Wide Area Networks (WAN) Design and Troubleshooting

1. Describe the three hierarchical approach in designing Wide Area Networks (WAN). 2. Describe the network troubleshooting process. 3. Explain with examples TCP/IP utilities role in network troubleshooting. 4. You have subnetted the 172.30.10.0 network with a mask of 255.255.255.192. How many usable subnets will you have and how many hosts are available on each subnet?

1. Wide Area Networks (WAN) are designed using a hierarchical approach, which involves dividing the network into three layers: the core layer, the distribution layer, and the access layer. 2. Network troubleshooting is a process used to identify and resolve issues in a computer network. 3. TCP/IP utilities play a crucial role in network troubleshooting. 4. In subnetting the network 172.30.10.0 with a mask of 255.255.255.192, there will be 62 usable subnets and each subnet will have 62 hosts available.

Wide Area Networks (WAN) Design

Wide Area Networks (WAN) are designed using a hierarchical approach, which involves dividing the network into three layers: the core layer, the distribution layer, and the access layer. The core layer is responsible for high-speed connectivity between different locations and is typically implemented using high-capacity routers. The distribution layer connects the core layer to the access layer and is responsible for routing traffic between different subnets. The access layer provides connectivity to end devices such as computers, printers, and servers.

Network Troubleshooting

Network troubleshooting is a process used to identify and resolve issues in a computer network. It involves several steps, including identifying the problem, gathering information, analyzing the data, and implementing a solution. Common troubleshooting techniques include checking physical connections, verifying network configurations, and using network diagnostic tools.

TCP/IP Utilities in Network Troubleshooting

TCP/IP utilities play a crucial role in network troubleshooting. These utilities provide various functions, such as testing network connectivity, diagnosing network problems, and gathering network statistics. Examples of TCP/IP utilities include ping, traceroute, ipconfig, and netstat. Ping is used to test network connectivity by sending ICMP echo requests to a specific IP address. Traceroute is used to trace the route packets take from the source to the destination. Ipconfig is used to view and modify IP configuration settings, while netstat provides information about active network connections and listening ports.

Subnetting the Network

In subnetting the network 172.30.10.0 with a mask of 255.255.255.192, we are using a /26 subnet mask. This means that we are borrowing 6 bits from the host portion of the IP address to create subnets. With 6 borrowed bits, we can create 2^6 = 64 subnets. However, the first and last subnets are reserved, so we have 64 - 2 = 62 usable subnets. Each subnet will have 2^(32-26) - 2 = 62 hosts available. The -2 is for the network and broadcast addresses, which cannot be assigned to hosts. Therefore, each subnet will have 62 usable hosts.
← Cryptographic security product lifecycle what you need to know What is the most popular programming language in 2021 →