The purpose of the Packet Tracer activity is to help you understand how Variable Length Subnet Mask (VLSM) is used to segment a large network into multiple smaller networks and to make more efficient use of the IP address space. In this lab you will design, document and implement a network addressing scheme using VLSM. Finally you will test the design to insure that the network has complete connectivity, you will also use Cisco IOS show commands to confirm proper configuration.
- Design and document an addressing scheme based on requirements.
- Apply a basic configuration to the devices.
- Configure static routing between ISP routers.
- Configure EIGRP routing in Region 1 and RIPv2 routing Region 2.
- Disable routing updates on appropriate interfaces.
- Configure and redistribute default routes.
- Verify full connectivity between all devices in the topology.
A subnet allows the flow of network traffic between hosts to be segregated based on a network configuration. By organizing hosts into logical groups, subnetting can improve network security and performance.
Perhaps the most recognizable aspect of subnetting is the subnet mask. Like IP addresses, a subnet mask contains four bytes (32 bits) and is often written using the same “dotted-decimal” notation. For example, a very common subnet mask in its binary representation
11111111 11111111 11111111 00000000
is typically shown in the equivalent, more readable form
Applying a Subnet Mask:
A subnet mask neither works like an IP address, nor does it exist independently from them. Instead, subnet masks accompany an IP address and the two values work together. Applying the subnet mask to an IP address splits the address into two parts, an “extended network address” and a host address. For a subnet mask to be valid, its leftmost bits must be set to ‘1’. For example,
00000000 00000000 00000000 00000000
is an invalid subnet mask because the leftmost bit is set to ‘0’. Conversely, the rightmost bits in a valid subnet mask must be set to ‘0’, not ‘1’. Therefore,
11111111 11111111 11111111 11111111
All valid subnet masks contain two parts: the left side with all mask bits set to ‘1’ (the extended network portion) and the right side with all bits set to ‘0’ (the host portion), such as the first example above.
Search for Additional CCNA Labs: [adsense_id=”4″] VLSM-Challenge (1.2 MiB, 3,472 hits) Packet Tracer 5-3-3 By Cisco (48.3 MiB, 1,815 hits)
You do not have permission to download this file.
VLSM-Challenge (1.2 MiB, 3,472 hits)
Packet Tracer 5-3-3 By Cisco (48.3 MiB, 1,815 hits)