 10.10.1.8/30, 10.10.1.10/32
•
Repeat steps 2e through 2g with R3 and record your answers.
•
Click R2
. Press ENTER and log into the router.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
The subnet mask in use on a 10.11.12.0 subnet is 255.255.255.128 (or /25) Select the IP address below that is on the same subnet with 10.11.12.1, 10.11.12.2, and 10.11.12.3
A. 10.11.12.42
B. 10.11.12.130
C. 10.0.0.1
D. no correct answer
arrow_forward
Packet Tracer - Basic Device Configuration
10.4.3 Packet Tracer - Basic Device Configuration(1).pka
Topology
You will receive one of three possible topologies.
Addressing Table
Device
Interface
IP Address
Default Gateway
Floor14
G0/0
172.14.5.1/24
N/A
Floor14
G0/0
2001:DB8:CAFE:1::1/64
N/A
Floor14
G0/0
FE80::1
N/A
Floor14
G0/1
172.14.10.1/24
N/A
Floor14
G0/1
2001:DB8:CAFE:2::1/64
N/A
Floor14
G0/1
FE80::2
N/A
Room-145
VLAN 1
172.14.5.35/24
blank
Room-146
VLAN 1
172.14.10.35/24
blank
Manager-A
NIC
172.14.5.50/24
blank
Manager-A
NIC
2001:DB8:CAFE:1::50/64
blank
Reception-A
NIC
172.14.5.60/24
blank
Reception-A
NIC
2001:DB8:CAFE:1::60/64
blank
Manager-B
NIC
172.14.10.50/24
blank
Manager-B
NIC
2001:DB8:CAFE:2::50/64
blank
Reception-B
NIC
172.14.10.60/24
blank
Reception-B
NIC
2001:DB8:CAFE:2::60/64
blank
Objectives
· Complete the network documentation.
· Perform basic device configurations on a router and a…
arrow_forward
Explain the concept of network address resolution (ARP) and its role in translating IP addresses to MAC addresses in local networks.
arrow_forward
plz solve
Provided with the topology, the addressing table, you are asked to configure the devices based on the questions below.
Addressing Table:
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/0
10.10.10.1
255.255.255.0
N/A
S0/0/0
172.20.20.1
255.255.255.252
N/A
R2
S0/0/0
172.20.20.2
255.255.255.252
N/A
S0/0/1
172.30.30.2
255.255.255.252
N/A
R3
G0/0
10.20.20.1
255.255.255.0
N/A
S0/0/1
172.30.30.1
255.255.255.252
N/A
PC-A
NIC
10.10.10.5
255.255.255.0
10.10.10.1
RADIUS Server
NIC
10.10.10.10
255.255.255.0
10.10.10.1
PC-B
NIC
10.20.20.5
255.255.255.0
10.20.20.1
PC-C
NIC
10.20.20.6
255.255.255.0
10.20.20.1
Web Server
NIC
10.20.20.10
255.255.255.0
10.20.20.1
Part 1: Configure Basic Switch Security
Configure the following on S1:
o Privileged EXEC mode encrypted password is ciscoenpa44.
o Console line password is…
arrow_forward
ICMP is used for
addressing
error reporting
routing
forwarding
Which of the following is an example of a private IP address?
12.127.18
65.20.10
169.200.224
100.20.2
ARP provides a mapping between IP addresses and
MAC Addresses
Domain Names
Phone Numbers
Network Addresses
arrow_forward
A network configuration of a modem is given as following:LTE interface IP = 77.110.156.22 MASK 255.255.252.0Default GATEWAY = 77.110.156.1Masquerade NAT, and DNS address = 1.1.1.1Local IP setup: 192.168.128.1 MASK 255.255.255.0And, ip route 192.168.128.0 255.255.252.0 192.168.128.254
Devices numbered R1, R2, R4, R5 are routers. PC is a computer.Image of network with interface names such as f1/0 are added.
You must use only static IP addreses and static IP routes to configure the network and make PC able to connect (ping) to Modem.
arrow_forward
Subnet 192.168.0.0/20 to meet the following network requirements:
VLAN1 needs 200 hostsVLAN2 needs 80 hostsVLAN3 needs 10 hosts2 WAN links
arrow_forward
Describe the purpose and operation of ARP (Address Resolution Protocol) in computer networking. How does ARP help in mapping IP addresses to MAC addresses?
arrow_forward
Cse Gate:-
Assume that the IP address is 108.77.51.70 and subnet mask is 255.255.128.0 what is the subnet number and host number?
arrow_forward
VLSM Exercise
Given the network 192.168.12.0/24, using VLSM that meets the following requirements:
One subnet of 60 hosts for the Marketing VLANOne subnet of 80 hosts for the Sales VLANOne subnet of 20 hosts for the Admin VLANOne 2-host subnet to be assigned to router links
arrow_forward
44. [Theoretical] A student has configured a software router and two workstations on a private LAN. He has set up the network with IP address 10.0.0.0 with subnetting that borrows bits 15, 16 and 17 (ONLY bits 15, 16 and 17, counting from the left) to create eight subnets (six useable). The student has configured one workstation on the second useable subnet as the lowest available host IP address. The router has the highest usable address on this subnet for its interface connection to this network. The student has set up the other workstation using the 138th useable IP address on this subnet.
a. What are these three IP addresses in binary? b. What are these addresses in dotted decimal?
arrow_forward
Fill in the blanks where necessary.
1. A datagram is dropped by a ______________ when TTL is equal to ______________.
2. In a data link layer-level communication, sender wants to send following data in bits 1100111101110101110010101001 using n-bit Parity Check where n is equal to 7. Hence, total size of data block would be _____ bits.
3. An IP Datagram is fragmented at sender and reassembled at receiver when _____________________________________________________________________.
4. A virtual circuit is necessary for an application requiring __________ ______________.
5. The identifier of each link between a host and router or a router and another router on a virtual circuit is ______________.
6. DHCP is the protocol to assign ___ ________________ to hosts in a network _______________.
arrow_forward
56-
A network for a local office requires 4 LAN subnets as follows:
· Subnet A - North Office with 31 hosts;
· Subnet B - East Office with 15 hosts; and
· Subnet C - South Office with 7 hosts.
· Subnet D – West Office with 4 hosts.
Given the IP Address 192.168.15.0 /24 and above described network requirements:
1. Design an optimal address scheme using Variable Length Subnet Mask (VLSM) method;
What will be the subnet mask of Subnet C?
Select one:
A.
255.255.128.255
B.
255.255.192.0
C.
255.255.255.240
D.
255.255.255.192
E.
255.255.255.128
arrow_forward
True or False
1. In 802.11 CSMA/CA, when a station senses the medium to be idle it sends a frame immediately
2. TCP utilizes a single retransmission time-out mechanism. The RTO is picked at the start of the TCP session and remains fixed for the duration of the session.
3. TCP segments can only be lost when router queues overflow.
Please explain if possible,Thank you!!
arrow_forward
Networks 172.16.0.0/16, 172.20.0.0/16 and 172.23.0.0/16 can all be reached out of port S0/1/0 of a routing device. Which address could be used to “summarize” all three of them:
a.
172.24.0.0/12
b.
172.16.0.0/13
c.
172.23.0.0/12
d.
172.16.0.0/14
arrow_forward
24.
In IPV 4, the IP address 200.200.200.200 belongs to
a.
Class A
b.
Class B
c.
Class C
d.
Class D
arrow_forward
Wireless migration describes the movement of a base station or access point from one base station subsystem to another. A faked MAC address must be supplied to the packet in order to connect an access point to a switch. But how does it come about?
arrow_forward
Explain the role of the ARP (Address Resolution Protocol) in local network communication. How does it map IP addresses to MAC addresses?
arrow_forward
Subnetting IP Networks - Given the address block 192.168.30.0/24, create an IP addressing scheme that would allow for 2 subnets with 126 host IP addresses per subnet. Compute for the first two subnets only
arrow_forward
802.11 versatility through which a wireless station travels within the same
subnet from one BSS to another. If the APS are linked to a switch, a frame with a
spoofed MAC address can be required to deliver the AP to the frame correctly.
Why?
arrow_forward
) find the binary equivalent for an IP address such as: 192.68.10.40
arrow_forward
Identify the default subnet mask and CIDR value for the IP address 13.75.137.90 •Please solve it with steps
arrow_forward
Describe the function of the ARP (Address Resolution Protocol) and its role in mapping IP addresses to MAC addresses.
arrow_forward
[ ] As the data packet moves from the lower to the upper layers, headers are added.
[ ] Every network device implements the transport layer.
[ ] In the Ring topology, each computer acts as repeater make error detection and boosts the signal before sending it on.
[ ] In bus topology network media is inexpensive and easy to work with, so it is easier to trouble shoot than other topology.
[ ] Error control only detects errors
[ ] Ethernet is a LAN so it is placed in the second layer of the OSI reference model.
[ ] UDP provides connectionless service and delivers packets quickly. In case of packet loss, UDP does not provide retransmission.
[ ] UDP is the preferred over TCP for transferring a real-time voice over IP networks.
[ ] In a bus topology, each station on the network is connected to two other stations, forming a loop or ring.
[ ] IEEE international Telecommunication Union for creating protocols of internet.
[ ] TCP protocol is slower than UDP?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- The subnet mask in use on a 10.11.12.0 subnet is 255.255.255.128 (or /25) Select the IP address below that is on the same subnet with 10.11.12.1, 10.11.12.2, and 10.11.12.3 A. 10.11.12.42 B. 10.11.12.130 C. 10.0.0.1 D. no correct answerarrow_forwardPacket Tracer - Basic Device Configuration 10.4.3 Packet Tracer - Basic Device Configuration(1).pka Topology You will receive one of three possible topologies. Addressing Table Device Interface IP Address Default Gateway Floor14 G0/0 172.14.5.1/24 N/A Floor14 G0/0 2001:DB8:CAFE:1::1/64 N/A Floor14 G0/0 FE80::1 N/A Floor14 G0/1 172.14.10.1/24 N/A Floor14 G0/1 2001:DB8:CAFE:2::1/64 N/A Floor14 G0/1 FE80::2 N/A Room-145 VLAN 1 172.14.5.35/24 blank Room-146 VLAN 1 172.14.10.35/24 blank Manager-A NIC 172.14.5.50/24 blank Manager-A NIC 2001:DB8:CAFE:1::50/64 blank Reception-A NIC 172.14.5.60/24 blank Reception-A NIC 2001:DB8:CAFE:1::60/64 blank Manager-B NIC 172.14.10.50/24 blank Manager-B NIC 2001:DB8:CAFE:2::50/64 blank Reception-B NIC 172.14.10.60/24 blank Reception-B NIC 2001:DB8:CAFE:2::60/64 blank Objectives · Complete the network documentation. · Perform basic device configurations on a router and a…arrow_forwardExplain the concept of network address resolution (ARP) and its role in translating IP addresses to MAC addresses in local networks.arrow_forward
- plz solve Provided with the topology, the addressing table, you are asked to configure the devices based on the questions below. Addressing Table: Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 10.10.10.1 255.255.255.0 N/A S0/0/0 172.20.20.1 255.255.255.252 N/A R2 S0/0/0 172.20.20.2 255.255.255.252 N/A S0/0/1 172.30.30.2 255.255.255.252 N/A R3 G0/0 10.20.20.1 255.255.255.0 N/A S0/0/1 172.30.30.1 255.255.255.252 N/A PC-A NIC 10.10.10.5 255.255.255.0 10.10.10.1 RADIUS Server NIC 10.10.10.10 255.255.255.0 10.10.10.1 PC-B NIC 10.20.20.5 255.255.255.0 10.20.20.1 PC-C NIC 10.20.20.6 255.255.255.0 10.20.20.1 Web Server NIC 10.20.20.10 255.255.255.0 10.20.20.1 Part 1: Configure Basic Switch Security Configure the following on S1: o Privileged EXEC mode encrypted password is ciscoenpa44. o Console line password is…arrow_forwardICMP is used for addressing error reporting routing forwarding Which of the following is an example of a private IP address? 12.127.18 65.20.10 169.200.224 100.20.2 ARP provides a mapping between IP addresses and MAC Addresses Domain Names Phone Numbers Network Addressesarrow_forwardA network configuration of a modem is given as following:LTE interface IP = 77.110.156.22 MASK 255.255.252.0Default GATEWAY = 77.110.156.1Masquerade NAT, and DNS address = 1.1.1.1Local IP setup: 192.168.128.1 MASK 255.255.255.0And, ip route 192.168.128.0 255.255.252.0 192.168.128.254 Devices numbered R1, R2, R4, R5 are routers. PC is a computer.Image of network with interface names such as f1/0 are added. You must use only static IP addreses and static IP routes to configure the network and make PC able to connect (ping) to Modem.arrow_forward
- Subnet 192.168.0.0/20 to meet the following network requirements: VLAN1 needs 200 hostsVLAN2 needs 80 hostsVLAN3 needs 10 hosts2 WAN linksarrow_forwardDescribe the purpose and operation of ARP (Address Resolution Protocol) in computer networking. How does ARP help in mapping IP addresses to MAC addresses?arrow_forwardCse Gate:- Assume that the IP address is 108.77.51.70 and subnet mask is 255.255.128.0 what is the subnet number and host number?arrow_forward
- VLSM Exercise Given the network 192.168.12.0/24, using VLSM that meets the following requirements: One subnet of 60 hosts for the Marketing VLANOne subnet of 80 hosts for the Sales VLANOne subnet of 20 hosts for the Admin VLANOne 2-host subnet to be assigned to router linksarrow_forward44. [Theoretical] A student has configured a software router and two workstations on a private LAN. He has set up the network with IP address 10.0.0.0 with subnetting that borrows bits 15, 16 and 17 (ONLY bits 15, 16 and 17, counting from the left) to create eight subnets (six useable). The student has configured one workstation on the second useable subnet as the lowest available host IP address. The router has the highest usable address on this subnet for its interface connection to this network. The student has set up the other workstation using the 138th useable IP address on this subnet. a. What are these three IP addresses in binary? b. What are these addresses in dotted decimal?arrow_forwardFill in the blanks where necessary. 1. A datagram is dropped by a ______________ when TTL is equal to ______________. 2. In a data link layer-level communication, sender wants to send following data in bits 1100111101110101110010101001 using n-bit Parity Check where n is equal to 7. Hence, total size of data block would be _____ bits. 3. An IP Datagram is fragmented at sender and reassembled at receiver when _____________________________________________________________________. 4. A virtual circuit is necessary for an application requiring __________ ______________. 5. The identifier of each link between a host and router or a router and another router on a virtual circuit is ______________. 6. DHCP is the protocol to assign ___ ________________ to hosts in a network _______________.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningLINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE LSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning