What are the prefixes for the four subnets

Assignment Help Computer Networking
Reference no: EM131016679

Question:

1. A router has the following entries in its routing table:

Address/Mask                          Next hop

135.46.56.0/22                        Interface 0

135.46.60.0/22                        Interface 1

192.53.40.0/23                        Router 1

default                                   Router 2

For each of the following IP addresses, what does the router do if a packet with that address arrives?

(a) 135.46.63.10
(b) 135.46.57.14
(c) 135.46.52.2
(d) 192.53.40.7
(e) 192.53.41.7

2. Questions related to IP addressing:

(1) A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle?

(2) Suppose an ISP owns the block of addresses of the form 101.101.128.0/17. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets.

3. Questions related to IP fragmentation and reassembly:

(1) Consider IP datagram as illustrated in Figure 6 of RFC 791, except that the total length field is 1200. If this datagram were to traverse a local network that had a maximum transmission unit size of 500 bytes it would have to be fragmented. Assume it is fragmented into three smaller datagrams according to the algorithm presented Section 3.2 (see subsection titled ``An Example Fragmentation Procedure'') of RFC 791. With this technique, each fragment (except the last) is made the maximum allowable size. What are the values of the header length, total length, identification, flags, and fragment offset fields for all three fragment headers?

(2) Assume that the datagram fragments from the previous problem finally reach the destination host which has to reassemble them into a single datagram before passing them "up" to the TCP module. How does the IP module on the destination host know which fragments belong to the original IP datagram and how long it is (Hint: the "more fragments" bit plays a role in this)?

4. Consider the following network example. With the indicated link costs along each link in the figure, use Dijkstra's shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table.

11_Network.jpg

Answer: Let N' denote the set of nodes whose distance have been known so far, D(s) be the distance to a node s, and p(s) be the parent node of the node s on the shortest path from s to node x. We then construct the following table.

1307_Table.jpg

5. Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes.

1186_Network1.jpg

(a) Show the procedure of nodes X, Y and W computes their Distance Vector for network illustrated by Figure (a), i.e., link costs are C(xw)=1, C(xy)=4, and C(yw)=8.

Answer: In the following, each column shows the node X, Y and Z's table update respectively:

2059_Table1.jpg

(b) Assume that after the DV is computed by all nodes, the link cost of xy changed from 4 to 20. Show the procedure of nodes X, Y and W updates their Distance Vector for network illustrated by Figure (b), i.e., link costs are C(xw)=1, C(xy)=20, and C(yw)=8.

Answer: In the following, each column shows the node X, Y and Z's table update respectively:

1725_Table2.jpg

* If not enough, add more tables by yourself

6. We studied Dijkstra's link-state routing algorithm for computing the unicast paths that are individually the shortest paths from the source to all destinations. The union of these paths might be thought of as forming a shortest path tree. If each links has an associated cost and the cost of a tree is the sum of the link costs, then a spanning tree whose cost is the minimum of all of the spanning trees is called a minimum spanning tree. Both shortest path tree and minimum-spanning tree can be used for broadcast routing. By constructing a counterexample, show that the least-cost path tree is not always the same as a minimum spanning tree.

7. Consider the following network. ISP B provides national backbone service to regional ISP A. ISP C provides national backbone service to regional ISP D. Each ISP consists of one AS. B and C peer with each other in two places using BGP. Consider traffic going from A to D. B would prefer to hand that traffic over to C on the West Coast (so that C would have to absorb the cost of carrying the traffic cross-country), while C would prefer to get the traffic via its East Coast peering point with B (so that B would have carried the traffic across the country). What BGP mechanism might C use, so that B would hand over A-to-D traffic at its East Coast peering point? To answer this question, you will need to dig into the BGP specification.

1324_National backbone service.jpg

Verified Expert

The solution file contains 1500 words and answered 7 questions which included IP address,distance vector routing, Dijkstra algorithm, Minimum spanning tree, IP fragmentation, subnet mask.

Reference no: EM131016679

Questions Cloud

What are the merits of rate-of-return regulation : What are the merits of rate-of-return regulation, as it applies to natural monopolies?
Horatio needs money to purchase a house : What are Horatio's new payments for the remaining 27 years? Assume the interest rate remains the same as in Q1.
What is the required wind tunnel velocity : The lift and drag developed on a hydrofoil are to be determined through wind tunnel tests using standard air. If full scale tests are to be run, what is the required wind tunnel velocity corresponding to a hydrofoil velocity in seawater at 20 mph?..
Several years ago the pettijohn company : Several years ago the Pettijohn Company sold a $1,000 par value, non callable bond that now has 15 years to maturity and a 7.00% annual coupon that is paid semiannually. The bond currently sells for $925
What are the prefixes for the four subnets : Suppose an ISP owns the block of addresses of the form 101.101.128.0/17. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnet..
Find the npv of project : The Walker company has a 7-year project with cash flows of -$1,000 in year 0, $100 in year 1, $100 in year 2, $200 in years 3, 4, and 5, $0 in year 6, and $900 in year 7. All cash flows are year-end. Assume a cost of capital of 10%. Find the NPV ..
Determine the required volumetric flow rate : The volumetric flow rate over the spillway of a dam is 27,000 ft3/min. Determine the required volumetric flow rate for a 1/30 scale model that is operated in accordance with Froude number similarity.
Calculate the approximate dividend payout ratio : A Wall Street Journal quotation for a company has the following values: Div: $1.12, PE: 18.3, Close: $37.22. Calculate the approximate dividend payout ratio for the company.
What would your recommendations be to tom and mary : What alternatives do Tom and his family have to resolve their conflict?

Reviews

Write a Review

Computer Networking Questions & Answers

  Which interface is in the blocking mode

Which interface is in the blocking mode and What distinguishing characteristic of the switch interfaces indicates that this switch is the root of the spanning tree instance

  Describe a geosynchronous earth orbit

Describe a geosynchronous earth orbit. When should an 802.11a network be installed instead of an 802.11g network

  Established a wan connectivity between two office locations

You are the network engineer contracted to established a WAN connectivity between two office locations for a local corporation. The main corporate headquarters has 2,000 end stations and all server data

  External intrusion of the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

  Analyse data which involves analysing the traffic volume

To analyse the data (In traffic congestion) which involves analysing the traffic volume, travel time and speed, mapping areas of high congestion using Multiple ring buffer analysis.

  Demonstrate with a high degree of confidence that errors

The goal of testing is to demonstrate that the software satisfies its requirements and to demonstrate with a high degree of confidence that errors, which could lead to unacceptable failure condition, have been removed.

  Examine advantage of organization using cloud backup storage

Cloud backup storage is growing in popularity. Examine the advantages and disadvantages of an organization using cloud backup storage. Explain whether or not you would recommend using cloud backup storage.

  How recommendations at cfo site help efforts

How could the articles or recommendations at the CFO site help your efforts? Are these subjects where we should be looking to for future investments?

  Prepare a detailed network report with network topology

Thoroughly describe how your network design supports each of the requirements above to enable DeVry to take full advantage of the Cisco 4300 IP cameras

  Explaining security countermeasures against dos attacks

Suppose a future where security countermeasures against DoS attacks are much more widely implemented than at present.

  Telecommunications essentials

THE NEW ERA OF MICROWAVE: WIRELESS BROADBAND

  Connecting computers in a local area network

Assume you are asked to head a non computerized department and you need ten computers and would like to connect them to each other.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd