Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme
Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme
Topology
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/0
N/A
G0/1
N/A
Lo0
N/A
Lo1
N/A
S1
VLAN 1
N/A
N/A
N/A
PC-A
NIC
PC-B
NIC
Objectives
Part 1: Design a Network Subnetting Scheme
Part 2: Configure the Devices
Part 3: Test and Troubleshoot the Network
Background / Scenario
In this lab, starting from a single network address and network mask, you will subnet the network into multiple subnets. The subnet scheme should be based on the number of host computers required in each subnet, as well as other network considerations, like future network host expansion.
After you have created a subnetting scheme and completed the network diagram by filling in the host and interface IP addresses, you will configure the host PCs and router interfaces, including loopback interfaces. The loopback interfaces are created to simulate additional LANs attached to router R1.
After the network devices and host PCs have been configured, you will use the ping command to test for network connectivity.
This lab provides minimal assistance with the actual commands necessary to configure the router. However, the required commands are provided in Appendix A. Test your knowledge by trying to configure the devices without referring to the appendix.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table at this end of the lab for the correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you are unsure, contact your instructor.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing. An Ethernet straight-through cable may be used between the router and PC-B. If using another Cisco router model, it may be necessary to use an Ethernet crossover cable.
Design a Network Subnetting Scheme
Create a subnetting scheme that meets the required number of subnets and required number of host addresses.
In this scenario, you are a network administrator for a small subdivision within a larger company. You must create multiple subnets out of the 192.168.0.0/24 network address space to meet the following requirements:
The first subnet is the employee network. You need a minimum of 25 host IP addresses.
The second subnet is the administration network. You need a minimum of 10 IP addresses.
The third and fourth subnets are reserved as virtual networks on virtual router interfaces, loopback 0 and loopback 1. These virtual router interfaces simulate LANs attached to R1.
You also need two additional unused subnets for future network expansion.
Note: Variable length subnet masks will not be used. All of the device subnet masks will be the same length.
Answer the following questions to help create a subnetting scheme that meets the stated network requirements:
How many host addresses are needed in the largest required subnet? _____________________
What is the minimum number of subnets required? _________________________________
The network that you are tasked to subnet is 192.168.0.0/24. What is the /24 subnet mask in binary?
________________________________________________________________________________
The subnet mask is made up of two portions, the network portion, and the host portion. This is represented in the binary by the ones and the zeros in the subnet mask.
In the network mask, what do the ones represent? ________________________________________
In the network mask, what do the zeros represent? _______________________________________
To subnet a network, bits from the host portion of the original network mask are changed into subnet bits. The number of subnet bits defines the number of subnets. Given each of the possible subnet masks depicted in the following binary format, how many subnets and how many hosts are created in each example?
Hint: Remember that the number of host bits (to the power of 2) defines the number of hosts per subnet (minus 2), and the number of subnet bits (to the power of two) defines the number of subnets. The subnet bits (depicted in bold type face) are the bits that have been borrowed beyond the original network mask of /24. The /24 is the slash prefix notation and corresponds to a dotted decimal mask of 255.255.255.0.
(/25) 11111111.11111111.11111111. 10000000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________, Number of hosts? ________________
(/26) 11111111.11111111.11111111. 11000000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________, Number of hosts? ________________
(/27) 11111111.11111111.11111111. 11100000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________ Number of hosts? ________________
(/28) 11111111.11111111.11111111. 11110000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________ Number of hosts? _________________
(/29) 11111111.11111111.11111111. 11111000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________ Number of hosts? _________________
(/30) 11111111.11111111.11111111. 11111100
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________ Number of hosts? _________________
Considering your answers, which subnet masks meet the required number of minimum host addresses?
________________________________________________________________________________
Considering your answers, which subnet masks meets the minimum number of subnets required?
________________________________________________________________________________
Considering your answers, which subnet mask meets both the required minimum number of hosts and the minimum number of subnets required?
________________________________________________________________________________
When you have determined which subnet mask meets all of the stated network requirements, you will derive each of the subnets starting from the original network address. List the subnets from first to last below. Remember that the first subnet is 192.168.0.0 with the newly acquired subnet mask.
Subnet Address / Prefix Subnet Mask (dotted decimal)
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
Complete the diagram showing where the host IP addresses will be applied.
On the following lines provided, fill in the IP addresses and subnets masks in slash prefix notation. On the router, use the first usable address in each subnet for each of the interfaces, Gigabit Ethernet 0/0, Gigabit Ethernet 0/1, loopback 0, and loopback 1. Fill in an IP address for both PC-A and PC-B. Also enter this information into the Addressing Table on Page 1.
Configure the Devices
In Part 2, set up the network topology and configure basic settings on the PCs and router, such as the router Gigabit Ethernet interface IP addresses, and the PC’s IP addresses, subnet masks, and default gateways. Refer to the Addressing Table for device names and address information.
Note: Appendix A provides configuration details for the steps in Part 2. You should attempt to complete Part 2 prior to reviewing Appendix A.
Configure the router.
Enter into privileged EXEC mode and then global config mode.
Assign the R1 as the hostname for the router.
Configure both the G0/0 and G0/1 interfaces with IP addresses and subnet masks, and then enable them.
Loopback interfaces are created to simulate additional LANs on R1 router. Configure the loopback interfaces with IP addresses and subnet masks. After they are created, loopback interfaces are enabled, by default. (To create the loopback addresses, enter the command interface loopback 0 at the global config mode)
Note: You can create additional loopbacks for testing with different addressing schemes, if desired.
Save the running configuration to the startup configuration file.
Configure the PC interfaces.
Configure the IP address, subnet mask, and default gateway settings on PC-A.
Configure the IP address, subnet mask, and default gateway settings on PC-B.
Test and Troubleshoot the Network
In Part 3, you will use the ping command to test network connectivity.
Test to see if PC-A can communicate with its default gateway. From PC-A, open a command prompt and ping the IP address of the router Gigabit Ethernet 0/1 interface. Do you get a reply? _________________
Test to see if PC-B can communicate with its default gateway. From PC-B, open a command prompt and ping the IP address of the router Gigabit Ethernet 0/0 interface. Do you get a reply? ________________
Test to see if PC-A can communicate with PC-B. From PC-A, open a command prompt and ping the IP address of PC-B. Do you get a reply? _________________
If you answered “no” to any of the preceding questions, then you should go back and check all of your IP address and subnet mask configurations, and ensure that the default gateways have been correctly configured on PC-A and PC-B.
If you verify that all of the settings are correct, and you can still not ping successfully, then there are a few additional factors that can block ICMP pings. On PC-A and PC-B within Windows, make sure that the Windows Firewall is turned off for the Work, Home, and Public networks.
Experiment by purposely misconfiguring the gateway address on PC-A to 10.0.0.1. What happens when you try and ping from PC-B to PC-A? Do you receive a reply?
____________________________________________________________________________________
____________________________________________________________________________________
Reflection
Subnetting one larger network into multiple smaller subnetworks allows for greater flexibility and security in network design. However, what do you think some of the drawbacks are when the subnets are limited to being the same size?
_______________________________________________________________________________________
_______________________________________________________________________________________
Why do you think the gateway/router IP address is usually the first usable IP address in the network?
_______________________________________________________________________________________
© 2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5
© 2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 5
image1.png
image2.png
image3.jpeg
- WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO ChatGPT.NO PLAGIARISM – CUSTOM PAPER
Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.
We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.
Why Choose AcademicWritersBay.com?
- Our papers are 100% original, custom-written from scratch.
- We’re here to support you around the clock, any day of the year.
- You’ll find our prices competitive and reasonable.
- We handle papers across all subjects, regardless of urgency or difficulty.
- Need a paper urgently? We can deliver within 6 hours!
- Relax with our on-time delivery commitment.
- We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
- Benefit from unlimited amendments upon request to get the paper you envisioned.
- We pledge our dedication to meeting your expectations and achieving the grade you deserve.
Our Process: Getting started with us is as simple as can be. Here’s how to do it:
- Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
- Provide the specifics of your paper in the “PAPER DETAILS” section.
- Select your academic level, the deadline, and the required number of pages.
- Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
- Follow the simple payment instructions and soon, our writers will be hard at work on your paper.
AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.