This document provides a two-page report on considering Frame Relay as a connectivity option between the Pittsburgh and Cleveland offices. It compares Frame Relay to other WAN technologies like ATM and dedicated leased lines. Frame Relay is presented as a cost-effective option that provides connectivity through virtual circuits while only paying for the bandwidth used. Other options are discussed but Frame Relay is ultimately recommended as the best fit for the needs of this project.
1. NETW 208 Quiz 1
For more classes visit
www.snaptutorial.com
1. (TCO 2) _____ is the layer in hierarchical network design that is
concerned with switching packets as fast as possible.
2. (TCO 2) The point at which the customer turns over control to the
WAN service provider refers to the _____.
3. (TCO 2) _____ is an industry-standard, switched data-link-layer
protocol that handles multiple virtual circuits using HDLC encapsulation
between connected devices
4. (TCO 6) Asymmetric encryption is utilized in VPNs to
5. (TCO 6) What contributes to data integrity and authentication by
ensuring that unauthorized persons do not tamper with transmitted
messages?
6. (TCO 6) IEEE 802.16 is defined as
7. (TCO 3) _____ is used to establish and configure different network
layer protocols
8. (TCO 3) _____ is one of the PPP LCP options that peer routers use to
identify fault conditions.
9. (TCO 3) The third phase of PPP establishment is
10. (TCO 3) Which of the following is a characteristic of PAP?
==============================
2. NETW 208 Quiz 2
For more classes visit
www.snaptutorial.com
1. (TCO 4) What is the command that verifies that Frame Relay is
running correctly?
2. (TCO 4) Frame Relay can partition a physical interface into multiple
virtual interfaces called _____.
3. (TCO 4) The difference between a star topology and a frame relay star
topology is that the latter has _____.
4. (TCO 4) Which one of these answers is not an advantage of Frame
Relay?
5. (TCO 7) This person uses e-mail or another means to lure others into
providing sensitive information, such as credit card numbers or
passwords.
6. (TCO 7) Applying a specific algorithm to data to alter their
appearance, making them incomprehensible to those who are not
authorized to see the information, is known as
7. (TCO 7) Over the years the types and methods of security attacks
have evolved. What kind of network attack became prevalent starting
around 1985?
8. (TCO 7) Securing router network services most commonly needs to
be done at what IOS layer?
3. 9. (TCO 7) What type of attack uses a compromised host to pass traffic
through a firewall that would otherwise be dropped or blocked?
10. (TCO 7) Which network policy defines the standards for connecting
to the internal network from outside the organization?
=========================
NETW 208 Quiz 3
For more classes visit
www.snaptutorial.com
1. (TCO 1) Which of the following choices displays IPv6 neighbor
discovery cache information?
2. (TCO 1) _____ is an integration method in which a node has
implementation and connectivity to both an IPv4 and IPv6 network
3. (TCO 1) Dynamic NAT maps private IP addresses to public addresses
drawn from a
4. (TCO 1) When IPv6 is implemented, the routing protocol RIPng will
have these features, but it
5. (TCO 1) The command to display information about the total amount
of active NAT translations, NAT configuration parameters, how many
addresses are in the poll, and how many have been allocated is
6. (TCO 5) _____ control(s) access to a network by analyzing the
incoming and outgoing packets and passing or halting them based on
stated criteria
7. (TCO 5) Some of the ways that ACLs should be placed in a network
include all of the following except
4. 8. (TCO 5) To configure a numbered ACL-designated 5 that would
permit network 192.168.10.0/24,you would enter _____.
9. (TCO 5) The established parameter in the extended ACL
configuration means it
10. (TCO 5) access-list 100 permit tcp 192.168.20.5 0.0.0.0 0.0.0.0
255.255.255.255 eq 80
Base on the access list above, to what destinations will the source device
be allowed to web browse?
================================
NETW 208 Week 1 ilabConfiguring a Dedicated
VPN Using a Tunnel and Data Encryption
For more classes visit
www.snaptutorial.com
Configuring a Dedicated VPN Using a Tunnel and Data Encryption iLab
There are two sections to this iLab.
Section 1: Configuring a Dedicated VPN Using a Tunnel and Data
Encryption iLab (20 points)
Section 2: Managing Remote Access Sessions iLab (20 points)
===============================
NETW 208 Week 1 WAN Technologies You decide
5. For more classes visit
www.snaptutorial.com
eek 1: WAN Technologies – You Decide
Congratulations! You have recently been promoted to coordinate the
design and installation of a new network at your company’s branch
offices in Cleveland. The manager at this location (Kim) is a hands-on
type of person, but possesses little technical knowledge of data
communications. Kim has requested that you keep her updated along
each step of the network’s design and configuration process. She has
also requested that you explain each of the available options, along with
the advantages and disadvantages of each decision that you have made.
Your Role/Assignment
After reviewing Chapters 1 and 6, provide Kim with a two-page detailed
report on how you plan to start this project, and a complete explanation
of the options available for WAN and Teleworker connectivity. Also, be
sure to explain the basis of the branch office network and teleworker
connectivity design in terms of the two models discussed in chapter 1.
While Kim is a marketing genius, keep in mind that she is not a tech-
savvy person. Be sure to explain this very clearly so Kim is not
frustrated and lost during the first phase of this project.
6. K E Y P L A Y E R S
Ken Rogers, Corporate Manager
Ken Rogers is the corporate manager of the Pittsburgh, PA office. Ken
has control over the new Cleveland branch office on a corporate level.
Even though Kim is the branch manager of the Pittsburgh office, she has
to get final approval on all designs (especially in the area of technology)
and purchases from Ken.
Kim Brown, Branch Manager
Kim Brown is the branch manager for the new Cleveland office and
oversees all the designs (especially in the area of technology) and
purchases for it. Even though Ken Rogers gets the final approval for
them, Kim is the person who everyone involved with the project either
reports to or communicates with for answers. She is excited about her
new position, but realizes that her technology knowledge is not up-to-
par. In these cases, Kim relies on you, the network administrator from
7. the corporate office, and your assistant network administrator, James
Mitchell, in this process. Overall, this step consists of choosing what
needs to be purchased for this WAN project, but what needs to be done
must be interpreted to Kim at her technical level.
Cindy Won, Corporate Procurement Manager
Cindy Won, the corporate procurement manager, and her assistants are
in charge of purchasing the major components for the organization. In
this case, Cindy and her staff will be in charge of purchasing all
technical software and hardware components for the new WAN located
in the Cleveland branch office.
James Mitchell, Assistant Network Adminstrator
James Mitchell is the assistant network administrator and works with
you, the network adminstrator, out of the corporate office located in
Pittsburgh. You and James will be working on the design of the new
WAN infrastructure located in the Cleveland branch office. Duties also
require you and James to help with the technical purchases of the WAN
network. Purchases can include routers, switches, servers, and software.
Y O U D E C I D E
8. Activity
After reading the instructions for this homework assignment, decide how
you are going to start this project and what WAN and Teleworker
connectivity options might be appropriate for the Cleveland branch
office.
See Syllabus/”Due Dates for Assignments & Exams” for due date
information. Submit your assignment to the Dropbox located on the
silver tab at the top of this page. For instructions on how to use
theDropbox, please click here.
================================
NETW 208 Week 2 ilabConfiguring PPP PAP and
CHAP Authentication iLab
For more classes visit
www.snaptutorial.com
Lab 2 of 7: ElementK Lab 336022:Configuring PPP, PAP, and CHAP
Authentication
Accessing Your Lab
If you are new to Element K or have questions about the iLabs, please
read the ElementK iLab Tutorial to learn more about requirements,
launching, scheduling, and sharing your labs.
9. Using your student credentials, log in to Element K (log-in screen shown
below).
After logging in to Element K, click Development Paths to see all
courses you have access to; NETW 208 will be listed on this page.
Click on the NETW 208 course link (in red) to see the weekly labs.
Starting Your Lab
To go to your lab, click on the appropriate weekly lab URL.
There are two ways to start a lab activity.
· Schedule it (recommended)
· Because you have access to live equipment, there is only a defined
number of students who can use any one lab at any given time. It is
recommended to schedule your labs to make sure the lab is available to
you at your convenience. If you try to log in to a lab and your access is
denied, the system will let you schedule the lab at a later date.
· Start it right away
Note: If all lab resources are being used when you try to start your lab,
then you will be given an opportunity to schedule the lab at a later time.
L A B O V E R V I E W
10. Scenario/Summary
Welcome to your Week 2 Lab!
ElementK Lab 336022: Configuring PPP, PAP, and CHAP
Authentication
In this lab, you will gain experience and write something about the
objectives of the lab.
Deliverables
You are required to submit a lab report to this week’s iLab Dropbox.
i L A B S T E P S
Download Lab Report Template
Download and use this lab report template for your labs. Do not turn in
separate documents for each lab or create your own document! Each lab
is easily identified within this document. Note that it is a good idea to
read over this template before performing your labs so that you know
what to expect.
The lab report template provides detailed instructions for completing
your lab report.
11. Procedures
After entering the main lab page:
1. Ensure that you meet the system requirements for this lab and that
you understand how to control the devices in the lab.
2. Understand the objectives and procedures for this lab by reading
the Summary, Scenario, Suggested Approach, and Sample Solution in
the Content area.
3. Begin your lab and complete each task by following the steps in
the Sample Solution.
To complete your lab report, you will do the following:
1. Write a short paragraph below (minimum 50–100 words) that
summarizes what was accomplished in this week’s lab, what you learned
from performing it, and, most importantly, how you feel it will benefit
you in your career. Place this summary in your lab report.
2. Copy and paste your Element K Transcript showing your name and
completion status of your lab. Note: If your transcript has many items, it
may be necessary to capture your name in a separate screenshot. Place
this screenshot in your lab report.
================================
NETW 208 Week 3 ilab
For more classes visit
www.snaptutorial.com
12. Lab 3 of 7: ElementK Lab 336324:Establishing and Troubleshooting a
Frame Relay WAN and ElementK Lab 336312:Connecting to the
Internet and Main Office: Static and Dynamic Route
Accessing Your Lab
If you are new to Element K or have questions about the iLabs, please
read the ElementK iLab Tutorial to learn more about requirements,
launching, scheduling, and sharing your labs.
Using your student credentials, log in to Element K (log-in screen shown
below).
After logging in to Element K, click Development Paths to see all
courses you have access to; NETW 208 will be listed on this page.
Click on the NETW 208 course link (in red) to see the weekly labs.
Starting Your Lab
To go to your lab, click on the appropriate weekly lab URL.
There are two ways to start a lab activity.
· Schedule it (recommended)
· Because you have access to live equipment, there is only a defined
number of students who can use any one lab at any given time. It is
recommended to schedule your labs to make sure the lab is available to
you at your convenience. If you try to log in to a lab and your access is
denied, the system will let you schedule the lab at a later date.
· Start it right away
13. Note: If all lab resources are being used when you try to start your lab,
then you will be given an opportunity to schedule the lab at a later time.
L A B O V E R V I E W
Scenario/Summary
Welcome to your Week 3 Lab!
ElementK Lab 336324: Establishing and Troubleshooting a Frame Relay
WAN and
ElementK Lab 336312: Connecting to the Internet and Main Office:
Static and Dynamic Route
In these labs, you will gain experience and write something about the
objectives of the lab.
Deliverables
You are required to submit a lab report to this week’s iLab Dropbox.
i L A B S T E P S
14. Download Lab Report Template
Download and use this lab report template for your labs. Do not turn in
separate documents for each lab or create your own document! Each lab
is easily identified within this document. Note that it is a good idea to
read over this template before performing your labs so that you know
what to expect.
The lab report template provides detailed instructions for completing
your lab report.
Procedures
After entering the main lab page:
1. Ensure that you meet the system requirements for this lab and that
you understand how to control the devices in the lab.
2. Understand the objectives and procedures for this lab by reading
the Summary, Scenario, Suggested Approach, and Sample Solution in
the Content area.
3. Begin your lab and complete each task by following the steps in
the Sample Solution.
To complete your lab report, you will do the following:
1. Write a short paragraph below (minimum 50–100 words) that
summarizes what was accomplished in this week’s lab, what you learned
15. from performing it, and, most importantly, how you feel it will benefit
you in your career. Place this summary in your lab report.
2. Copy and paste your Element K Transcript showing your name and
completion status of your lab. Note: If your transcript has many items, it
may be necessary to capture your name in a separate screenshot. Place
this screenshot in your lab report.
Submit Lab Report
Your lab is now complete! When you are satisfied with your
documentation, submit your completed report to the Dropbox located on
the silver tab at the top of this page. For instructions on how to use the
Dropbox, read these step-by-step instructions or watch this Dropbox
Tutorial.
===============================
NETW 208 Week 3 The Frame Relay Solution You
Decide
For more classes visit
www.snaptutorial.com
Week 3: The Frame Relay Solution – You Decide
16. Scenario Summary
Over the past several weeks, you have carefully considered the devices
and media that will be used to communicate between the Pittsburgh and
Cleveland offices. You must now move your attention to moving data
between the two networks. Kim has recently bought a networking book
and began reading up on Frame Relay, but was confused by all of the
new terminology. Perhaps with your networking knowledge, you can
help Kim in this area.
Your Role/Assignment
Provide Kim with a two-page detailed report about your consideration of
Frame Relay as connectivity possibility. Be sure to provide comparisons
to other WAN options such as ATM and dedicated leased lines.
K E Y P L A Y E R S
Ken Rogers, Corporate Manager
17. Ken Rogers is the Corporate Manager, Pittsburgh, PA office. Ken has
control over the new Cleveland branch office on a corporate level. Even
though Kim is the branch manager of the Pittsburgh office, she has to
get final approval on all designs (especially in the area of technology)
and purchases from Ken.
Kim Brown, Branch Manager
Kim Brown is the branch manager for the new Cleveland office and
oversees all of the designs (especially in the area of technology) and
purchases for it. Even though Ken Rogers gets the final approval for
them, Kim is the person who all people involved with the project either
18. report to or communicate with for answers. She is excited about her new
position, but realizes that her technology knowledge is not up-to-par. In
these cases, Kim relies on you, the network administrator from the
corporate office, and your assistant network administrator, James
Mitchell, in this process. Overall, this step is to choose what needs to be
purchased for this WAN project, while interpreting to Kim on her
technical level what needs to be done.
Cindy Won, Corporate Procurement Manager
Cindy Won, the corporate procurement manager, and her assistants are
in charge of purchasing the major components for the organization. In
this case, Cindy and her staff will be in charge of purchasing all
technical software and hardware components for the new WAN located
in the Cleveland branch office.
19. James Mitchell, Assistant Network Administrator
James Mitchell is the assistant network administrator and works with
you, the network administrator, out of the corporate office located in
Pittsburgh. You and James will be working on the design of the new
WAN infrastructure located in the Cleveland branch office. Duties also
require that you and James help in the technical purchases of the WAN
network. Purchases can include routers, switches, servers, and software.
Y O U D E C I D E
Activity
20. Interpret in layman’s terms to Kim what needs to be done to move data
from both the Pittsburgh and Cleveland offices using Frame Relay, and
include comparisons to other WAN solution possiblities for this project.
See Syllabus/”Due Dates for Assignments & Exams” for due date
information. Submit your assignment to the Dropbox located on the
silver tab at the top of this page. For instructions on how to use
theDropbox, please click here.
=================================
NETW 208 Week 4 ilabEnhancing the Security of
Initial Router Configuration
For more classes visit
www.snaptutorial.com
Lab 4 of 7: ElementK Labs
336309:Enhancing the Security of Initial Router Configuration
Accessing Your Lab
If you are new to Element K or have questions about the iLabs, please
read the ElementK iLab Tutorial to learn more about requirements,
launching, scheduling, and sharing your labs.
Using your student credentials, log in to Element K (log-in screen shown
below).
After logging in to Element K, click Development Paths to see all
courses you have access to; NETW 208 will be listed on this page.
21. Click on the NETW 208 course link (in red) to see the weekly labs.
Starting Your Lab
To go to your lab, click on the appropriate weekly lab URL.
There are two ways to start a lab activity.
· Schedule it (recommended)
· Because you have access to live equipment, there is only a defined
number of students who can use any one lab at any given time. It is
recommended to schedule your labs to make sure the lab is available to
you at your convenience. If you try to log in to a lab and your access is
denied, the system will let you schedule the lab at a later date.
· Start it right away
Note: If all lab resources are being used when you try to start your lab,
then you will be given an opportunity to schedule the lab at a later time.
L A B O V E R V I E W
Scenario/Summary
Welcome to your Week 4 Lab!
22. ElementK Lab 336309: Enhancing the Security of Initial Router
Configuration
In this lab, you will gain experience and write something about the
objectives of the lab.
Deliverables
You are required to submit a lab report to this week’s iLab Dropbox.
i L A B S T E P S
Download Lab Report Template
Download and use this lab report template for your labs. Do not turn in
separate documents for each lab or create your own document! Each lab
is easily identified within this document. Note that it is a good idea to
read over this template before performing your labs so that you know
what to expect.
The lab report template provides detailed instructions for completing
your lab report.
Procedures
23. After entering the main lab page:
1. Ensure that you meet the system requirements for this lab and that
you understand how to control the devices in the lab.
2. Understand the objectives and procedures for this lab by reading
the Summary, Scenario, Suggested Approach, and Sample Solution in
the Content area.
3. Begin your lab and complete each task by following the steps in
the Sample Solution.
To complete your lab report, you will do the following:
1. Write a short paragraph below (minimum 50–100 words) that
summarizes what was accomplished in this week’s lab, what you learned
from performing it, and most importantly, how you feel it will benefit
you in your career. Place this summary in your lab report.
2. Copy and paste your Element K Transcript showing your name and
completion status of your lab. Note: If your transcript has many items, it
may be necessary to capture your name in a separate screenshot. Place
this screenshot in your lab report.
Submit Lab Report
Your lab is now complete! When you are satisfied with your
documentation, submit your completed report to the Dropbox located on
the silver tab at the top of this page. For instructions on how to use the
Dropbox, read these step-by-step instructions or watch this Dropbox
Tutorial.
=============================
24. NETW 208 Week 4 Quiz
For more classes visit
www.snaptutorial.com
1.
Question :
(TCO 4) The primary tool frame relay uses to map link Mac addresses to
IPv4 addresses is _____.
Question 2.
Question :
(TCO 4) The amount of throughput or bandwidth a frame relay provider
guarantees to a customer, for which they pay for is known as the _____.
Question 3.
Question :
(TCO 4) A single frame relay subinterface that establishes multiple
permanent virtual circuits (PVCs) connections to multiple physical
interfaces or subinterfaces on remote routers is known as _____.
Question 4.
Question :
25. (TCO 4) The troubleshooting command to use that will display the
current frame relay map entries and information about the connections is
_____.
Question 5.
Question :
(TCO 5) The type of NAT where there is a one-to-one mapping between
local and global address is known as _____.
Question 6.
Question :
(TCO 5) The command that displays the current active NAT clients is
_____.
Question 7.
Question :
(TCO 5) The act of forwarding traffic addressed to a specific network
port from one network node to another is called _____.
Question 8.
Question :
(TCO 6) A benefit to teleworking is _____.
Question 9.
26. Question :
(TCO 6) A telecommunications technology aimed at providing wireless
data over long distances in a variety of ways, from point-to-point links to
full mobile cellular type access is known as _____.
Question 10.
Question :
(TCO 6) A broadband solution that can be used to access the Internet
where the bandwidth is shared by many users and upstream data rates
are often slow is called _____.
=====================================
NETW 208 Week 5 Access Control Lists – You
Decide
For more classes visit
www.snaptutorial.com
Week 5: Access Control Lists – You Decide
Scenario Summary
For this week’s assignment, you and the assistant network administrator
will be dealing with the creation and maintenance of access control lists
27. (ACLs) that need to be installed in routers at the Cleveland office. Be
sure to provide an example of an extended or named extended access
control list with your proposal and explain what is accomplished by each
line in the list. You also need to create policies and procedures (see
Chapter 4) for the Cleveland office to handle the creation and
maintenance of the ACLs.
Your Role/Assignment
Investigate what needs to be done for the WAN network located in the
Cleveland office by providing the appropriate ACLs. You need to
consider security policies and any other tools and techniques that will
help with this matter.
K E Y P L A Y E R S
Ken Rogers, Corporate Manager
28. Ken Rogers is the corporate manager of the Pittsburgh, PA office. Ken
has control over the new Cleveland branch office on a corporate level.
Even though Kim is the branch manager of the Pittsburgh office, she has
to get final approval on all designs (especially in the area of technology)
and purchases from Ken.
Kim Brown, Branch Manager
Kim Brown is the branch manager for the new Cleveland office and
oversees all the designs (especially in the area of technology) and
purchases for it. Even though Ken Rogers gets the final approval for
them, Kim is the person who all of the people involved with the project
either report to or communicate with for answers. She is excited about
her new position, but realizes that her technology knowledge is not up-
29. to-par. In these cases, Kim relies on you, the network administrator,
from the corporate office and your assistant network administrator,
James Mitchell, in this process. Overall, this step requires that you
choose what needs to be purchased for this WAN project, but interpret to
Kim, on her technical level, what needs to be done.
Cindy Won, Corporate Procurement Manager
Cindy Won, the corporate procurement manager, and her assistants are
in charge of purchasing the major components for the organization. In
this case, Cindy and her staff will be in charge of purchasing all
technical software and hardware components for the new WAN located
in the Cleveland branch office.
James Mitchell, Assistant Network Administrator
30. James Mitchell is the assistant network administrator and works with
you, the network administrator, out of the corporate office located in
Pittsburgh. You and James will be working on the design of the new
WAN infrastructure located in the Cleveland branch office. Duties also
require that you and James help in the technical purchases of the WAN
network. Purchases can include routers, switches, servers, and software.
Y O U D E C I D E
Activity
Identify ACLs that need to be installed in the Cleveland office from
what you have learned in this course and your past experiences in
technology.
31. ===============================
NETW 208 Week 5 ilab Implementing and
Troubleshooting ACLs
For more classes visit
www.snaptutorial.com
Lab 5 of 7: ElementK Lab 336321:Implementing and Troubleshooting
ACLs
Accessing Your Lab
If you are new to Element K or have questions about the iLabs, please
read the ElementK iLab Tutorial to learn more about requirements,
launching, scheduling, and sharing your labs.
Using your student credentials, log in to Element K (log-in screen shown
below).
After logging in to Element K, click Development Paths to see all
courses you have access to; NETW 208 will be listed on this page.
Click on the NETW 208 course link (in red) to see the weekly labs.
Starting Your Lab
To go to your lab, click on the appropriate weekly lab URL.
There are two ways to start a lab activity.
32. · Schedule it (recommended)
· Because you have access to live equipment, there is only a defined
number of students who can use any one lab at any given time. It is
recommended to schedule your labs to make sure the lab is available to
you at your convenience. If you try to log in to a lab and your access is
denied, the system will let you schedule the lab at a later date.
· Start it right away
Note: If all lab resources are being used when you try to start your lab,
then you will be given an opportunity to schedule the lab at a later time.
L A B O V E R V I E W
Scenario/Summary
Welcome to your Week 5 Lab!
ElementK Lab 336321: Implementing and Troubleshooting ACLs
In this lab, you will gain experience and write something about the
objectives of the lab.
Deliverables
You are required to submit a lab report to this week’s iLab Dropbox.
33. i L A B S T E P S
Download Lab Report Template
Download and use this lab report template for your labs. Do not turn in
separate documents for each lab or create your own document! Each lab
is easily identified within this document. Note that it is a good idea to
read over this template before performing your labs so that you know
what to expect.
The lab report template provides detailed instructions for completing
your lab report.
Procedures
After entering the main lab page:
1. Ensure that you meet the system requirements for this lab and that
you understand how to control the devices in the lab.
2. Understand the objectives and procedures for this lab by reading
the Summary, Scenario, Suggested Approach, and Sample Solution in
the Content area.
3. Begin your lab and complete each task by following the steps in
the Sample Solution.
34. To complete your lab report, you will do the following:
1. Write a short paragraph below (minimum 50–100 words) that
summarizes what was accomplished in this week’s lab, what you learned
from performing it, and, most importantly, how you feel it will benefit
you in your career. Place this summary in your lab report.
2. Copy and paste your Element K Transcript showing your name and
completion status of your lab. Note: If your transcript has many items, it
may be necessary to capture your name in a separate screenshot. Place
this screenshot in your lab report.
Submit Lab Report
Your lab is now complete! When you are satisfied with your
documentation, submit your completed report to the Dropbox located on
the silver tab at the top of this page. For instructions on how to use the
Dropbox, read these step-by-step instructions or watch this Dropbox
Tutorial.
=============================
NETW 208 Week 6 ilabConfiguring a Cisco
Router and Configuring a Cisco Router
For more classes visit
www.snaptutorial.com
Lab 6 of 7: ElementK Labs
336400:Configuring a Cisco Router as a DHCP Server
35. 336322:Configuring NAT and PAT
Accessing Your Lab
If you are new to Element K or have questions about the iLabs, please
read the ElementK iLab Tutorial to learn more about requirements,
launching, scheduling, and sharing your labs.
Using your student credentials, log in to Element K (log-in screen shown
below).
After logging in to Element K, click Development Paths to see all
courses you have access to; NETW 208 will be listed on this page.
Click on the NETW 208 course link (in red) to see the weekly labs.
Starting Your Lab
To go to your lab, click on the appropriate weekly lab URL.
There are two ways to start a lab activity.
· Schedule it (recommended)
· Because you have access to live equipment, there is only a defined
number of students who can use any one lab at any given time. It is
recommended to schedule your labs to make sure the lab is available to
you at your convenience. If you try to log in to a lab and your access is
denied, the system will let you schedule the lab at a later date.
· Start it right away
Note: If all lab resources are being used when you try to start your lab,
then you will be given an opportunity to schedule the lab at a later time.
36. L A B O V E R V I E W
Scenario/Summary
Welcome to your Week 6 Lab!
336400:Configuring a Cisco Router as a DHCP Server
336322:Configuring a NAT and PAT
In this lab, you will gain experience and write something about the
objectives of the lab.
Deliverables
You are required to submit a lab report to this week’s iLab Dropbox.
i L A B S T E P S
Download Lab Report Template
37. Download and use this lab report template for your labs. Do not turn in
separate documents for each lab or create your own document! Each lab
is easily identified within this document. Note that it is a good idea to
read over this template before performing your labs so that you know
what to expect.
The lab report template provides detailed instructions for completing
your lab report.
Procedures
After entering the main lab page:
1. Ensure that you meet the system requirements for this lab and that
you understand how to control the devices in the lab.
2. Understand the objectives and procedures for this lab by reading
the Summary, Scenario, Suggested Approach, and Sample Solution in
the Content area.
3. Begin your lab and complete each task by following the steps in
the Sample Solution.
To complete your lab report, you will do the following:
1. Write a short paragraph below (minimum 50–100 words) that
summarizes what was accomplished in this week’s lab, what you learned
from performing it, and, most importantly, how you feel it will benefit
you in your career. Place this summary in your lab report.
2. Copy and paste your Element K Transcript showing your name and
completion status of your lab. Note: If your transcript has many items, it
38. may be necessary to capture your name in a separate screenshot. Place
this screenshot in your lab report.
Submit Lab Report
Your lab is now complete! When you are satisfied with your
documentation, submit your completed report to the Dropbox located on
the silver tab at the top of this page. For instructions on how to use the
Dropbox, read these step-by-step instructions or watch this Dropbox
Tutorial.
===========================
NETW 208 Week 7 ilab Troubleshooting WANs
For more classes visit
www.snaptutorial.com
Lab 7 of 7: ElementK Labs
1075-spv: Troubleshooting WANs
Accessing Your Lab
If you are new to Element K or have questions about the iLabs, please
read the ElementK iLab Tutorial to learn more about requirements,
launching, scheduling, and sharing your labs.
Using your student credentials, log in to Element K (log-in screen shown
below).
After logging in to Element K, click Development Paths to see all
courses you have access to; NETW 208 will be listed on this page.
39. Click on the NETW 208 course link (in red) to see the weekly labs.
Starting Your Lab
To go to your lab, click on the appropriate weekly lab URL.
There are two ways to start a lab activity.
· Schedule it (recommended)
· Because you have access to live equipment, there is only a defined
number of students who can use any one lab at any given time. It is
recommended to schedule your labs to make sure the lab is available to
you at your convenience. If you try to log in to a lab and your access is
denied, the system will let you schedule the lab at a later date.
· Start it right away
Note: If all lab resources are being used when you try to start your lab,
then you will be given an opportunity to schedule the lab at a later time.
L A B O V E R V I E W
Scenario/Summary
Welcome to your Week 7 Lab!
1075-spv: Troubleshooting WANs
40. In this lab, you will gain experience and write something about the
objectives of the lab.
Deliverables
You are required to submit a lab report to this week’s iLab Dropbox.
i L A B S T E P S
Download Lab Report Template
Download and use this lab report template for your labs. Do not turn in
separate documents for each lab or create your own document! Each lab
is easily identified within this document. Note that it is a good idea to
read over this template before performing your labs so that you know
what to expect.
The lab report template provides detailed instructions for completing
your lab report.
Procedures
After entering the main lab page:
41. 1. Ensure that you meet the system requirements for this lab and that
you understand how to control the devices in the lab.
2. Understand the objectives and procedures for this lab by reading
the Summary, Scenario, Suggested Approach, and Sample Solution in
the Content area.
3. Begin your lab and complete each task by following the steps in
the Sample Solution.
To complete your lab report, you will do the following:
1. Write a short paragraph below (minimum 50–100 words) that
summarizes what was accomplished in this week’s lab, what you learned
from performing it, and, most importantly, how you feel it will benefit
you in your career. Place this summary in your lab report.
2. Copy and paste your Element K Transcript showing your name and
completion status of your lab. Note: If your transcript has many items, it
may be necessary to capture your name in a separate screenshot. Place
this screenshot in your lab report.
Submit Lab Report
Your lab is now complete! When you are satisfied with your
documentation, submit your completed report to the Dropbox located on
the silver tab at the top of this page. For instructions on how to use the
Dropbox, read these step-by-step instructions or watch this Dropbox
Tutorial.
===============================
NETW 208 Week 7 Network Troubleshooting You
Decide
42. For more classes visit
www.snaptutorial.com
NETW 208 Week 7 Assignment Network Troubleshooting
=========================================