GO/2 Go/o 50/1 G0/1 GO/1

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
Router A
Router B
Router C
GO/2
GO/2
GO/o
GO/1
GO/1
GO/1
A1
A2
C2
A1
200 hosts
A2
200 hosts
100 hosts
C1
100 hosts
C2
50 hosts
PTP 1
PTP
PTP 2
PTP
1. Create the network above as documented, using the host amounts in the chart above
for subnetting. Note the VLANS on routers A and C (VLANS A1 and A2 are separate
networks, as are VLANS C1 and C2). All of these VLANS must use different VLAN
numbers of your choosing.
2. If your last name has an odd number of letters, use 192.168.0.0/16 as your address
range to subnet. if your last name has an even number of letters, use 10.0.0.0/8 as your
address range to subnet.
3. Use Single Area OSPF for routing. Be sure to include the VLANS in OSPF.
4. Assign hostnames to the switches and routers.
5. Apply switch security on the switches by shutting down unused switch ports and placing
them in an unused VLAN.
6. Verify that all devices can ping each other.
Transcribed Image Text:Router A Router B Router C GO/2 GO/2 GO/o GO/1 GO/1 GO/1 A1 A2 C2 A1 200 hosts A2 200 hosts 100 hosts C1 100 hosts C2 50 hosts PTP 1 PTP PTP 2 PTP 1. Create the network above as documented, using the host amounts in the chart above for subnetting. Note the VLANS on routers A and C (VLANS A1 and A2 are separate networks, as are VLANS C1 and C2). All of these VLANS must use different VLAN numbers of your choosing. 2. If your last name has an odd number of letters, use 192.168.0.0/16 as your address range to subnet. if your last name has an even number of letters, use 10.0.0.0/8 as your address range to subnet. 3. Use Single Area OSPF for routing. Be sure to include the VLANS in OSPF. 4. Assign hostnames to the switches and routers. 5. Apply switch security on the switches by shutting down unused switch ports and placing them in an unused VLAN. 6. Verify that all devices can ping each other.
Expert Solution
steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY