What is the maximum number of hosts it can handle

Assignment Help Computer Networking
Reference no: EM131016672

Question:

1. A router has the following entries in its routing table:

Address/Mask                          Next hop

135.46.56.0/22                        Interface 0

135.46.60.0/22                        Interface 1

192.53.40.0/23                        Router 1

default                                   Router 2

For each of the following IP addresses, what does the router do if a packet with that address arrives?

(a) 135.46.63.10
(b) 135.46.57.14
(c) 135.46.52.2
(d) 192.53.40.7
(e) 192.53.41.7

2. Questions related to IP addressing:

(1) A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle?

(2) Suppose an ISP owns the block of addresses of the form 101.101.128.0/17. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets.

3. Questions related to IP fragmentation and reassembly:

(1) Consider IP datagram as illustrated in Figure 6 of RFC 791, except that the total length field is 1200. If this datagram were to traverse a local network that had a maximum transmission unit size of 500 bytes it would have to be fragmented. Assume it is fragmented into three smaller datagrams according to the algorithm presented Section 3.2 (see subsection titled ``An Example Fragmentation Procedure'') of RFC 791. With this technique, each fragment (except the last) is made the maximum allowable size. What are the values of the header length, total length, identification, flags, and fragment offset fields for all three fragment headers?

(2) Assume that the datagram fragments from the previous problem finally reach the destination host which has to reassemble them into a single datagram before passing them "up" to the TCP module. How does the IP module on the destination host know which fragments belong to the original IP datagram and how long it is (Hint: the "more fragments" bit plays a role in this)?

4. Consider the following network example. With the indicated link costs along each link in the figure, use Dijkstra's shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table.

11_Network.jpg

Answer: Let N' denote the set of nodes whose distance have been known so far, D(s) be the distance to a node s, and p(s) be the parent node of the node s on the shortest path from s to node x. We then construct the following table.

1307_Table.jpg

5. Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes.

1186_Network1.jpg

(a) Show the procedure of nodes X, Y and W computes their Distance Vector for network illustrated by Figure (a), i.e., link costs are C(xw)=1, C(xy)=4, and C(yw)=8.

Answer: In the following, each column shows the node X, Y and Z's table update respectively:

2059_Table1.jpg

(b) Assume that after the DV is computed by all nodes, the link cost of xy changed from 4 to 20. Show the procedure of nodes X, Y and W updates their Distance Vector for network illustrated by Figure (b), i.e., link costs are C(xw)=1, C(xy)=20, and C(yw)=8.

Answer: In the following, each column shows the node X, Y and Z's table update respectively:

1725_Table2.jpg

* If not enough, add more tables by yourself

6. We studied Dijkstra's link-state routing algorithm for computing the unicast paths that are individually the shortest paths from the source to all destinations. The union of these paths might be thought of as forming a shortest path tree. If each links has an associated cost and the cost of a tree is the sum of the link costs, then a spanning tree whose cost is the minimum of all of the spanning trees is called a minimum spanning tree. Both shortest path tree and minimum-spanning tree can be used for broadcast routing. By constructing a counterexample, show that the least-cost path tree is not always the same as a minimum spanning tree.

7. Consider the following network. ISP B provides national backbone service to regional ISP A. ISP C provides national backbone service to regional ISP D. Each ISP consists of one AS. B and C peer with each other in two places using BGP. Consider traffic going from A to D. B would prefer to hand that traffic over to C on the West Coast (so that C would have to absorb the cost of carrying the traffic cross-country), while C would prefer to get the traffic via its East Coast peering point with B (so that B would have carried the traffic across the country). What BGP mechanism might C use, so that B would hand over A-to-D traffic at its East Coast peering point? To answer this question, you will need to dig into the BGP specification.

1324_National backbone service.jpg

Reference no: EM131016672

Questions Cloud

Calculate the approximate dividend payout ratio : A Wall Street Journal quotation for a company has the following values: Div: $1.12, PE: 18.3, Close: $37.22. Calculate the approximate dividend payout ratio for the company.
What would your recommendations be to tom and mary : What alternatives do Tom and his family have to resolve their conflict?
How much money will be in the account immediately : If Jughead takes each payment and deposits it into an investment that earns a return of 0.75% per month, how much money will be in the account immediately after the last payment?
What is the present value of the net tax-shield : Q.1 What is the present value of the net tax-shield of debt if the current market value of the firm is $10 million, its value if unlevered would be $8 million, and the present value of bankruptcy and agency costs is $500,000?
What is the maximum number of hosts it can handle : A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle - What are the values of the header length, total length, identification, flags, and fragment offset fields for all three fragment header..
Highlights the strategic fit across : A Value Chain Analysis that highlights the strategic fit across Walt Disney's portfolio and, value chain match-ups and opportunities for skills transfer, cost sharing, or brand sharing.
What prototype velocity corresponds to a model velocity : The design of a river model is to be based on Froude number similarity, where the Froude number, Fr = V/(gy)1/2 is a function of the water velocity, V, the water depth, y, and the acceleration of gravity, g. If the river depth is 3 m and the m..
Explain how health insurance mandates : Explain how health insurance mandates may result in inefficiencies and inequities.
Assess the ultimate goal of regional economic integration : Decide what methods home countries use to promote and restrict Foreign Direct Investment (FDI).

Reviews

Write a Review

Computer Networking Questions & Answers

  The actual web host name

The actual web host name to which www.polito.it resolved was? What destination organization is the owner of record of www.polito.it

  Fundamental application architectures in use today

Do some research in the DeVry Virtual Library (Under Course Home in the Student Resources section). Based on your research,

  What is the maximum data rate on each of the networks

If all packets are 1 KB, what is the maximum data rate on each of the networks that can be tolerated without having the bridge lose packets?

  Explain what using a cloud vendor

Many small businesses operate with local servers running in broom closets or the like. Explain what using a cloud vendor that is compliant with these standards and statements means to such companies

  Explain four periodic events for real-time system

Assume that four events need 35,20,10, and x me=sec of CPU time, respectively. Dtermine the largest value of x for which system is schedulable?

  Knowledge and understanding of computer networks

Write a report that investigates network cabling options available in your country for the network you have designed. Your report should provide recommendations for the cabling and connectors to purchase.

  What disadvantage your new topology have compare to original

Propose a slight change in the topology that makes a large difference in the performance (the IBM RP3 and BBN Butterfly use this modified topology). What disadvantage does your new topology have compared to the original?

  Design type of lan-windows server network operating system

It has already decided to use the Windows Server 2003 network operating system. What type of LAN will your team design for this company?

  Setting up the new network

How could you interconnect the two areas? Assuring that the network has immunity from the interference; re-evaluate your choice explaining the best medium(s) to utilize.

  Differences between a cpe versus the hosted version of ipt

Given the migration to IPT, what are some of the differences between a CPE (IP-PBX) versus the hosted version of IPT

  Two of the characteristics of an ethernet 802.3 network

Two of the characteristics of an Ethernet 802.3 network are a shared bus and CSMA/CD. Explain in detail how a switch interacts with those characteristics.

  Write three tcp and udp connections from netstat

Write three TCP and three UDP connections from netstat -a output, and corresponding translated port numbers from netstat -an output.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd