Question
The Mandalorian You have heard the story of Din Djarin the famous bounty hunter in the Star Wars universe. He is part of the elite
The Mandalorian
You have heard the story of Din Djarin the famous bounty hunter in the Star Wars universe. He is part of the elite clan of warriors who call themselves The Mandalorians. After having multiple conflict with the Imperial army, they have grown considerably small in numbers and now live in the hidings. Most of them live in the planet of Nevarro where there are multiple tribes scattered in the different parts of the planet. They call this tribes enclaves. We will address them as enclaves or branches. There are six enclaves in total which are code named, the code names are: Naboo, Tatooine, Bespin, Dagobath, Endor and Hoth. Among these six branches Tatooine and Naboo are two main branches which houses high rank Mandolorian warriors and tribe leaders. The branches have to maintain communication among them to share resources and warn each other or fend off any attack from the Imperial Army. You are contacted by an Armorer to act as the network engineer to design and implement a network to establish communication among all the branches according to their requirements. In the following table the distance is given in kilometer between each of the branches and the number of devices operated at each branch are mentioned in brackets beside the name of each branch.
Naboo | Tatooine | Bespin | Dagobath | Endor | Hoth | |
Naboo (1024) | 0 | |||||
Tatooine (526) | 1096 | 0 | ||||
Bespin (312) | 1160 | 202 | 0 | |||
Dagobath (128) | 851 | 653 | 584 | 0 | ||
Endor (156) | 97 | 364 | 447 | 291 | 0 | |
Hoth (234) | 417 | 220 | 184 | 340 | 782 | 0 |
*The numbers in brackets () specify the number of devices in the branch and the values in the table specifies the distance (in kilometers) between branches. *
While creating the network infrastructure you were provided with certain restrictions and rules that you need to follow:
- Choose an appropriate network address and create subnets to assign to each of the branches with the least amount of waste.
- But remember you can use only the even IP addresses from the available IP range of a network address i.e. 192.168.1.0/24 has 256 possible IP addresses, but you can take only 192.168.1.2/24, 192.168.1.4/24, 192.168.1.6/24 etc. as host IP addresses.
- Bespin, Dagobath, Endor and Hoth will use private addressing while the other two branches will use public addressing
- Endor branch will have a web server and a DNS server. This web server will act as bounty tracking board and whenever someone connects to this web server it will greet the visitor with the message See you later space cowboy!
- As mentioned before Naboo and Tatooine houses elite members of the clan so, for security they will use static addressing while the other branches IP address will be assigned using DHCP
- Naboo and Tatooine will be communicating a lot that is why they asked for an email server to be set up so, that can exchange mail among them
- Endor and Bespin will have printers to track bounty records
- Establish connections among all the branches with the shortest route possible. When establishing connection keep the following things in mind:
- There has to be a backup system so, that missing route entries can be handled properly. You cannot use default routes to communicate or exchange packets. Packets have to travel through either dynamic or static routes. For an ISP router you can use the default route but for communicating among the given branches in the above table you have to use static or dynamic routing
- Configure half of the network to be routed dynamically and another half statically
- There have to exist at least one floating route among the branches
- Showing two end devices per branch is enough to represent the whole population of each branch. You have to remember that, Hoth and Dagobath will have one laptop in each of the branch
- You have to be able to ping from one branch to another after all the setups are properly completed
Deliverables
- The network mentioned above should be implemented in packet tracer, with necessary devices and full configuration.
- After completion you should be able to test the conditions imposed.
- You will have to submit the followings:
- Network topology diagram with proper labels
- The configuration commands of all the routers that you have implemented.
- VLSM tree
- IP address table
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started