Network fundamental

For Part 1
You will be using the address range –
For all of your networks you will be using a /26 mask length
The number of PCs on each of your assigned subnets are:
Subnet A    16
Subnet B    4
Subnet C    15
For Part 3
The application layer protocols you will describe are:
•    ftp
•    imap
The first of the above is described in the Cisco courseware,to find out about the second you will have to look elsewhere.

NOTE: the assignment brief consists of two parts
•    This document
•    An individual set of parameters for each student, available from here with each student page indexed via registration number. This is your “unique parameter

web page”.
Where you will submit the assignment: Electronic submission server
When you will submit it: before 11:59:59 (just before noon!) Wednesday 11th March (week 24)
What you will submit: A single document. The contents are summarised below, but see the individual parts for full details:
For Part 1: Tables 1 and 2 completed according to the specification
For Part 2: a description of the efficiency of the address assignment and how to improve it
For Part 3: a description of the two application layers protocols that you have been allocated.
Marking schedule:
Part 1 38% spread equally across the table elements
Part 2: 22% broken down as
•    15% for the technical content
•    7% for presentation and English usage
Part 3: 40% broken down as
•    20% for the technical description of the protocols
•    10% for presentation and English usage
•    10% for including a reference for each protocol and citing it with correct context.

1.    Address assignment

Figure 1 shows a network topology with five IP subnets. By referring to your unique parameter web page you will find you have been allocated:
•    The number of PCs on subnets A, B and C
•    An address range for you to use
•    A subnet mask length to use for ALL the five subnets.

Your task is to assign IP addresses to the devices in the network. You will fill in Table 1 and Table 2 with appropriate information bearing in mind the values on your

unique parameter web page and the following facts:
•    In addition to the PCs, each router interface needs a “host” IP address and is part of the subnet
•    Only the DNS server and Eagle Server are on Subnet D
•    Switches are not allocated IP addresses in this network
•    PCs and servers are to be allocated the lowest IP addresses in each subnet
•    Router interfaces are to be allocated the highest IP addresses in each subnet
•    The subnets are to be allocated in the order A, B, C,D and E  (i.e. A is the lowest address and E is the highest).

In Table 2, only indicate the first and last address of the PCs in each subnet using the lowest block of addresses.

Subnet    Network Address    Mask in dotted decimal form (e.g.    Number of hosts including PCs and router interfaces    Number of unused addresses

Device    Interface    IP Address    Subnet mask in dotted decimal form (e.g. for a /24 mask length)    Default gateway

R1    FA0/0            N/A
FA0/1            N/A
S0/0            N/A

R2    FA0/0            N/A
FA0/1            N/A
S0/0            N/A
1st PC subnet A    NIC
Last PC subnet A    NIC
1st PC subnet B    NIC
Last PC subnet B    NIC
1st PC subnet C    NIC
Last PC subnet C    NIC
DNS server    NIC
Eagle Server    NIC
2.    Analysis of address space usage
You will submit an explanation encompassing:
•    a statement on how many further subnets are available using the address range and mask that you have been allocated
•    a comment on how efficiently the address space you have been allocated has been used
•    a brief description of how the address space you have been allocated could be utilised more efficiently to leave a maximum number of addresses free for future

expansion. You should not state any actual addresses but rather provide a general description of the process used.

3.    Application Layer services
In your unique parameter web page you have been allocated two application layer services. In most cases the name is given as an abbreviation. For each one provide:
•    The full title of the protocol if it is given in abbreviated form (e.g. HTTP is hypertext transfer protocol)
•    a brief description of the purpose of the application
•    the transport layer protocol (or protocols) usually used to transport the application protocol
•    the normal (well known)  transport layer port(s) that the protocol uses (some may use more than one)
•    a very brief description of how the protocol works, for example the key messages sent by the protocol
•    a full reference to either a book, published article or standards document that describes the protocol. The reference should be included at a suitable point in

your description of the protocol. A web reference (except to a standards document) is unacceptable. For example HTTP is described by [1,2,3]. Note how a recognised

reference standard is used here as an example to a standards document, a scholarly article and finally a well-known text book.

4.    References
[1]     R. Fielding et al., Hypertext Transfer Protocol — HTTP/1.1, IETF RFC 2626, June 1999. Available from
[2]     W.C. Janssen, “A next generation architecture for HTTP,” IEEE Internet Computing, Volume 3, Issue 1,  Jan.-Feb. 1999, pp 69-73.
[3]  A.S. Tanenbaum, Computer Networks, Pearson Education, 4th ed., 2007.

Get a 30 % discount on an order above $ 150
Use the following coupon code :