Network topology and design, Computer Networking

Question 1:

The following is a dump of a TCP header in hexadecimal format:

00CD0018 00000EF1 00000D5D 502200D1 01BF0010

Please answer the following two parts of questions:

Part I

1.1 What is the source port number?

1.2 What is the destination port number?

1.3 What is the sequence number?

1.4 What is the acknowledgment number?

1.5 What is the length of the header?

1.6 Which control bits are set and what do they represent?

1.7 What is the window size?

Part II

1.8 What does the last four digits '0010' of the above dump represent? What action will the destination node take when it receives this packet?

Question 2:

Based on the output from the "show cdp neighbours" command please draw the topology.

Show connections between devices and label the interfaces.

Question 3:

An organization is assigned the network number 172.17.0.0/16, and it must create a set of subnets that supports variable amount of hosts on each subnet. The topology is shown as following figure.

Please use VLSM to design and answer the following questions:

3.1 Define subnet masks (or extended prefix length) for the LANs in this organization

3.2 Write the usable IP range for each Subnet.

3.3 Write explicitly IP address of the host number 68 on the LAN5 explicitly in binary and decimal notation.

3.4 What is the broadcast address for the LAN4?

3.5 Setup and configure the network you designed above using the Packet Tracer router simulator.

a) with RIP v1

b) with RIPv2

Show the routing table for Router 1 after the network is fully converged. Your table should include the route, routing protocol route learned from/or directly connected interface, next hop router address, and metric (bandwidth measured in kbps for metric if appropriate) that are used.

c) Explain why there is no successful connectivity between different subnets when using

RIPv1

3.6 By using RIPv2 protocol, set up one PC in LAN1 and another PC in LAN6. Test the connectivity between them. Based on your observation please give an explanation of the ping process from PC in LAN1 to PC in LAN6 and the routing table lookup progress on R1.

Posted Date: 3/9/2013 5:01:38 AM | Location : United States







Related Discussions:- Network topology and design, Assignment Help, Ask Question on Network topology and design, Get Answer, Expert's Help, Network topology and design Discussions

Write discussion on Network topology and design
Your posts are moderated
Related Questions
A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s


Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Routing Table A routing  table has columns  for at  three types o information  the network  ID  the cost  and the  ID of the  next  router. The  network  ID is the final  desti

Q. OSI Network Layer Addressing ISO/IEC and CCITT mutually administer the global network addressing domain. The primary hierarchical decomposition of the address is defined

Question: (a) In relation with a cellular network architecture, describe the following terms: (i) Clusters (ii) Pico cells (iii) Nano cells (iii) Cell breathing (b)

Post Office  Protocols Version In computing  the post office protocol  version 3 (POP3) is an  application layer internet standard  protocols  used by  local e mail  clients

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o