Compare distance vector routing with link state routing

Assignment Help Computer Network Security
Reference no: EM131010963

Task

This assessment item is to produce a short report by investigating and addressing some key topics for this subject. Note answering these questions will help you build some understanding for the next assessment item as well as for the entire subject material. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the Resource section of Interact site.

Answers MUST be written in your own words. If an answer contains more than 20% direct quote (referenced or unreferenced) 0 marks will be awarded for this question.

One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated.

For mathematical and subnetting questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

Question 2

(Show your working and give a short explanation for each answer.)

Designing IP Addressing schemes and configuring IP Addressing is a common activity undertaken by network engineers. Consider an ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP needs to distribute these blocks to 2600 customers as follows:[7 marks]

a. The first group has 200 medium-size businesses; each needs approximately 128 addresses.

b. The second group has 400 small-size businesses; each needs approximately 16 addresses.

c. The third group has 2000 households; each needs 4 addresses.

Design the sub blocks and give the slash notation for each sub block. Find out how many addresses are still available after these allocations.

Question 3

Consider the diagram below. Which of the two central routers (R1 and R2) is more critical for network operations and why?

Question 4

Contrast and compare distance vector routing with link state routing.

Question 5

Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?

Rationale

This assessment relates to the following earning objectives of this subject:
• be able to explain the TCP/IP architecture and layers and compare with the OSI layers;
• be able to analyse IP addressing requirements and design an addressing scheme;
• be able to analyse the requirements of IP routing and choose appropriate routing methods;
• be able to demonstrate how internetworking devices obtain their network configuration;
• be able to explain how data flows through the internet;
• be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet; and
• be able to discuss the evolution and ongoing change of the internet.

Verified Expert

The work has been done on the networking, focusing on the routing, switching and ICMP messages. There are solutions for different questions on network and subnetting. The work has been provided considering the word limit 550 for all the theoritical questions. there is no work limit for the technical questions. APA format.

Reference no: EM131010963

Questions Cloud

What plan of action do you suggest : Plan an acquisition strategy to acquire the XYZ SBG(G)N. You reach an impasse with General Statics in your negotiations. What plan of action do you suggest
What is simpson''s average annual rate of growth of sales : Simpson Construction had sales seven years ago of $2,150,000. This year their sales hit $4,600,000. What has been Simpson's average annual rate of growth of sales?
Determining the investment in the partnership : Prepare the entry to record Nichols's investment in the partnership, assuming the equipment has a fair value of $4,000.
Decision rules payback-npv-irr : Which of the decision rules (payback, NPV, or IRR) do you think is the best rule for a firm to use when evaluating projects? Be sure to justify your choice.
Compare distance vector routing with link state routing : Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?
Underlying determinants of the projects cash flows : Bridgeway Pharmaceuticals manufactures and sells generic over-the-counter medications in plants located throughout the Western Hemisphere. What is the probability of a cash flow less than $150,000 in Year 1? In Year 5? What are the means and standard..
Determine the fair present value of the bond : BSW Corporation has a bond issue outstanding with an annual coupon rate of 5.8 percent paid quarterly and four years remaining until maturity. The par value of the bond is $1,000. Determine the fair present value of the bond if market conditions just..
Describe the structure of your ecosystem : Describe the structure of your ecosystem including important abiotic features and dominant plant and animal species. Explain some functions/processes of your ecosystem including one nutrient cycle and one food chain
What is a better pricing strategy for the monopolist : Demand is given by Qd = 620 - 10xP and supply is given by Qs = 100 + 3xP. What is the price and quantity when the market is in equilibrium?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Suppose that you are amerchant find out the advantages and

the payment card industry data security standard pci dss is used by credit card companies to ensure the safety of the

  Social and Political Issues in an Information Society

These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control." Give a business example of each.

  It infrastructure groups

Information Technology infrastructure groups are often responsible for direct customer interaction and associated customer service.

  Why input-output activity is problem with memory protection

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

  Analysis to be presented in a 10- to 15-slide microsoft

analysis to be presented in a 10- to 15-slide microsoft powerpoint presentation and use detailed speaker notes for

  Knowing the threat

Explain the added challenges of securing wireless devices versus securing LAN-connected devices. Imagine you are starting a new small- to-midsized cybercafe business from the ground up. Explain which areas of your network would be LAN based and wh..

  Ealuate the significance of the internet describe how the

1. analyze the evolution of internet to do this show how it has changed over time.2. evaluate the significance of the

  What percentage of the modules exceed the structure

Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?

  Role of ethics in developing the certification package

Description of the role of ethics in developing the certification package and Description of how to represent the required documentation and requirements in the certification package

  Identifying and discussing technological improvements

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Overview of network security fundamentals

Overview of network security fundamentals, security threats, and issues (discuss from a company wide standpoint).

  Find the sequence obtained by applying successively the

1 encrypt the message buy now using the knapsack cipher based on the sequence obtained from the super-increasing

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd