Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Distance Vector Routing Protocols

problem   

1 What does RIP stand for?   

2 What metric does RIP use for Path Selection?   

3 If metric used by RIP exceeds this value for a route it is considered unreachable, effectively making this value appear to be infinity to RIP?   

4 How often does RIP send updates by default (update timer)?   

5 What are the major differences between RIPv1 and RIPv2?   

6 What is convergence and why is it significant?   

7 Is RIP considered to be a fast or slow converging protocol?

For the simple 3 router network (Figure below), fill in the information that will be in each router’s routing table once the network has converged

417_Router network.jpg

                    R1                                       HQ                                     R3   
Network      Interface    Hop        Network    Interface    Hop        Network    Interface    Hop
172.15.0.0    Fa0/0        0

Subnetting and Assigning Addresses

1537_addressing design scenario.jpg

You are a network administration for the small network in above Figure.  It consists of your headquarters location with a LAN with 60 hosts, remote office R1 with 10 hosts, and remote office R2 with 30 hosts.  You have been assigned the address space 192.168.3.0/25.  From this space you would require to create the subnets for each of the sites on your network and the two WAN links.  Once you find the subnets assign addresses to the Routers interfaces and PCs using the following guidelines:  Assign the first address from LAN subnets to the router interface connected to that LAN.  Assign the second IP address in the LAN subnet to the PC on the LAN.  Assign the first Address from WAN subnets to the HQ router end of the WAN link and the second address to the remote router interface.  Use the steps below to help you work through it.

Create the subnets:
Address space: 192.168.3.0/25

prepare it out in binary form identifying the host and network in table given below as a scratch pad to help you in subnetting as needed.  Remember to be competent you generally want to start by creating the largest subnet you require first and then continue subnetting to determine the smaller subnets in succession.

2120_Network-host.jpg

problem   

8 What is the HQ subnet (address/mask)?   

9 What is the R1 subnet (address/mask)?   

10 What is the R2 subnet (address/mask)?   

11What is the subnet for the HQ to R1 WAN (address/mask)?   

12 What is the subnet for the HQ to R2 WAN (address/mask)?   

13 What subnets do you have left available for future use?

PC’s on a LAN require to have a default gateway configured that identifies the next hop IP address for packets leaving the network.  This is the address of the router interface on the LAN.  Based on this what address will be assigned as the default gateway on the following PCs.

14 PC1 =

15 PC2 =

16 PC5 =

Fill in the address and subnet mask for the device interfaces in the table below using the assignment rules described above.

Device                 Interface      Address    Mask
HQ Router               Fa0/0      
                            S0/0/0   
                            S0/0/1   
R1 Router                Fa0/0   
                            S0/0/0   
R2 Router                Fa0/1   
                              S0/0/0   
PC1                       Ethernet   
PC2                     Ethernet         
PC5                      Ethernet

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91769

Have any Question? 


Related Questions in Computer Network & Security

Research paperfor this writing assignment you find a

Research Paper For this writing assignment, you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on th ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

Network security paper in this paper you will define the

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disa ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Module discussion questionpersonal factors such as anger

Module Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate se ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

Two reasearch paperswan technologies paper research

Two Reasearch Papers WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission techn ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

Assignmentall questionscarry equal weight do not change the

Assignment All Questionscarry equal weight. Do not change the order of questions. To receive full credit, show all of your work. Answers must be typed in, following APA style. Handwritten solutions will not be accepted a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro