Explain how dual algorithm chooses the best path

Assignment Help Computer Networking
Reference no: EM131428171

This paper consists of SIX (6) questions. Answer any FOUR (4) questions in the answer booklet provided. All questions carry equal marks.

Question 1

(a)

1461_Figure.jpg

 

John - PC

Router - A

Router - B

Alex - PC

IP address

1.1.1.1/24

Fa0/0 -  1.1.1.254/24 Fa 0/1 -192.168.1.1/30

Fa0/0 -2.1.1.254/24 Fa0/1 -192.168.1.2/30

2.1.1.1/24

Mac Address

1111.1111. 1111

Fa0/0 - 2222.2222.2222

Fa0/1 - 3333.3333.3333

4444.4444.4444

5555.5555.5555

aaaa.aaaa.aaaa

Figure 1(a)

Provide a step-by-step procedure of the routing process that takes place when user John sends a packet to user Alex.

(b)

1858_Figure1.jpg

Figure 1(b)

The HQ and the Branch of ABC Corporation are connected through a private WAN (cloud) as well as via the Internet for redundancy purposes as sown in Figure 1(b).

i. Identify the type of routing used between the routers and the Branch that facilitates the high availability and also prevents layer-3 looping.

ii. Explain the working principle of your proposed solution.

iii. Explain the disadvantage of your proposed solution.

Question 2

(a)

156_Figure2.jpg

Figure 2(a)

Using Bellman Ford algorithm, construct a topology database of the network for router - A as shown in Figure 2(a) and highlight the entries that are selected for routing table.

(b) Even though Enhanced Interior Gateway Routing Protocol (EIGRP) is classified as a Distance Vector (DV) Protocols, its working principles is different from conventional DV protocol. Discuss any FIVE (5) behaviors of EIGRP which clearly illustrate these differences.

(c) As a network administrator, explain in which situations you would choose to use the distance vector routing protocols.

Question 3

(a)

Router#sh ip route

 

********Output removed *******

Gateway of last resort is not set

R    192.168.1.0/24 [120/1] via 192.168.2.1, 00:00:15, FastEthernet0/0

********Output removed *******

Figure 3(a)

Analyze the output shown in Figure 3(a) (shown in bold) of the command "show ip route" and explain its components and each's significance.

(b)

Router# show ip eigrp topology

IP-EIGRP Topology Table for AS 1

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status

<output omitted>

P 10.10.12.0/24, 1 successors, FD is 5514496

via 172.16.1.38 (5514496/28160), Serial0/1/0 via 172.16.1.42 (7693056/6172416), Serial0/1/1

<output omitted>

P 10.10.14.128/25, 1 successors, FD is 6026496

via 172.16.1.38 (6026496/2172416), Serial0/1/0 via 172.16.1.42 (7181056/28160), Serial0/1/1

<output omitted>

Figure 3(b)

Analyze the output shown in the above Figure 3(b).

i. Explain how DUAL algorithm chooses the best path to the networks 10.10.12.0/24 and 10.10.14.128/25.

ii. If the chosen path is suddenly down, explain what will happen.

(c) By default, Routing Information Protocol (RIP) updates are forwarded out of all RIP enabled interfaces. However, RIP updates really only need to be sent out to interfaces connecting to other RIP enabled routers. Explain what happens when RIP updates and sent out of Local Area Network (LAN) interfaces.

Question 4

(a) With the aid of a block diagram, explain how a router would choose the most appropriate route from its "ip routing table", while performing a routing lookup process to forward packets.

(b)

1986_Figure3.jpg

Figure 4(b)

Figure 4(b) shows the topology with each link cost. Construct the shortest Path First (SPF) tree for the router R1 using the Edsger Dijkstra's algorithm.

(c) Justify why most of the network designers and administrators prefer to use Link-State Routing protocols over Distance Vector protocol. (Provide any THREE (3) reasons).

Question 5

(a)

1645_Figure4.jpg

Figure 5(a)

All routers shown in Figure 5(a) are enabled with Open Shortest Path First (OSPF) with default setting. Router-A learns of the network 10.0.0.0 via routers B, C and D.

i. Analyze and explain the problems involved in building a routing table to route packets from router-A to the network 10.0.0.0.

ii. Propose your solution to solve the problems and explain the results of your proposed solution.

(b)

1366_Figure5.jpg

Figure - 5(b)

By default, OSPF routers exchange Link State Advertisements (LSAs) by flooding them to all OSPF neighbours and this action affects the performance of the Broadcast and Non- Broadcast Multiple Access topology shown in Figure 5(b). Explain how OSPF addresses this LSA flooding problem to enhance network performance.

(c)

1512_Figure6.jpg

Figure 5(c)

You are assigned to implement and configure the above shown network segment in your organization. Discuss how would you configure and implement the routing between the users on VLAN 10, 20 and 30.

Question 6

(a) Discuss the first FIVE (5) steps of the complex algorithm of Border Gateway Protocol (BGP) to determine the best path while at the same time updating both the BGP Routing Information Base and routing table.

(b) With the aid of a diagram, explain how the Internet Assigned Numbers Authority (IANA) allocates an IPv6 Global Unicast Address to an organization.

(c) A Teredo client has the address 2001::62C3:1B8D:346B:EBC9:7C94:EA26. With reference to this IPv6 address, answer the following questions.

i. Is this client behind a cone NAT or a restricted NAT?

ii. What is the public IPv4 address of its Teredo server?

iii. What is the external IPv4 address?

iv. What is the UDP port number for this Teredo client's Teredo traffic?

Reference no: EM131428171

Questions Cloud

Purpose of the diffie-hellman algorithm : Question 1: Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature. Question 2: What is the purpose of the Diffie-Hellman algorithm? What are its major ..
Satellite television versus cable : Examine and compare one of the following product sets. Base your comparison on such factors as features, costs, convenience, ease of use, ease and/or cost of repair, and safety. Satellite television versus cable.
Complex business requirements : Company decided to implement SAP as it's ERP system to support it's complex business requirements. The company has taken the approach to use the standard out-of-the-box solution and has decided to not customize it. As a part of the implementation ..
Project stakeholders and project team : Q: You are the project manager of the Server Installation Project for your organization. You're working with your project stakeholders and project team to create the project management plan.
Explain how dual algorithm chooses the best path : BACHELOR OF COMPUTER SCIENCE (HONS) - BCSI - CIS3202: ROUTING PROTOCOLS AND CONCEPTS - Provide a step-by-step procedure of the routing process that takes place when user John sends a packet to user Alex - Identify the type of routing used between the..
Give an example for five major tasks of management : What is the difference between male and female kinesis behavior in nonverbal communication? Give an example for five major tasks of management. Give advantages and disadvantages of alternative strategies on JetBlue Airlines.
Network operation and troubleshooting more complicated : In what way does VLAN implementation in a switched network make network operation and troubleshooting more complicated?
Describe the person background : Write a 700- to 1,050-word paper in which you describe the person's background, psychological perspective, and the contribution he or she made to the field of psychology
Introduction to management information systems course : You have just completed ten (10) weeks of an introduction to management information systems course. Imagine you have been asked to create a one (1) day training course that highlights the important elements of what you have just learned within the ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Which windows server 2003 fault-tolerant feature protect

Explain why it might be a good idea to audit successful access to files in a directory that contains highly confidential files.

  The data encryption standard des is a symmetric-key

the data encryption standard des is a symmetric-key algorithm for the encryption of electronic data which you

  How to evaluate a hash

We have been handed a file that contains a bunch of encoded text or hashed passwords and we need get these back into a readable plain text format. Some answers are text strings and others are the passwords that we will need to complete our investi..

  Describe two important defensive steps or mechanisms

Identify any of the "measures that may be used for intrusion detection" (things/events that IDS look for) AND discuss how monitoring this measure might lead to a "false alarm" by your IDS.

  Describe the impact that each standards organization

The networking field, to include wireless networking, defines many standards to govern network and wireless network operations.

  Completed ip addressing table

XUMUC has the WAN links in place to the new locations in the Houston Region.  XUMUC currently has 2 other Regions San Francisco and Denver. Completed IP addressing table

  Basic concepts of circuit switching

What are the basic concepts of circuit switching? What are the advantages and disadvantages of circuit switching

  Main issues and problems in network traffic modeling

main issues and problems in network traffic modeling

  What is the maximum data rate on each of the networks

If all packets are 1 KB, what is the maximum data rate on each of the networks that can be tolerated without having the bridge lose packets?

  Determine both critical path and expected project duration

For each of the following network diagrams, determine both the critical path and the expected project duration. The numbers on the arrows represent expected activity times.

  How to use the encrypting file system

You will learn how to use the Encrypting File System in this activity. You will create a folder, copy a file to the folder, and then encrypt the folder's contents

  Determine the resource requirements for the network segments

Determine the resource requirements for the network segments, i.e. for each LAN or WLAN or VPN based on functional analysis and estimate the costs associated for the implementation; and develop an organisational WAN functional matrix.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd