Task Instructions: Two Sections, Section A And Section B

Task Instructions There Are Two Sections Section A And Section B Total

There are two sections, SECTION A and SECTION B. Total marks are 100. There is one Word file and one Packet Tracer file to be created. Study the given network diagram. You will be assigned TWO IP addresses to configure this network. You need to email the lecturer to request these addresses. The first IP address is for the WAN links, and the second is for the LANs. Confirm receipt of your assigned IP addresses via email. Use VLSM to configure the LAN and WAN links efficiently, maximizing subnetting effectiveness.

All links between routers are WAN links. The assessment is divided into 4 stages:

  1. Subnet the IP address: state the subnet mask, assign the lowest IP addresses to PC1 (LAN2) and PC2 (LAN6), and assign the highest IP addresses as default gateways.
  2. Configure the four routers (Router 1 to Router 4): set passwords, name routers, configure interfaces/PCs, set up TELNET with passwords and MOTD, save configurations, and verify basic operations.
  3. Ping from PC1 (LAN2) to PC2 (LAN6) to test connectivity.
  4. Configure EIGRP routing protocol (AS number 20) on all routers, set clock-rate as specified, and verify routing.

Submission requirements:

  • 2 IP addresses assigned (including masks)
  • Subnet IDs for each router with masks
  • WAN link subnet IDs with masks
  • IP addresses and masks for each router interface (Ethernet and WAN)
  • IP addresses and default gateways for PC1 and PC2
  • Number of usable IP addresses remaining for WAN links and LANs
  • Router table for Router 3
  • Cost/metric from Router 3 to PC2 and how it is calculated
  • Successful ping from PC1 to PC2 in Packet Tracer, and analysis of router tables after configuration and reboot

Paper For Above instruction

The task at hand involves comprehensive network design and configuration using VLSM and EIGRP routing protocol. The primary goal is to plan, subnet, configure, and verify a network based on a provided diagram, underscoring the critical skills in enterprise network management, routing, and security.

Initially, receiving assigned IP addresses is a foundational step. The network administrator must email the instructor to obtain two specific IP addresses—one for WAN links and another for LAN segments. These addresses form the backbone of subnetting, which employs VLSM to allocate the most efficient address spaces. VLSM allows for flexible subnet sizes, optimizing IP utilization especially in scenarios where different subnets have varying host requirements. Once obtained, the assigned IP addresses, including their subnet masks, are documented carefully for subsequent configuration.

Subnetting in this context entails determining subnet IDs for each router’s interfaces and the WAN links connecting them. The smallest IPs within each subnet are assigned to hosts like PCs, with the largest reserved as the default gateway. For example, PC1 on LAN2 and PC2 on LAN6 should receive the lowest IPs in their respective subnets, facilitating straightforward network management. The subnet IDs for routers and WAN links must be precisely calculated to ensure correct routing and minimal IP wastage. Typically, this involves dividing the allocated IP space into subnets based on the number of hosts required per subnet, then saving these subnet IDs for configuration.

Following subnetting, the configuration phase involves setting up the routers themselves. Each router—labeled as Router 1 through Router 4—must be named and secured with a password ('class'), ensuring network security. Interface configurations involve assigning IP addresses and subnet masks to each interface, connecting routers via WAN links, and configuring PCs with IP addresses, subnet masks, and default gateways. Enabling Telnet access on Router 3 requires setting a password ('xyz123') and defining a message-of-the-day (MOTD) to enhance security and management. After configuration, saving settings and verifying operational status through ping tests and interface checks are critical steps to ensure a functional physical and logical network.

The testing phase primarily involves verifying connectivity. Successfully pinging from PC1 to PC2 confirms that routing is functioning correctly. If ping fails, troubleshooting involves checking IP configurations, routing tables, and link statuses. Subsequently, routing protocol configuration using EIGRP (AS number 20) must be implemented on all routers. This step ensures dynamic routing and optimal path selection across the network, especially essential in more complex or scalable setups.

Setting the clock rate on routers is vital for serial WAN links, allowing for synchronization necessary for data transmission. Once EIGRP is configured, the router tables are examined—particularly for Router 3—to verify the best routes and metrics. The route table entries reflect the routing paths learned via EIGRP, and their differences before and after reboot shed light on route convergence and stability. Calculation of metrics evaluates the cost factors like bandwidth, delay, and load, which influence route selection within EIGRP.

Finally, the assignment includes a critical analysis component—comparing router tables pre- and post-reboot, discussing any variations, and understanding why such differences occur in dynamic routing environments. The overall objective is to demonstrate proficiency in subnet planning, secure router configuration, dynamic routing protocols, and troubleshooting network connectivity issues, embodying core competencies in network design and management.

References

  • Comer, D. E. (2018). Internetworking with TCP/IP Volume One: Principles, Protocols, and Architecture (6th ed.). Pearson Education.
  • Cisco. (2020). Cisco Networking Academy: CCNA Routing and Switching Fundamentals. Cisco Systems.
  • Kurose, J., & Ross, K. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson.
  • Odom, W. (2019). CCNA 200-301 Official Cert Guide. Cisco Press.
  • Sequeira, T. (2019). Networking Fundamentals: CCNA Exploration Companion Guide. Cisco Press.
  • Perkins, P. (2023). Routing Protocols and Architectures. In Network Protocols. Springer.
  • Stallings, W. (2020). Data and Computer Communications (11th ed.). Pearson.
  • Hucaby, D. (2018). CCNP Routing and Switching SWITCH 300-115 Official Cert Guide. Cisco Press.
  • Moloney, V., & Kurniawan, B. (2021). Practical Network Design with Cisco devices. Packt Publishing.
  • Martini, M. (2022). Network Security Principles. O'Reilly Media.