Analyse and describe how a router performs

Assignment Help Computer Networking
Reference no: EM131428265

Question 1

(a) The primary function of a router is to determine the best path to use for sending packets. To determine the best path, the router searches its routing table for a network address that matches the destination IP address of the packet. Explain how the router processes an incoming packet using the routing table to determine the best path to forward the packet.

(b)

2318_Figure.jpg

Figure - 1(b)

i. Identify the type of route used between the routers R1 and R2 that facilitates the router R2 to reach the four networks shown in Figure - 1(b).

ii. Explain how you will configure the routing between the routers R1 and R2.

iii. Justify your selection by discussing its advantages.

(c) As a network administrator, explain the specific circumstances where you would use a static default route for packet routing.

Question 2

(a) Discuss any FOUR (4) reasons for an occurrence of routing loop and its implications on a network operation.

(b) Using Bellman Ford algorithm, construct a topology database of the network for router - A as shown in Figure - 2(b) and include the entries that are selected for routing table.

2443_Figure1.jpg

Figure - 2(b)

(c) One of the weaknesses of the Bellman Ford algorithm is that it does not have the capability to detect and eliminate routing loops.
i. With the aid of a diagram, explain how routing loops occur in Routing Information Protocol (RIP) enabled networks.

ii. Propose any TWO (2) methods which can be used to prevent the routing loops in the above said networks.

Question 3

(a) With the aid of a block diagram, analyse and describe how a router performs a hierarchical route lookup process when it receives an IP packet and decide which route in the routing table is the best match.

(b) Enhanced Interior Gateway Routing Protocol (EIGRP) has fast convergence time even though it is classified as Distance Vector Protocol. Explain the features of the EIGRP that reduces the time taken for convergence.

(c)

HQ# show ip route
<output omitted>

10.0.0.0/30 is subnetted, 1 subnets

C 10.10.10.252 is directly connected, Serial0/0/0

172.16.0.0/30 is subnetted, 1 subnets

C 172.16.100.0 is directly connected, Serial0/0/1

R 192.168.1.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.2.0/24 [120/16] via 10.10.10.254, 00:00:03,

Serial0/0/0 R 192.168.3.0/24 [120/1] via 10.10.10.254, 00:00:03,

Serial0/0/0 R 192.168.7.0/24 [120/1] via 172.16.100.2, 00:00:04, Serial0/0/1

Figure - 3(c)

Analyze the output shown in the Figure - 3(c).

i. Explain why the network 192.168.2.0/24 is not reachable from the HQ router.

ii. Explain how the HQ router was informed by Routing Information Protocol (RIP) that the 192.168.2.0/24 is not reachable.

Question 4

(a)

2216_Figure2.jpg

Figure - 4(a)

Calculate the best path to the network 10.0.0.0 from router-A in Figure - 4(a) using the Edsger Dijkstra's Shortest Path First (SPF) algorithm.

(b)

2449_Figure3.jpg

Figure - 4(b)

When designing Open Shortest Path First (OSPF) networks, all areas should be connected to the backbone area. However, due to topography constraint in Figure - 4(b) the Area-2 is connected with the Area-1. You are assigned to solve this problem.

i. Propose a solution to establish the connectivity for the Area-2.

ii. With the aid of diagram, explain your proposed solution.

iii. Provide the configuration of your proposed solution

(c)

Router# show ip eigrp topology

IP-EIGRP Topology Table for AS 1

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status

<output omitted>

P 10.10.12.0/24, 1 successors, FD is 5514496

via 172.16.1.38 (5514496/28160), Serial0/1/0 via 172.16.1.42 (7693056/6172416), Serial0/1/1

<output omitted>

P 10.10.14.128/25, 1 successors, FD is 6026496

via 172.16.1.38 (6026496/2172416), Serial0/1/0 via 172.16.1.42 (7181056/28160), Serial0/1/1

<output omitted>

Figure - 4(c)

Analyze the output shown in the above Figure - 4(c)

i. Explain how the Diffusing Update Algorithm algorithm chooses the best path to the network 10.10.12.0/24 and 10.10.14.128/25.

ii. If the chosen path is suddenly down, explain what will happen.

Question 5

(a) The Figure - 5(a) shows the output for the "ip ospf neighbour" command.

Router#sh ip ospf neighbor .

Neighbor

ID

Pri State

Dead Time

Address

Interface

192.168.1.4

1

FULL/DR

00:00:38

192.168.1.4

FastEthernet0/0

192.168.1.2

1

FULL/DROTHER

00:00:31

192.168.1.2

FastEthernet0/0

192.168.1.1

1

FULL/DROTHER

00:00:32

192.168.1.1

FastEthernet0/0

Figure - 5(a)

i. Analyse the above adjacency table and draw the topology diagram with details.

ii. Evaluate the design implications of the topology you analysed in part (a).i.

(b) Analyse the output of the "show running-config" command shown in Figure - 5(b) and explain the characteristics of a protocol used to establish the communication between networks 192.168.1.0 and 192.168.2.0.

Router# show running-config

Interface

Subinterface

Gateway IP Address/Mask

VLAN

ID

Router Encapsulation

Fa0/0

fa0/0.10

192.168.1.1/24

10

 

dot1q 10

Fa0/0

fa0/0.20

192.168.2.1/24

20

 

dot1q 20

(c) Compare and contrast OSPFv2 and OSPFv3

Question 6

(a)

821_Figure4.jpg

Figure - 6(a)

Figure - 6(a) shows two different scenarios for connecting Autonomous Systems (AS) using the Border Gateway Protocol (BGP). Explain how BGP path attributes are used to respectively set the preferred route as: AC from AS 100 to 200 and BD from AS 300 to AS 500.

(b) With the aid of a diagram, explain how the Internet Assigned Numbers Authority manages an IPv6 Global Unicast Address allocation to an organization.

(c) Discuss TWO (2) filter types that you can apply to the BGP update messages that your router exchanges with a particular BGP peer.

Reference no: EM131428265

Questions Cloud

Do you think tesla ceo elon musk did the right thing : Start reviewing and responding to the postings of your classmates as early in the week as possible. Respond to at least two of your classmates. Participate in the discussion by asking a question, providing a statement of clarification, providing a..
What are some of the obstacles that you might face : Imagine that you are a job recruiter for a national cable/internet company. How would you go about recruiting these potential reps and what are some of the obstacles that you might face
Research on program effectiveness reviewed : Research on program effectiveness reviewed and rated by expert reviewers. Easily understandable ratings based on the evidence that indicates whether a program achieves its goals
What types of techniques do leaders use to influence team : To support your work and demonstrate achievement of learning outcomes, be sure to incorporate the key relevant material from your reading as well as outside academically credible resources. All sources should be credited using APA which includes b..
Analyse and describe how a router performs : Discuss any FOUR reasons for an occurrence of routing loop and its implications on a network operation - Explain why the network 192.168.2.0/24 is not reachable from the HQ router - Calculate the best path to the network 10.0.0.0 from router-A in Fig..
What role conflicts forensic psychology professionals face : Using the module's readings and the Argosy University online library resources, respond to the following question: What role conflicts do forensic psychology professionals face while providing treatment in penal institutions
Describe the varieties of religious experience and practice : Choose ONE (1) category (origin of all things, nature of god, view of human nature, view of good and evil, etc.) from the chart to focus on for this assignment. Consider how the selected category relates to all of the religions covered and to your..
Briefly describe the essential features of the rnr model : Based on your research, respond to the following: Briefly describe the essential features of the RNR model and the GLM and analyze their strengths. Provide an opinion about whether both models are equally effective in enhancing community safety
Determine the service-related variance for patient days : Budgeting is an important activity within every healthcare organization. The particular challenges encountered, however, can vary depending on the type of organization. A state or federally funded organization, for example, will likely have a budg..

Reviews

Write a Review

Computer Networking Questions & Answers

  Advantages of firewall that provide a network

What advantages does a firewall offer provide a network?

  Create system to find all ad-authenticated logins for server

Create system to find all AD-authenticated logins for all servers and workstations (would include non-windows machines that authenticate to AD). Should be a web-based system. Needs to be secure, only using AD admins.

  How can azure be used as a substitute

Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management

  How can network administrators identify a potential denial

What is the TCP/IP suite? List and describe 5 protocols of the suite. How can network administrators identify a potential Denial of Service Attack.

  Write a paper on security architecture and design

Write a paper on Security Architecture and Design, Operations Security, Cryptography and Business Continuity and Disaster Recovery Planning.

  What are preferred architectures used in technology layers

How can you improve the performance of a BN?- Why are broadcast messages important?- What are the preferred architectures used in the technology layers in backbone design?

  Explain the network''s fundamental characteristics

Review the assignment instructions in the University of Phoenix Material: Integrative Network Design Project. Write a 2- to 4-page paper that includes the following based on your chosen Virtual Organization: Explain the network's fundamental characte..

  Calculate the total number of addresses in this block

COIT20261 Network Routing and Switching Assignment. ABEC Pty Ltd (a public company) has been granted a block of addresses starting with the address 172.154.60.0/24. Calculate the total number of addresses in this block. Show your calculation

  Explain a matrix that identifies specific departmental needs

Develop a matrix that identifies specific departmental needs for a company that you are familiar with.

  Describe mckinnon in the context of the frameworks

Describe McKinnon in the context of the frameworks and theories of cyber-crime and cyber criminals discussed in the classroom

  Network design and analysis

Data Communications: Network Design and Analysis Please read the article: University of Miami Miller School of Medicine New WLAN cuts APs. (Network Computing 3.3.2005). A copy of this article is on Blackboard in the same place as this assignment.

  From your study of asymmetric and symmetric key

from your study of asymmetric and symmetric key cryptography use your own words to compare between them in terms of1.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd