Application of bellman ford algorithm

Assignment Help Computer Networking
Reference no: EM132234791

Assessment - IP routing

Part A: Implement IP routing in a simulated environment Scenario

‘Effective Design' (ED) is a software solutions provider located in Melbourne. They are planning to have three more branches in Perth, Queensland and Sydney.

Before moving to the actual design and implementation phase ED want one of their IT staff members to come up with a simulated design of the proposed network.

ED's Network Manager has already come up with the topology and the IP addressing scheme for the topology. Below as shown in Figure 1 is the topology proposed by the Network Manager.

558_figure.jpg

Figure 1

Details of the proposed topology are as follows:

- There are 4 routers (Cisco 2811), one for each branch. HQ-Melbourne is the edge router for the Melbourne branch. B-Perth is the edge router for Perth branch. B-Queensland is the edge router for Queensland branch. B-Sydney is the edge router for Sydney branch.

- Altogether, there are four Local Area Networks (LANs) and three Wide Area Networks (WANs).

- Melbourne LAN is connected to the HQ-Melbourne router.

- Queensland LAN is connected to the B-Queensland router.

- Sydney LAN is connected to the B-Sydney router.

- Perth LAN is connected to the B-Perth router.

- The network address of each subnet is already decided. Table 1 shows the list of network names and the planned network addresses.

Network

Network address

 

 

Melbourne LAN

172.16.10.0/28

 

 

Queensland LAN

172.16.10.16/28

 

 

Sydney LAN

172.16.10.32/28

 

 

Perth LAN

172.16.10.48/28

 

 

Mel_to_Queens WAN

195.168.50.0/30

 

 

Mel_to_Sydney WAN

195.168.50.4/30

 

 

Mel_to_Perth WAN

195.168.50.8/30

 

 

 

 

Table 1

Requirement

You have been approached by ED's IT Manager to implement, configure and troubleshoot the proposed network in a simulated environment and ensure that it is ready for actual implementation.

Task 1: Building the topology

Create the network diagram shown in Figure 1 using Cisco packet tracer. Use suitable cable types when cabling the devices. Label the devices as depicted in Figure 1.

a) Save the Cisco Packet Tracer file as xxx_cse2cnx_assessment3.pkt. (where xxx is your student number)

b) Include a screenshot of your topology as evidence of the completion of this task.

Task 2: Planning IP addresses

The allocated network addresses are given in Table 1. Refer Table 1 before starting this task.

Guidelines for planning:

- The default gateway for each LAN should be the last useable IP address of the subnet.

- All end device IP addresses can be assigned using any useable IP address from the useable range for that subnet.

Fill the attached Table 2 with your planned IP addresses and default gateways.

Task 3: Configuring ethernet and Serial interfaces

a) Configure ethernet interfaces of all the end devices (M-PC1, M-PC2, Q-PC1, Q-PC2, S-PC1, S-PC2, P-PC1, P-PC2) with the IP addresses, subnet masks and default gateways from Table 2.

For M-PC1, Q-PC1, S-PC1 and P-PC1 take screenshots of the completed IP configuration window as evidence of the completion of this task and include in the word file.

b) Configure and activate ethernet and serial interfaces on each router using IP addresses and subnet masks from Table 2.

c) Issue the command "show ip interface brief" on each router and provide screenshots of the output.

Task 4: Basic configuration of the routers

a) Configure the following on HQ-Melbourne, B-Queensland, B-Sydney, B-Perth.

- Configure the router hostname as depicted in Figure 1 (labels).

- Configure an enable password.

- Configure an enable secret.

- Configure a console password.

- Configure a telnet password.

- Configure the ‘Message of the Day' banner (MOTD) as "Unauthorized access is prohibited!!".

- Save the configurations.

b) Fill Table 3 as shown below with the chosen hostnames and passwords for each of the routers. Name the tables as Table HQ-Melbourne, Table B-Queensland, Table B-Sydney and Table B-Perth.

c) Take a screenshot of the startup-configuration of each router and include in the Word file as evidence of completing this task.

Task 5: Configure OSPFv2 on routers

a) Configure OSPF on router, HQ-Melbourne. Table 4 shows a breakdown of the configuration tasks. Issue "show ip protocols" command on the HQ-Melbourne router and provide a screenshot of the output.

b) Configure OSPF on router, B-Queensland. Table 5 shows a breakdown of the configuration tasks. Issue "show ip protocols" command on the B-Queensland router and provide a screenshot of the output.

c) Configure OSPF on router, B-Sydney. Table 6 shows a breakdown of the configuration tasks. Issue "show ip protocols" command on the B-Sydney router and provide a screenshot of the output.

d) Configure OSPF on router, B-Perth. Table 7 shows a breakdown of the configuration tasks. Issue "show ip protocols" command on the B-Perth router and provide a screenshot of the output.

Task 6: Verifying the OSPFv2 configurations

a) Which command will list all connected neighbours and the adjacency state?

b) Issue the command that lists all connected neighbours on each router and provide screenshots of the output.

c) Which command will display the IP routing table of a router?

d) Provide screenshots of each routers' routing table.

Task 7: Verify network connectivity

a) Issue the "ping" command from M-PC1 to Q-PC1. Include a screenshot of the ping command output.

b) Issue the "ping" command from M-PC1 to S-PC1. Include a screenshot of the ping command output.

c) Issue the "ping" command from M-PC1 to P-PC1. Include a screenshot of the ping command output.

Part B: Apply routing algorithms

Requirement

You are asked to use two different routing algorithms to find the shortest paths in a network.

These are as follows.

• Dijkstra algorithm

• Bellman Ford algorithm

The network topology with all the link costs is shown below in Figure 2.

839_figure1.jpg

Figure 2

Task 1: Application of Dijkstra's algorithm

Using Dijkstra's algorithm on Figure 2, determine the shortest paths from A to all network nodes.

Part of the answer is given in Table 8. Fill in the blanks (highlighted) in Table 8.

Notes on the table:

• T - Set of nodes so far incorporated by the algorithm

• L(n) - Cost of the least-cost path from source A to node n that is currently known to the algorithm (n is B, C, D, E, F, G and H)

Task 2: Application of Bellman Ford algorithm

Use Bellman Ford algorithm on Figure 2, determine the shortest paths from A to all network nodes. Part of the answer is given in Table 9. Fill in the blanks (highlighted) in Table 9(attached).

In the table:

• h - Maximum number of links in path at current stage of the algorithm

• Lh(n) - Cost of the least-cost path from source A to node n under constraint of no more than h links (n is B, C, D, E, F, G and H)

Attachment:- Assessment - IP routing.rar

 

 

Reference no: EM132234791

Questions Cloud

What is the? bond yield to? maturity : The market price is ?$775 for a 17 year bond ?($1,000 par value) that pays 9 percent annual? interest, but makes interest payments on a semiannual basis
Meeting the minimum level of each shift requirements : Find the employee schedule that minimizes the total number of dealers required, meeting the minimum level of each shift’s requirements.
What is the current price of shuffle step stock : If the required rate of return is 7 percent, what is the current price of Shuffle Step stock?
Interest rates increase by 75 basis points : A two-year bond that pays an annual coupon of 12 percent, duration 1.8912 and has a current yield to maturity of 14 percent.What would be the percentage change
Application of bellman ford algorithm : CSE2CNX - Computer Networks - Determine the shortest paths from A to all network nodes - different routing algorithms to find the shortest paths in a network
Create screen layouts that illustrate the interface : Create three to five (3-5) screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution.
Minimum cost blend of two soil amendment mixtures : Formulate linear programming model that will allow the University of Iowa to conduct this experiment using a minimum cost blend of two soil amendment mixtures
The production of other products to produce giraffes : Jungle is considering diverting 10 hours of machine time from the production of other products to produce giraffes.
Write response of given problem based on the email : Capture a spam Email message. View the Email header and copy the information to your assignment document. Only one email is necessary.

Reviews

len2234791

2/14/2019 11:42:39 PM

When you have completed the tasks, submit the assessment via the CSE2CNX_2018_02 A3: Routing link on the LMS system. You should submit the following: • Submit your Cisco Packet Tracer based project named as xxx_cse2cnx_assessment3.pkt (where xxx is your student number). • Submit your answers to the relevant tasks in a single Word document called xxx_cse2cnx_assessment3.docx (where xxx is your student number).

len2234791

2/14/2019 11:42:18 PM

Part B: Apply routing algorithms Task 1: Application of Dijkstra’s algorithm Blanks are filled correctly 5 5 Task 2: Application of Dijkstra’s algorithm Blanks are filled correctly 5 5 Total 140

len2234791

2/14/2019 11:42:05 PM

Task 7: Verify network connectivity Ping command issued properly 1 10 a) Ping command output is successful, and screenshot 3 provided. (M-PC1 to Q-PC1) b) Ping command output is successful, and screenshot 3 provided. (M-PC1 to S-PC1) c) Ping command output is successful, and screenshot 3 provided. (M-PC1 to P-PC1)

len2234791

2/14/2019 11:41:54 PM

Task 6: Verifying the OSPFv2 configurations a) Command provided for listing all connected neighbours is 2 12 correct. b) Screenshots of the command output is provided for all four 4 routers. c) Command provided for displaying the IP routing table is 2 correct. d) Screenshots of each routers’ routing table are provided. 4

len2234791

2/14/2019 11:41:41 PM

b) All the OSPF configuration tasks were correctly done on 5 BQueensland. (As per Table 5) Screenshot of the “show ip protocols” command output is provided 20 c) All the OSPF configuration tasks were correctly done on 5 BSydney. (As per Table 6) Screenshot of the “show ip protocols” command output is provided. d) All the OSPF configuration tasks were correctly done on 5 BPerth. (As per Table 7) Screenshot of the “show ip protocols” command output is provided.

len2234791

2/14/2019 11:41:32 PM

Task 5: Configure OSPFv2 on routers a) All the OSPF configuration tasks were correctly done on 5 HQ-Melbourne. (As per Table 4) Screenshot of the “show ip protocols” command output is provided.

len2234791

2/14/2019 11:41:24 PM

Task 4: Basic configurations of the routers a) All configurations were done properly. 14 29 b) Table HQ-Melbourne, Table BQueensland, Table B- 10 Sydney and Table B-Perth were filled with configured parameters. d) Startup-configuration screenshot provided and shows the 5 configurations changes

len2234791

2/14/2019 11:41:14 PM

Task 3: Configuring Ethernet and Serial interfaces a) IP addresses, subnet masks and default gateways were 12 27 configured on all end devices as per Table 2. Screenshots provided for MPC1, Q-PC1, S-PC1 and PPC1. b) Ethernet and serial interfaces were configured with correct 10 IP addresses and subnet masks. c) Command “show ip interface brief” was issued and 5 screenshot provided for each router.

len2234791

2/14/2019 11:41:04 PM

Task 2: Planning IP addresses a) Table 2 was filled with correct IP address information. 22 22

len2234791

2/14/2019 11:40:56 PM

Part A: Implement IP routing in a simulated environment Task 1: Building the topology a) Proposed network topology was created in Cisco Packet 8 10 Tracer. (As per Figure 1) b) Screenshot of the topology was provided. 2

Write a Review

 

Computer Networking Questions & Answers

  Describe what 3g and 4g are regarding wireless standards

Describe what 3G and 4G are regarding wireless cellular standards. What are the major differences between the two generations?

  Insert these items into a bst

Insert these items into a BST (using alphabetical order): Hockey, Baseball, Football, Tennis, Swimming, Ice skating, Badminton, Hopscotch, Basketball, Water polo, Crew.

  Difference between dynamic routing and static routing

What is difference between dynamic routing and static routing? If you have another option to use dynamic routing in this project, how would you like to do?

  Compare the total achieved throughput

Compare the total achieved throughput in the 11g WLAN when the legacy node is associated and not associated with the WLAN's access point.

  Identify at least two software change management products

Use the Internet to identify at least two software change management products. Contrast their features and costs.

  Problem-solving procedure to find files from unknown source

Use problem-solving and brainstorming skills to find a procedure to follow. Write a short report outlining what to do.

  Design and implement secure enterprise wireless networks

Design and implementation of secure enterprise wireless network - Design and implement secure enterprise wireless networks.

  What benefits are derived from the using a common network

What benefits are derived from the using a common network for all onboard systems. Comment on the security concern. Why was an FAA Special Condition issued? How was the concern addressed.

  Determine result of scrambling sequence using techniques

Determine the result of scrambling sequence 11100000000000 by using one of the following scrambling techniques? Suppose that last non-zero signal level has been positive.

  What is the range of relative jump addresses possible in asc

Another popular addressing mode is PC-relative addressing. An example of such an instruction is BRU + 5, meaning add 5 to the current PC value.

  What are possible issues based on the information provided

What are possible issues based on the information provided? What kind of information would a network administrator look for in the trace file that was captured from the IP Host to the local router

  How client process in given end system can find location

Describe how client process in given end system can find location of given user to establish connection, for instance, Internet telephone, at given point in time.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd