Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Question 1

(a)

210_figure1.jpg

Figure Q1 (a)

i. Explain the difference between attaching a serial interface to a service provider in a production environment and attaching a serial interface to another Router in a laboratory environment.

ii. Choose an appropriate routing technique between the Internet Service Provider and the Gateway Router. Justify your selection.

(b)

2045_Figure2.jpg

Figure Q1 (b)

i. Identify the type of route used between Routers R1 and R2 that facilitates Router R2 to reach the four networks shown in the Figure Q1 (b).

ii. Explain how you will configure the routing between Routers R1 and R2.

iii. Justify your selection by discussing its advantages.

(c) As a network administrator, explain in which situations you would choose to use the distance vector routing protocols and link-state routing protocols.

Question 2

(a)

1897_Figure3.jpg

Figure Q2 (a)

Analyze the routing table shown in the above Figure Q2 (a), and explain how the Router selects the path to the network 192.168.4.0.

(b) Provide FOUR (4) reasons routing loop occurrences and explain their respective implications on network operation.

(c) Routing Information Protocol (RIP) uses User Datagram Protocol (UDP) in the transport layer. UDP is considered as a connectionless and unreliable protocol. In this situation, how does RIP ensure the reliability and consistency of the routing updates between Routers.

Question 3

HQ# show ip route

10.0.0.0/30 is subnetted, 1 subnets

C 10.10.10.252 is directly connected, Serial0/0/0

172.16.0.0/30 is subnetted, 1 subnets

C 172.16.100.0 is directly connected, Serial0/0/1

R 192.168.1.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.2.0/24 [120/16] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.3.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.7.0/24 [120/1] via 172.16.100.2, 00:00:04, Serial0/0/1

Figure Q3 (a)

Analyze the output shown in the above Figure Q3 (a).

i. Explain why the network 192.168.2.0/24 is not reachable from the HQ Router.

ii. Explain how HQ Router was informed by RIP that the 192.168.2.0/24 is not reachable.

(b)

35_Figure4.jpg

Figure Q3 (b)

Both Routers R1 and R2 are configured with RIP as shown in the above Figure Q3 (b).

i. Analyse three ways the unnecessary updates in RIP negatively impact upon the Local Area Network (LAN) environments.

ii. Modify the RIP configuration so RIP updates do not affect the LAN segments.

(c) With the aid of a block diagram, explain how a Router performs the route lookup process when it receives an IP packet and decides which route in the routing table is the best match.

Question 4

(a) Router# show ip eigrp topology

IP-EIGRP Topology Table for AS 1

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status

P 10.10.12.0/24, 1 successors, FD is 5514496

via 172.16.1.38 (5514496/28160), Serial0/1/0 via 172.16.1.42 (7693056/6172416), Serial0/1/1

P 10.10.14.128/25, 1 successors, FD is 6026496

via 172.16.1.38 (6026496/2172416), Serial0/1/0 via 172.16.1.42 (7181056/28160), Serial0/1/1

Figure Q4 (a) Analyze the output shown in the above Figure Q4 (a).

i. Explain how the DUAL algorithm chooses the best path to the network 10.10.12.0/24 and 10.10.14.128/25.

ii. If the chosen path is suddenly down, explain what will happen.

(b) Even though Enhanced Distance Vector Routing Protocol (EIGRP) is classified as a Distance Vector Protocol, its architecture and operation are different from other Distance Vector Protocols as it has fast convergence. Explain why EIGRP is different from other Traditional Distance Vector Protocols apart from fast convergence.

(c) When analyzing your network traffic, you have found that only 50% of the bandwidth is available for data traffic in the 128 kbps serial connection between the HQ and Production yard. The network uses EIGRP as a protocol. The autonomous System number used is 5.

i. Explain how you will solve this problem and restrict the EIGRP to using less than 30% of the bandwidth.

ii. Provide the configuration for your proposed solution.

Question 5

(a) Your organization has decided to implement a link-state routing protocol and you are assigned to carry out this task. As a network administrator, explain briefly the requirements of routing devices that are important to configure the link state protocol.

(b)

1372_Figure5.jpg

Figure Q5 (b)


Calculate the best path to the network 10.0.0.0 from the Router A using the Edsger Dijkstra's Shortest Path First (SPF) algorithm.

(c)

2378_Figure6.jpg
Figure Q5 (c)

Identify the type of Routers A, B and C and explain their roles.

(d)

278_Figure7.jpg

Figure Q4 (d)

When designing OSPF networks, all areas should be connected to the backbone area. However, due to topography constraints in Panda Corporation, it is not possible to connect the area-2 with the area-0. You are assigned to solve this problem.

i. Propose a solution to establish the connectivity for the area-2.

ii. With the aid of diagram, explain your proposed solution.

iii. Provide the configuration of your proposed solution.

Question 6

(a) Provide examples where you would recommend using the Border Gateway Protocol (BGP).

(b)

1319_Figure8.jpg

Figure Q6 (b)

Demonstrate how BGP path attributes can be used to set the preferred route as AC from AS100 to 200 and the preferred route as BD from AS 300 to AS 500.

(c) Addresses which are globally routable and reachable on the IPv6 Internet are known as global unicast addresses. With the aid of a diagram, explain the structure of a global unicast address for a typical site.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92236907
  • Price:- $70

Guranteed 36 Hours Delivery, In Price:- $70

Have any Question?


Related Questions in Computer Network & Security

From the product designed expanded as follows1 from your

From the product designed expanded as follows. 1. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

What is the difference between a positive economic

What is the difference between a positive economic statement and a normative one.

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

If a firms total cost function is given byt c

If a firm's total cost function is given byT C= 115,000Q-500Q2+Q3, what range of output does the firm have economies of scale?

Lab activity investigate system backup and restore

Lab Activity: Investigate System Backup and Restore Tools Purpose: Assess and Document Tools to Backup and Restore the System Hard Drive for a Windows 8.1 Workstation. - Assess and document the use of a system backup too ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As