Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Distance Vector Routing Protocols

problem   

1 What does RIP stand for?   

2 What metric does RIP use for Path Selection?   

3 If metric used by RIP exceeds this value for a route it is considered unreachable, effectively making this value appear to be infinity to RIP?   

4 How often does RIP send updates by default (update timer)?   

5 What are the major differences between RIPv1 and RIPv2?   

6 What is convergence and why is it significant?   

7 Is RIP considered to be a fast or slow converging protocol?

For the simple 3 router network (Figure below), fill in the information that will be in each router’s routing table once the network has converged

417_Router network.jpg

                    R1                                       HQ                                     R3   
Network      Interface    Hop        Network    Interface    Hop        Network    Interface    Hop
172.15.0.0    Fa0/0        0

Subnetting and Assigning Addresses

1537_addressing design scenario.jpg

You are a network administration for the small network in above Figure.  It consists of your headquarters location with a LAN with 60 hosts, remote office R1 with 10 hosts, and remote office R2 with 30 hosts.  You have been assigned the address space 192.168.3.0/25.  From this space you would require to create the subnets for each of the sites on your network and the two WAN links.  Once you find the subnets assign addresses to the Routers interfaces and PCs using the following guidelines:  Assign the first address from LAN subnets to the router interface connected to that LAN.  Assign the second IP address in the LAN subnet to the PC on the LAN.  Assign the first Address from WAN subnets to the HQ router end of the WAN link and the second address to the remote router interface.  Use the steps below to help you work through it.

Create the subnets:
Address space: 192.168.3.0/25

prepare it out in binary form identifying the host and network in table given below as a scratch pad to help you in subnetting as needed.  Remember to be competent you generally want to start by creating the largest subnet you require first and then continue subnetting to determine the smaller subnets in succession.

2120_Network-host.jpg

problem   

8 What is the HQ subnet (address/mask)?   

9 What is the R1 subnet (address/mask)?   

10 What is the R2 subnet (address/mask)?   

11What is the subnet for the HQ to R1 WAN (address/mask)?   

12 What is the subnet for the HQ to R2 WAN (address/mask)?   

13 What subnets do you have left available for future use?

PC’s on a LAN require to have a default gateway configured that identifies the next hop IP address for packets leaving the network.  This is the address of the router interface on the LAN.  Based on this what address will be assigned as the default gateway on the following PCs.

14 PC1 =

15 PC2 =

16 PC5 =

Fill in the address and subnet mask for the device interfaces in the table below using the assignment rules described above.

Device                 Interface      Address    Mask
HQ Router               Fa0/0      
                            S0/0/0   
                            S0/0/1   
R1 Router                Fa0/0   
                            S0/0/0   
R2 Router                Fa0/1   
                              S0/0/0   
PC1                       Ethernet   
PC2                     Ethernet         
PC5                      Ethernet

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91769

Have any Question? 


Related Questions in Computer Network & Security

Scenario additional detailshealth care hq has a

Scenario: Additional Details Health Care HQ has a client-server network architecture. The chief information officer (CIO) wants to understand the difference between a client-server and a peer-to-peer network. She also wa ...

Question 1which of the following must you do before ip

Question 1 Which of the following must you do before IP source guard can be used on a switch port? (Select 2 choices.) A) Enable IP routing on the switch port. B) Enable DHCP snooping on the switch. C) Configure static I ...

Questions1 describe three factors that help to influence

Questions: 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in the PA ...

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Topic ethernet technologiescreate a short essay 1 to 3

Topic: Ethernet Technologies Create a short essay (1 to 3 pages) that describes an Ethernet frame. You will need to do some research to understand the construction of an Ethernet frame. As you describe an Ethernet frame, ...

Security in wireless lans wans and telephonyactions for

Security in Wireless LANs, WANs, and Telephony Actions for 'Security in Wireless LANs, WANs, and Telephony A very challenging issue in IT industry is wireless security. Because of the specific technical principles involv ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro