Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Distance Vector Routing Protocols

problem   

1 What does RIP stand for?   

2 What metric does RIP use for Path Selection?   

3 If metric used by RIP exceeds this value for a route it is considered unreachable, effectively making this value appear to be infinity to RIP?   

4 How often does RIP send updates by default (update timer)?   

5 What are the major differences between RIPv1 and RIPv2?   

6 What is convergence and why is it significant?   

7 Is RIP considered to be a fast or slow converging protocol?

For the simple 3 router network (Figure below), fill in the information that will be in each router’s routing table once the network has converged

417_Router network.jpg

                    R1                                       HQ                                     R3   
Network      Interface    Hop        Network    Interface    Hop        Network    Interface    Hop
172.15.0.0    Fa0/0        0

Subnetting and Assigning Addresses

1537_addressing design scenario.jpg

You are a network administration for the small network in above Figure.  It consists of your headquarters location with a LAN with 60 hosts, remote office R1 with 10 hosts, and remote office R2 with 30 hosts.  You have been assigned the address space 192.168.3.0/25.  From this space you would require to create the subnets for each of the sites on your network and the two WAN links.  Once you find the subnets assign addresses to the Routers interfaces and PCs using the following guidelines:  Assign the first address from LAN subnets to the router interface connected to that LAN.  Assign the second IP address in the LAN subnet to the PC on the LAN.  Assign the first Address from WAN subnets to the HQ router end of the WAN link and the second address to the remote router interface.  Use the steps below to help you work through it.

Create the subnets:
Address space: 192.168.3.0/25

prepare it out in binary form identifying the host and network in table given below as a scratch pad to help you in subnetting as needed.  Remember to be competent you generally want to start by creating the largest subnet you require first and then continue subnetting to determine the smaller subnets in succession.

2120_Network-host.jpg

problem   

8 What is the HQ subnet (address/mask)?   

9 What is the R1 subnet (address/mask)?   

10 What is the R2 subnet (address/mask)?   

11What is the subnet for the HQ to R1 WAN (address/mask)?   

12 What is the subnet for the HQ to R2 WAN (address/mask)?   

13 What subnets do you have left available for future use?

PC’s on a LAN require to have a default gateway configured that identifies the next hop IP address for packets leaving the network.  This is the address of the router interface on the LAN.  Based on this what address will be assigned as the default gateway on the following PCs.

14 PC1 =

15 PC2 =

16 PC5 =

Fill in the address and subnet mask for the device interfaces in the table below using the assignment rules described above.

Device                 Interface      Address    Mask
HQ Router               Fa0/0      
                            S0/0/0   
                            S0/0/1   
R1 Router                Fa0/0   
                            S0/0/0   
R2 Router                Fa0/1   
                              S0/0/0   
PC1                       Ethernet   
PC2                     Ethernet         
PC5                      Ethernet

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91769

Have any Question? 


Related Questions in Computer Network & Security

Assessment project network securityyou have been recently

Assessment Project Network Security You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your ...

Research paperfor this writing assignment you find a

Research Paper For this writing assignment, you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on th ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Write one paragraph only for each questions1- can a

Write one paragraph only for each questions. 1- Can a business survive in today's world without a website or a poorly maintained website? Why or Why not? 2- What's your biggest fear about using the Internet? Why? Can you ...

Assignmentyour boss has had an intrusion or so she says on

Assignment Your boss has had an intrusion (or so she says) on his home network. She has brought in a packet capture file for you to analyze. She says: "Something has happened on my home network. I use my network for inte ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

Security in wireless lans wans and telephonyactions for

Security in Wireless LANs, WANs, and Telephony Actions for 'Security in Wireless LANs, WANs, and Telephony A very challenging issue in IT industry is wireless security. Because of the specific technical principles involv ...

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen