Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Distance Vector Routing Protocols

problem   

1 What does RIP stand for?   

2 What metric does RIP use for Path Selection?   

3 If metric used by RIP exceeds this value for a route it is considered unreachable, effectively making this value appear to be infinity to RIP?   

4 How often does RIP send updates by default (update timer)?   

5 What are the major differences between RIPv1 and RIPv2?   

6 What is convergence and why is it significant?   

7 Is RIP considered to be a fast or slow converging protocol?

For the simple 3 router network (Figure below), fill in the information that will be in each router’s routing table once the network has converged

417_Router network.jpg

                    R1                                       HQ                                     R3   
Network      Interface    Hop        Network    Interface    Hop        Network    Interface    Hop
172.15.0.0    Fa0/0        0

Subnetting and Assigning Addresses

1537_addressing design scenario.jpg

You are a network administration for the small network in above Figure.  It consists of your headquarters location with a LAN with 60 hosts, remote office R1 with 10 hosts, and remote office R2 with 30 hosts.  You have been assigned the address space 192.168.3.0/25.  From this space you would require to create the subnets for each of the sites on your network and the two WAN links.  Once you find the subnets assign addresses to the Routers interfaces and PCs using the following guidelines:  Assign the first address from LAN subnets to the router interface connected to that LAN.  Assign the second IP address in the LAN subnet to the PC on the LAN.  Assign the first Address from WAN subnets to the HQ router end of the WAN link and the second address to the remote router interface.  Use the steps below to help you work through it.

Create the subnets:
Address space: 192.168.3.0/25

prepare it out in binary form identifying the host and network in table given below as a scratch pad to help you in subnetting as needed.  Remember to be competent you generally want to start by creating the largest subnet you require first and then continue subnetting to determine the smaller subnets in succession.

2120_Network-host.jpg

problem   

8 What is the HQ subnet (address/mask)?   

9 What is the R1 subnet (address/mask)?   

10 What is the R2 subnet (address/mask)?   

11What is the subnet for the HQ to R1 WAN (address/mask)?   

12 What is the subnet for the HQ to R2 WAN (address/mask)?   

13 What subnets do you have left available for future use?

PC’s on a LAN require to have a default gateway configured that identifies the next hop IP address for packets leaving the network.  This is the address of the router interface on the LAN.  Based on this what address will be assigned as the default gateway on the following PCs.

14 PC1 =

15 PC2 =

16 PC5 =

Fill in the address and subnet mask for the device interfaces in the table below using the assignment rules described above.

Device                 Interface      Address    Mask
HQ Router               Fa0/0      
                            S0/0/0   
                            S0/0/1   
R1 Router                Fa0/0   
                            S0/0/0   
R2 Router                Fa0/1   
                              S0/0/0   
PC1                       Ethernet   
PC2                     Ethernet         
PC5                      Ethernet

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91769

Have any Question? 


Related Questions in Computer Network & Security

Assignment wireless technologythere are a number of

Assignment: Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Network securitythe focus of the reseach paper is host

Network Security The focus of the reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems. Computer Virus creates major headaches for most organizations, as this list of 10 worst PC virus outbreaks ...

Analyzing network trafficone of our goals for this week is

Analyzing Network Traffic One of our goals for this week is to install and run a packet-capture utility, such as Wireshark. If you are successful with this task, run the packet capture while you do a familiar online task ...

Topic 1 wireless technologiescreate a short essay 1 to 3

Topic 1: Wireless Technologies Create a short essay (1 to 3 pages) that describes how you will set up a wireless network for the Nardi Pardy Corporation (a fictitious company). In this simple scenario, the company office ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

Security configuration managementkey assignmentsignificant

Security Configuration Management Key Assignment Significant work has been completed over the past few weeks on the Network Security Architecture Design document, including the following: • Security Requirements • Perime ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

Assignment elastic and inelastic trafficwrite a three to

Assignment: Elastic and Inelastic Traffic Write a three to four page paper in which you: 1. Outline a plan for the development of an addressing and naming model in an environment of the following scenario: o Ten departme ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen