Implement a link-state routing protocol

Assignment Help Computer Networking
Reference no: EM131428319

Question 1

(a) Routing Information Protocol (RIP) uses User Datagram Protocol (UDP) in the transport layer and it is considered as a connectionless and unreliable protocol. In this situation, how does RIP ensure the reliability and consistency of the routing updates between routers?

(b)

2479_Figure1.jpg

Figure 1(b)

The HQ and the Branch of ABC Corporation are connected through a private WAN (cloud) using leased line as well as via the Internet for backup as shown in Figure 1(b).

i. Identify the type of routing used between the routers and the Branch that facilitates high availability and also prevents layer-3 looping.

ii. Justify your proposed solution and explain its working principle.

iii. Explain the disadvantage of your proposed solution if any.

Question 2

(a) You have been assigned to manage an enterprise network and you found that the network performance is poor due to the faulty switch (Cisco) in the switching rack and it is replaced with new one (Juniper) as shown in Figure - 2(a). The existing switches were configured with Inter Switch Protocol.

488_Figure2.jpg

Figure 2(a)

There are six VLANs in this switching rack and all VLANs should be able to communicate with each other.

i. Propose an appropriate solution to establish the full connectivity of the network.

ii. Discuss a solution to resolve the problems you identified in part i., explaining fully your solution.

(b)

1069_Figure3.jpg

Figure 2(b)

All routers shown in Figure 2(b) are enabled with Open Shortest Path First (OSPF) with default settings. Router-A learns the network 10.0.0.0 via routers B, C and D.

i. Analyze and explain the operational problems involved in building a topology table to establish a route from router-A to the network 10.0.0.0.

ii. Propose your solution to solve the problems and explain the result of your proposed solution.

(c) As a network administrator, evaluate the situations in which you would choose to use the distance vector routing protocols.

SECTION B

Answer ANY TWO (2) of the THREE (3) questions in this section. All questions carry equal marks.

Question 3

(a) Your organization has decided to upgrade the network and also implement a link-state routing protocol and you are assigned to carry out this task. As a network administrator, evaluate the requirements of routing devices that are important to implement the link state protocol.

(b) Using the Bellman Ford algorithm, construct the routing table for router B in Figure 3(b)".

2077_Figure4.jpg

Figure 3(b) Use Table-3(b) to create the routing table.

Network Exit interface Next Hop Address Hop Count Administrative Distance

Table-3(b)

Network

Exit interface

Next Hop Address

Hop Count

Administrative Distance

(c)

2277_Figure5.jpg

Figure - 3(c)

A default static route is configured on the core router that provides access to the Internet. Within the organization, Open Shortest Path First (OSPF) is used for routing with private IP addressing. Choose and explain an appropriate routing technique that provides the complete Internet connectivity.

(d)

SW1#show interfaces fastEthernet 0/1 switchport

Switchport: Enabled

Administrative Mode: trunk Operational Mode: trunk

Operational Trunking Encapsulation: dot1q Negotiation of Trunking: On

Access Mode VLAN: 99

Trunking Native Mode VLAN: 1 (default)

Trunking VLANs Enabled: ALL Pruning VLANs Enabled: 2-1001 Capture Mode Disabled

Capture VLANs Allowed: all Protected: false

Appliance trust: none

SW2#show interfaces fastEthernet 0/1 switchport

Switchport: Enabled

Administrative Mode: access Operational Mode: trunk

Operational Trunking Encapsulation: dot1q Negotiation of Trunking: On

Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Trunking VLANs Enabled: ALL

Pruning VLANs Enabled: 2-1001 Capture Mode Disabled

Capture VLANs Allowed: all Protected: false

Appliance trust: none

Figure- 3(d)

Figure - 3(d) shows the partial output of trunk link configuration between layer-2 switches SW1 and SW2. However, a trunk is still not established across the configured link. Identify any TWO (2) problems in the above configurations and provide solution(s).

Question 4

(a)

755_Figure6.jpg

Figure - 5(a)

Identify the type of routers A, B and C shown in Figure - 4(a) and explain their roles in routing.

(b)

1858_Figure7.jpg

Figure - 5(b)

When designing OSPF networks, all areas should be connected to the backbone area. However, due to topography constraint in ABC Corporation, it is possible to connect the area-2 with the area-1. You are assigned to solve this problem.

i. Propose a solution to establish the connectivity for the area-2.

ii. With the aid of diagram, explain your proposed solution.

iii. Provide the configuration of your proposed solution

(c)

475_Figure8.jpg

Figure - 4 (c)

An online trading company has dual connections to local ISP for 24/7 connectivity. A main link between HQ and A is 1.544 Mbps and a backup link between HQ and B is 512 Kbps. You are assigned to provide the routing as per the user's requirements. Assess this situation and provide a routing solution with justification.

Question 5

(a)

1586_Figure9.jpg

Figure - 5(a)

You have been assigned to configure the Gateway router to establish the connectivity to all the subnets as shown in Figure 5(a).

i. Propose the most efficient and economical solution that does not gives router overhead.

ii. Explain your proposed solution.

(b) By default, OSPF routers exchange Link State Advertisements (LSAs) by flooding them to all OSPF neighbors and this action affects the performance of the Broadcast and Non- Broadcast Multiple Access topology shown in Figure 5(b). Explain how OSPF addresses this LSA flooding problem to enhance network performance.

1237_Figure10.jpg

Figure - 5(b)

(c) A Teredo client has the address 2001::62C3:1B8D:346B:EBC9:7C94:EA26. With reference to this IPv6 address, answer the following questions.

i. What is the external IPv4 address?
ii. What is the UDP port number for this Teredo client's traffic?

Reference no: EM131428319

Questions Cloud

What cultural values shape your beliefs : What cultural values shape your beliefs? How would you know whether you have stepped outside a cultural norm with regard to the social clock? Does a specific developmental theory support your personal views of healthy development for a young adult..
What is your monthly payment for loan a : You are buying your first home and need to get a loan for $200,000. Compare these two options: Loan A: a 30-year loan with APR of 4.2% Loan B: a 20-year loan with an APR of 3.9% (a) What is your monthly payment for Loan A?
Analyze the level of violence in the chosen children show : For this assignment, you need to watch an hour of children's television, preferably cartoons, and analyze the level of violence in the chosen children's show
Exponential and logarithmic functions : You have just come into a large sum of money! You make the wise decision to invest the money to use at a later date. Use the exponential equation to find the total amount in the investment account after a certain number of years.
Implement a link-state routing protocol : CIS3202 ROUTING PROTOCOLS AND CONCEPTS What is the external IPv4 address and what is the UDP port number for this Teredo client's traffic - Propose the most efficient and economical solution that does not gives router overhead and Explain your propo..
Compute their federal income tax : John and heather are married, filing jointly, and had a taxable income of $105.500 and a tax credit of $ 1,000 in 2013. Using the 2013 Marginal Tax Rate Table from your textbook, compute their federal income tax. (Round to the nearest whol..
What are some problems you see with enmeshment in families : The family systems perspective is unique and relevant to how families function.  One of the maladaptive consequences of a strong bond between family members is known as enmeshed boundaries. What are some problems you see with enmeshment in families
Probability that he gets four or fewer questions correct : A multiple choice test consists of six questions, each of which has five choices. Each question has exactly one correct answer. William guesses randomly at each answer. What is the probability that he gets four or fewer questions correct? (Round yo..
How you would respond to the scenario : A client comes to your office without an appointment. Write a 700- to 1,050-word APA formatted paper that includes a transcript of how you would respond to the scenario

Reviews

Write a Review

Computer Networking Questions & Answers

  For the given data below what should the product

for the given data below what should the product specification be set at if the company would like to have cp 1.4 ?

  A client-server environment

You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would y..

  Network management system on acurrently-dated vendor website

Write a two-and-a-half-page paper explaining network management system identified on acurrently-dated vendor website (Cisco, HP, Sun, SolarWinds, CA, Network General, IBM, etc.).

  How does use of the cloud affect the local environment

How does use of the cloud affect the local environment? What are some of the issues identified by the Pluralsight module?

  List all the five nonproprietary internet applications and

q1. list five nonproprietary internet applications and the application-layer protocols that they use.q2. what

  Requires interface and the provides interface in your design

nclude both the Requires interface and the Provides interface in your design. Develop a visual rendering depicting your design through the use of Microsoft Visio or its open source alternative, Dia

  Network protocol exchange well-defined messages

Create a list of messages that you think would be necessary during server-client and client-client interactions. Do not rely on the implicit acknowledgement of Transmission Control Protocol (TCP) but provide a mechanism for an explicit acknowledgm..

  Describe the differences in physical layer and data-link

question 1 describe what a teleworker or telecommuter is as it relates to a working environment. also how does a

  Evolution of the telecommunications industry

The World Wide Web the best know example of a WAN that's why once a WAN is in place, WAN security must be implemented. Some methods for securing WANs include firewalls, routers with access control lists, and intrusion detection systems

  Ethernet networking technology

Based on the article by Semeilogy et al. (2007), why have some researchers recommended redesigning the Ethernet networking technology from the ground up

  Investigate capabilities and costs of an encryption package

Investigate the capabilities and costs of an intrusion prevention system.- Investigate the capabilities and costs of an encryption package.

  Developing channels of communication and collaboration

Developing Channels of Communication and Collaboration

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd