Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Distance Vector Routing Protocols

problem   

1 What does RIP stand for?   

2 What metric does RIP use for Path Selection?   

3 If metric used by RIP exceeds this value for a route it is considered unreachable, effectively making this value appear to be infinity to RIP?   

4 How often does RIP send updates by default (update timer)?   

5 What are the major differences between RIPv1 and RIPv2?   

6 What is convergence and why is it significant?   

7 Is RIP considered to be a fast or slow converging protocol?

For the simple 3 router network (Figure below), fill in the information that will be in each router’s routing table once the network has converged

417_Router network.jpg

                    R1                                       HQ                                     R3   
Network      Interface    Hop        Network    Interface    Hop        Network    Interface    Hop
172.15.0.0    Fa0/0        0

Subnetting and Assigning Addresses

1537_addressing design scenario.jpg

You are a network administration for the small network in above Figure.  It consists of your headquarters location with a LAN with 60 hosts, remote office R1 with 10 hosts, and remote office R2 with 30 hosts.  You have been assigned the address space 192.168.3.0/25.  From this space you would require to create the subnets for each of the sites on your network and the two WAN links.  Once you find the subnets assign addresses to the Routers interfaces and PCs using the following guidelines:  Assign the first address from LAN subnets to the router interface connected to that LAN.  Assign the second IP address in the LAN subnet to the PC on the LAN.  Assign the first Address from WAN subnets to the HQ router end of the WAN link and the second address to the remote router interface.  Use the steps below to help you work through it.

Create the subnets:
Address space: 192.168.3.0/25

prepare it out in binary form identifying the host and network in table given below as a scratch pad to help you in subnetting as needed.  Remember to be competent you generally want to start by creating the largest subnet you require first and then continue subnetting to determine the smaller subnets in succession.

2120_Network-host.jpg

problem   

8 What is the HQ subnet (address/mask)?   

9 What is the R1 subnet (address/mask)?   

10 What is the R2 subnet (address/mask)?   

11What is the subnet for the HQ to R1 WAN (address/mask)?   

12 What is the subnet for the HQ to R2 WAN (address/mask)?   

13 What subnets do you have left available for future use?

PC’s on a LAN require to have a default gateway configured that identifies the next hop IP address for packets leaving the network.  This is the address of the router interface on the LAN.  Based on this what address will be assigned as the default gateway on the following PCs.

14 PC1 =

15 PC2 =

16 PC5 =

Fill in the address and subnet mask for the device interfaces in the table below using the assignment rules described above.

Device                 Interface      Address    Mask
HQ Router               Fa0/0      
                            S0/0/0   
                            S0/0/1   
R1 Router                Fa0/0   
                            S0/0/0   
R2 Router                Fa0/1   
                              S0/0/0   
PC1                       Ethernet   
PC2                     Ethernet         
PC5                      Ethernet

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91769

Have any Question? 


Related Questions in Computer Network & Security

Dqfacebook email electronic commerce and collaborative

DQ Facebook, email, electronic commerce, and collaborative sites for both work and leisure are a normal part of our everyday computing activities. Personal information entered on these websites become partially owned by ...

Term paper planning an it infrastructure audit for

Term Paper: Planning an IT Infrastructure Audit for Compliance Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment. The audit planning process directly affects the quality of the o ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Assignment network layerquestion 1 routing 1 use the packet

Assignment: Network Layer Question 1: Routing 1. Use the Packet Tracer software to build the above network. a. Choose the generic empty router type for your routers. b. Choose the generic empty switch type for your switc ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

Computer scienceunauthorized access to networks and the

Computer Science Unauthorized access to networks and the information they contain can present significant problems to an organization. Part of a good network improvement includes a review of system security and identific ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Assignment services in your arearesearch dsl and cable

Assignment: Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem ser ...

Security in wireless lans wans and telephonyactions for

Security in Wireless LANs, WANs, and Telephony Actions for 'Security in Wireless LANs, WANs, and Telephony A very challenging issue in IT industry is wireless security. Because of the specific technical principles involv ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen