You are on page 1of 3

Assignment 1, 2 and 3 Test Max. Marks: 5 + 10] 3hrs. Note: 1. Answer should be in the form of report including snapshots.

2. Wherever necessary assume your own values. (but indicate in the report properly) 3. Final evaluation is based on report. ____________________________________________________________________________________________ A. Let us investigate the Internet Control Message Protocol (ICMP) by running the traceroute program and capturing the generated packets. Answer the following questions based on your capture 1) Print the traceroute messages. 2) What fields change in the IP headers among the packets that were sent by your computer? 3) Describe the pattern you observe in the Identification field values of the IP packets that were sent by your computer. 4) What fields change in the ICMP (or UDP) headers among the packets that were sent by your computer? 5) How many data bytes were sent in each Echo (ping) request message? Explain how you determined the number of data bytes. What are these bytes? 6) Examine any TTL exceeded packet in your capture. It has more fields than the corresponding Echo (ping) request packet. What is included in those fields? B. Instructions A company has decided to invest in a new network infrastructure. The company has the following structure and access requirements: There are seven (7) departments in the company. Each department has to have their own LAN for manageability and security: 1. Management 50 hosts 2. IT support 250 hosts 3. Production 650 hosts 4. Purchases & sales 700 hosts 5. Research & development 120 hosts [Time:

6. Public relations 300 hosts 7. Administration 500 hosts There is also one publicly accessible LAN which contains the web server, file server and email server of the company. The company has obtained the IP address 141.70.0.0 from APNIC. The web server has the IP address 141.70.5.1, the email server the IP address 141.70.5.2 and the file server has the address 141.70.5.3. An external web server should be connected as show in the diagram and configured with IP address 197.10.10.10 to be used to test your ACLs. The network diagram for company can be seen in figure 1.

Figure 1: Network diagram The following access restrictions apply on the network Hosts from the Internet can only access the web, file and e-mail server in the public LAN; All LANs have access to the Internet but only using HTTP; All LANs need to access the e-mail server in the public LAN; Only the Management, IT support and Sales LAN can have full access the web and file server in the public LAN. Others should be able to access the web server only; Only IT support has access to the management LAN. Task:

It is your task to develop the subnet plan, configure the routers, implement RIP routing and the necessary ACLs for the company based on the diagram in figure one and the access control restrictions specified above. Use Packet Tracer (version 4.1) to complete this task.

You might also like