Grossmont College Routers & Subnets Networks to Catch Criminals Paper
Description
Once you have created the network, there are 8 required activities that you must complete in Part 1. Part 2 is an essay question.
Networking Task 2
===========================================================================
Learning objectives – Expose students to the following fundamentals:
- Create a network with multiple subnets
- Interact with the operating system of routers in command mode
- Telnet configuration and remote access to the router OS
Total Possible Score: 100 points
Read the assignment carefully, and then carry out the following instructions as accurately and
completely as possible. ===========================================================================
PART 1 –
Follow the instructions below to design and configure a small business network. Once you have
created the network, there are 8 required activities that you must complete.
Your completed assignment must consist of the following and be submitted online through Canvas in PDF format:
1. A title page
2. A screenshot of your entire network
3. Responses to each of the 8 Requirements (with titles)
You may orientate your pages and screenshots in any way you choose, but you must ensure that all text can be easily read and understood. If necessary, increase the font size in your Packet Tracer windows for clarity.
Note: It is important that all screenshots in this assignment show the Packet Tracer program in background, not just the small active window. A screenshot with no Packet Tracer background will result in penalties.
Part 1 Overall assignment accuracy
- Network design and annotation
- Requirements —————————————————————————————————————————————
Create a network in Packet Tracer that meets the following specifications: - Network ID: 10.12
Page 1 of 6
- One 2911 router connecting 3 Subnets:
- Subnet 1 –
- ? Sales Department: 1 Switch, 5 wired PCs and 1 network printer
- ? Operations Department: 1 Switch, 1 WAP (AP-PT), 1 wired PC and 3 laptops overWiFi using WPA2-PSK encryption
- Subnet 2 –
- ? Finance Department: 1 Switch, 3 wired PCs and 1 network printer
- ? Management Offices: 1 Switch, 2 wired PCs, 1 server, and 1 network printer
- Subnet 3 –
? Admin Department: 1 Switch, 5 wired PCs, 2 servers and 2 network printers
- Use 2950-24 switches throughout the network.
- Where multiple departments are in a single subnet, group each of those department’s switches together under an additional switch in a hierarchical (or tree) topology (i.e. those department’s switches should not connect directly to the router, but should go through another switch first). Note: this only applies when there are multiple departments in one subnet.
- Create and implement a simple IP address scheme for all subnets and hosts. Use the smallest number of bits needed to create the subnet addresses.
- Notate your network with labels and diagrams to ensure its layout and function is easily understood (e.g. use outlines to separate the departments and label each subnet with its subnet address in CIDR notation).Note: Pay very close attention to the descriptions above. Follow the instructions exactly. Once you have created your network, go back and check that it matches precisely with the description above. You will be graded on your accuracy.————————————————————————————————————————————— Required ActivitiesRequirement 1: Create and submit a table which clearly shows your IP address assignment policy, including the network address, subnet addresses, and host addresses. Note: Refer to Chapter 4 of the textbook for an example.Requirement 2: Use the following steps to configure the router via the Command Line Interface (CLI):Note: If you are asked “Continue with configuration dialog?”, answer “no” and proceed.1. Change the router’s host name to BizR1
2. Set a password for Privilege EXEC access
3. Set a banner of the day
4. Configure and activate the router’s three ports 5. Configure the router for remote access
Page 2 of 6
Provide a screenshot of the router’s CLI window showing all of the commands for the above configuration settings being entered successfully. You may submit multiple screenshots in order to show all of the commands.
Requirement 3: Provide a screenshot showing a completed ping from a WiFi connected host in subnet 1 to any host in another subnet. Note: The screenshot must show the ping command and all 4 replies in the CLI window of the host, not the Packet Tracer simulation window.
Requirement 4: Provide a single screenshot showing the router’s CLI window after running the “show run” command. Note: this command displays multiple configuration pages that cannot all be shown in one window, so your screenshot should just capture the last page.
Requirement 5: Provide a screenshot showing the router’s CLI window after running the “ip interface brief” command.
Requirement 6: Run the “service password-encryption” command. Now telnet from a WiFi connected host in subnet 1 to the router (e.g. C:/>telnet 10.12.y.x) and run the “show run” command. Provide a single screenshot of the host’s CLI window showing the last page of the resulting output.
Requirement 7: Telnet from a host in subnet 2 to the router, and run the “ip interface brief” command. Provide a screenshot of the host CLI window showing a successful telnet and the resulting output.
Requirement 8: Telnet from a host in subnet 3 to the router, and run the “show IP route” command. Provide a screenshot of the host CLI window showing the router’s routing table.
===========================================================================
PART 2 –
1. Read the following article and answer the prompt below:
a. https://www.bbc.com/news/world-57394831
b. In assignment one we discussed what happens when official networks fail. This week’s
prompt is about governments using networks to catch criminals. Is this overreach, or is this the future of crime fighting? Are there safeguards that should be put in place?
Part 2 Rubric:
- 10 points for structure / following directions (e.g. spelling, grammar, paragraphs, etc.).
- 5 points for references (although you may reference the textbook, it must not be your onlyreference – full points will be awarded for at least 3 notated references). References do not needto be in APA format, but they must be clear and concise.
- 30 points for main content (between 3 and 5 content paragraphs plus an intro and a conclusionparagraph – answer the question fully).
Page 3 of 6
- 5 points for excellence (wow me, tell me something new, give me your brilliantly formed argument, show exceptional in-depth research).
______________________________________________________________________________
Upload your completed assignment to Canvas as a PDF file. The assignment must include a title page which includes all appropriate information (e.g. name, assignment, class, etc.). Your responses to Part 1 and Part 2 should both be included in the one assignment submission.
Page 4 of 6
Cisco IOS Commands & Access Levels
Cisco uses the same OS for its switches and routers. The commands explained here are Cisco product-specific and are used to configure switches and routers via the command mode interface.
Level
Modes
Prompt Types
Description
1
User EXEC
Switch> Router>
Access only “basic” monitoring commands
2
Privileged EXEC
Switch# Router#
Access all switch or router commands, Command to enter this mode: Router>enable
3
Global Config
Switch(config)# Router(config)#
- •
Global setting configuration mode Command to enter this mode: Router#configure terminal
4
Interface Config
Switch(config-if)# Router(config-if)#
Interface (or port) configuration mode to set up the IP configuration of a port Sample command to enter this mode: Router(config)#interface fa0/0
5
Line Config
Switch(config-line)# Router(config-line)#
Line configuration mode to modify the operation of a terminal line
Sample command to enter this mode: Router(config)#line console 0
Note: Pay close attention to the level, mode or prompt type when you interact with the OS. If a command is issued in a mismatched mode then IOS will not accept the input.
Page 5 of 6
Frequently Used Commands (for both Cisco Routers and Switches)
Basic Commands
Router>enable
Router#configure terminal Router(config)#hostname R1 Router(config)#enable secret xxxx
mode
Router(config)#banner motd “Restricted” Router(config)#exit
# change from user EXEC to privileged EXEC # change from priv. EXEC to global conf. mode
# give a unique name (R1) to router
# set password to access Privileged EXEC
# motd – message of the day
# exit returns to the previous level/mode
Port/Interface Configuration Commands (assigning an IP address)
Router(config)#interface fa0/0 # to configure a particular port/interface Router(config-if)#ip address x.x.x.x 255.255.255.0 # to configure an IP address and its subnet mask
Router(config-if)#no shutdown
Enable Remote Access (Telnet)
Router(config)#line console 0 Router(config-line)#password xxxx Router(config-line)#login Router(config)#line vty 0 4 Router(config-line)#password xxxx
Informational Commands
Router(config)#service password-encryption Router#show ip interface brief
Router#show run
Router#show ip route
# configure console port login/password
# set password to access console port # enables users to login
# open remote link (telnet) ports 0-4 (for 5 users)
# to remotely access privileged EXEC mode
# to encrypt configured passwords # show the summary of IP configuration # show current general configuration
# to activate a router port (no need for switch port)
# show current routing table
Note: Italicized text indicates the variables in each command – you should alter this as required.
Note: When you enter passwords, the cursor will not move as you type – this is normal.
Page 6 of 6
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."