Compare and contrast link-state and distance-vector routing

Assignment Help Data Structure & Algorithms
Reference no: EM13324937

1. Compare and contrast link-state and distance-vector routing algorithms. Give examples of each.

2. Consider the following network.
a. With the indicated link costs, use Djkstra's shortest path algorithm to compute the shortest path from E to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3 in the textbook.
b. Eliminate node A, and redo the problem starting from node B.

Wireshark Lab

Part I:

This week's lab assignment will require you to learn the use of following two popular commands: ping [1], and tracert [2], [3], [4] (for windows). Please notice that these commands should be issued through the DOS windows of the system.

Ping (ping) between your location and thewww.google.comat three different hours of the day.

Find out the Internet address (IP address) of thewww.google.comand find out the Internet address (IP address) of your computer?

Find the average round trip time (delay).

Trace route (tracert) between your location andwww.google.comat three different hours of the day.

Find the average round trip delay. Is it the same as in case of ping?

Find the number of routers in the path at each of the three hours. Did the paths change during any of the hours?

Note: You can also use the VisualRoute (www.Visualroute.com). It will also give you the information about the physical location of each ISP network that the Traceroute packets pass through from source to destination. Free 15 days trial version is available at [5].

Part II: - Wireshark Lab for IP

Follow the instructions given at the text's web site (Wireshark lab for IP) and answer question 5.

Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer?

Part III:- Wireshark Lab for ICMP

Follow the instructions given at the text's web site (Wireshark lab for ICMP) and answer question 3 and 4.

Examine one of the ping request packets sent by your host. What are the ICMP type and code numbers? What other fields does this ICMP packet have? How many bytes are the checksum, sequence number and identifier fields?

Examine the corresponding ping reply packet. What are the ICMP type and code numbers? What other fields does this ICMP packet have?

How many bytes are the checksum, sequence number and identifier fields?

Note: You can use VisualRoute trial version [5] or ping and trace route commands at your command prompt.

[1]: MS-DOS ping command help, Computer Hope (tm), available athttps://www.computerhope.com/pinghlp.htm(Accessed on August 16, 2010)

[2]: MS-DOS tracert command help, Computer Hope (tm), available athttps://www.computerhope.com/tracert.htm(Accessed on August 16, 2010)

[3]: Understanding a Tracert, The Worldnet User's Reference Desk (WURD), AT&T Worldnet Service, AT&T Corp. available at:https://www.wurd.com/misc_tracert.php (Accessed on August 16, 2010)

[4]: Phillips George, Interpreting Traceroute Results, available athttps://oxide.sprintlink.net/traceroute.html (Accessed on August 16, 2010)

[5]: VisualRoute, Shareware downloads TCP/IP Networking - Traceroute Tools, by SnapFiles, available athttps://www.snapfiles.com/shareware/network/swtraceroute.html (Accessed on August 16, 2010)

Use the Turnitin linkbelow to submit your assignment.

Reference no: EM13324937

Questions Cloud

Explain moles of a monoprotic weak acid : The half-equivalence point of a titration occurs half way to the end point, where half of the analyte has reacted to form its conjugate, and the other half still remains unreacted. If 0.560 moles of a monoprotic weak acid
What are some advantages of written over oral communication : What are some advantages of written over oral communication? Breakdowns in the written process are less difficult to locate than are breakdowns in the oral process. Discuss this statement. Give an example of where two written messages on the same top..
Discussion on matching technology with the message : Explain why a sensitive message should be sent on a medium with a wide bandwidth. Why would a contemporary manager be tempted to use a medium with a narrow bandwidth for a sensitive message? What are the disadvantages to categorizing messages in the ..
Examples of critical errors in communication : Cite several examples of critical errors in communication. How could they have been avoided? Give an examples of polarization. Demonstrate how communication technology has advanced in the past five years. How has this technology affected the manageme..
Compare and contrast link-state and distance-vector routing : Examine the corresponding ping reply packet. What are the ICMP type and code numbers? What other fields does this ICMP packet have?
Example of status distorting the communication process : Give an example of a channel. What channel is used by a restaurant to tell you the price of a meal? Identify some cultural differences between people who work in a hospital and a manufacturing plant. Give an example of status distorting the communica..
Define what is the pressure inside the container : A container of gas with an adjustable volume has an initial pressure of p. The container volume is tripled at constant temperature. What is the pressure inside the container after the volume is increased
Increases the demand for more efficient communication : Give a specific example in which a demand for greater quality also increases the demand for more efficient communication. Describe a situation that may have cased a manager to be unethical in which the problem was more one of poor communication than ..
Develop a fact-finding plan including interviews : Review the organizational model above and list the individuals you would like to interview. Prepare a list of objectives for each of the interviews you will conduct.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd