Analyse and describe how a router performs

Assignment Help Computer Networking
Reference no: EM131428265

Question 1

(a) The primary function of a router is to determine the best path to use for sending packets. To determine the best path, the router searches its routing table for a network address that matches the destination IP address of the packet. Explain how the router processes an incoming packet using the routing table to determine the best path to forward the packet.

(b)

2318_Figure.jpg

Figure - 1(b)

i. Identify the type of route used between the routers R1 and R2 that facilitates the router R2 to reach the four networks shown in Figure - 1(b).

ii. Explain how you will configure the routing between the routers R1 and R2.

iii. Justify your selection by discussing its advantages.

(c) As a network administrator, explain the specific circumstances where you would use a static default route for packet routing.

Question 2

(a) Discuss any FOUR (4) reasons for an occurrence of routing loop and its implications on a network operation.

(b) Using Bellman Ford algorithm, construct a topology database of the network for router - A as shown in Figure - 2(b) and include the entries that are selected for routing table.

2443_Figure1.jpg

Figure - 2(b)

(c) One of the weaknesses of the Bellman Ford algorithm is that it does not have the capability to detect and eliminate routing loops.
i. With the aid of a diagram, explain how routing loops occur in Routing Information Protocol (RIP) enabled networks.

ii. Propose any TWO (2) methods which can be used to prevent the routing loops in the above said networks.

Question 3

(a) With the aid of a block diagram, analyse and describe how a router performs a hierarchical route lookup process when it receives an IP packet and decide which route in the routing table is the best match.

(b) Enhanced Interior Gateway Routing Protocol (EIGRP) has fast convergence time even though it is classified as Distance Vector Protocol. Explain the features of the EIGRP that reduces the time taken for convergence.

(c)

HQ# show ip route
<output omitted>

10.0.0.0/30 is subnetted, 1 subnets

C 10.10.10.252 is directly connected, Serial0/0/0

172.16.0.0/30 is subnetted, 1 subnets

C 172.16.100.0 is directly connected, Serial0/0/1

R 192.168.1.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.2.0/24 [120/16] via 10.10.10.254, 00:00:03,

Serial0/0/0 R 192.168.3.0/24 [120/1] via 10.10.10.254, 00:00:03,

Serial0/0/0 R 192.168.7.0/24 [120/1] via 172.16.100.2, 00:00:04, Serial0/0/1

Figure - 3(c)

Analyze the output shown in the Figure - 3(c).

i. Explain why the network 192.168.2.0/24 is not reachable from the HQ router.

ii. Explain how the HQ router was informed by Routing Information Protocol (RIP) that the 192.168.2.0/24 is not reachable.

Question 4

(a)

2216_Figure2.jpg

Figure - 4(a)

Calculate the best path to the network 10.0.0.0 from router-A in Figure - 4(a) using the Edsger Dijkstra's Shortest Path First (SPF) algorithm.

(b)

2449_Figure3.jpg

Figure - 4(b)

When designing Open Shortest Path First (OSPF) networks, all areas should be connected to the backbone area. However, due to topography constraint in Figure - 4(b) the Area-2 is connected with the Area-1. You are assigned to solve this problem.

i. Propose a solution to establish the connectivity for the Area-2.

ii. With the aid of diagram, explain your proposed solution.

iii. Provide the configuration of your proposed solution

(c)

Router# show ip eigrp topology

IP-EIGRP Topology Table for AS 1

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status

<output omitted>

P 10.10.12.0/24, 1 successors, FD is 5514496

via 172.16.1.38 (5514496/28160), Serial0/1/0 via 172.16.1.42 (7693056/6172416), Serial0/1/1

<output omitted>

P 10.10.14.128/25, 1 successors, FD is 6026496

via 172.16.1.38 (6026496/2172416), Serial0/1/0 via 172.16.1.42 (7181056/28160), Serial0/1/1

<output omitted>

Figure - 4(c)

Analyze the output shown in the above Figure - 4(c)

i. Explain how the Diffusing Update Algorithm algorithm chooses the best path to the network 10.10.12.0/24 and 10.10.14.128/25.

ii. If the chosen path is suddenly down, explain what will happen.

Question 5

(a) The Figure - 5(a) shows the output for the "ip ospf neighbour" command.

Router#sh ip ospf neighbor .

Neighbor

ID

Pri State

Dead Time

Address

Interface

192.168.1.4

1

FULL/DR

00:00:38

192.168.1.4

FastEthernet0/0

192.168.1.2

1

FULL/DROTHER

00:00:31

192.168.1.2

FastEthernet0/0

192.168.1.1

1

FULL/DROTHER

00:00:32

192.168.1.1

FastEthernet0/0

Figure - 5(a)

i. Analyse the above adjacency table and draw the topology diagram with details.

ii. Evaluate the design implications of the topology you analysed in part (a).i.

(b) Analyse the output of the "show running-config" command shown in Figure - 5(b) and explain the characteristics of a protocol used to establish the communication between networks 192.168.1.0 and 192.168.2.0.

Router# show running-config

Interface

Subinterface

Gateway IP Address/Mask

VLAN

ID

Router Encapsulation

Fa0/0

fa0/0.10

192.168.1.1/24

10

 

dot1q 10

Fa0/0

fa0/0.20

192.168.2.1/24

20

 

dot1q 20

(c) Compare and contrast OSPFv2 and OSPFv3

Question 6

(a)

821_Figure4.jpg

Figure - 6(a)

Figure - 6(a) shows two different scenarios for connecting Autonomous Systems (AS) using the Border Gateway Protocol (BGP). Explain how BGP path attributes are used to respectively set the preferred route as: AC from AS 100 to 200 and BD from AS 300 to AS 500.

(b) With the aid of a diagram, explain how the Internet Assigned Numbers Authority manages an IPv6 Global Unicast Address allocation to an organization.

(c) Discuss TWO (2) filter types that you can apply to the BGP update messages that your router exchanges with a particular BGP peer.

Reference no: EM131428265

Questions Cloud

Do you think tesla ceo elon musk did the right thing : Start reviewing and responding to the postings of your classmates as early in the week as possible. Respond to at least two of your classmates. Participate in the discussion by asking a question, providing a statement of clarification, providing a..
What are some of the obstacles that you might face : Imagine that you are a job recruiter for a national cable/internet company. How would you go about recruiting these potential reps and what are some of the obstacles that you might face
Research on program effectiveness reviewed : Research on program effectiveness reviewed and rated by expert reviewers. Easily understandable ratings based on the evidence that indicates whether a program achieves its goals
What types of techniques do leaders use to influence team : To support your work and demonstrate achievement of learning outcomes, be sure to incorporate the key relevant material from your reading as well as outside academically credible resources. All sources should be credited using APA which includes b..
Analyse and describe how a router performs : Discuss any FOUR reasons for an occurrence of routing loop and its implications on a network operation - Explain why the network 192.168.2.0/24 is not reachable from the HQ router - Calculate the best path to the network 10.0.0.0 from router-A in Fig..
What role conflicts forensic psychology professionals face : Using the module's readings and the Argosy University online library resources, respond to the following question: What role conflicts do forensic psychology professionals face while providing treatment in penal institutions
Describe the varieties of religious experience and practice : Choose ONE (1) category (origin of all things, nature of god, view of human nature, view of good and evil, etc.) from the chart to focus on for this assignment. Consider how the selected category relates to all of the religions covered and to your..
Briefly describe the essential features of the rnr model : Based on your research, respond to the following: Briefly describe the essential features of the RNR model and the GLM and analyze their strengths. Provide an opinion about whether both models are equally effective in enhancing community safety
Determine the service-related variance for patient days : Budgeting is an important activity within every healthcare organization. The particular challenges encountered, however, can vary depending on the type of organization. A state or federally funded organization, for example, will likely have a budg..

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the primary principle of device failure protection

What are the most common security threats? What are the most critical? Why?- Explain the primary principle of device failure protection.

  What are two advantages of using nat

ICTNWK506: Topic learning guide: NAT What are two advantages of using NAT? Security - hides private addresses; address conservation - private addresses need only be unique across the corporate network, not the Internet as a whole

  What is important to understand is that the speed and

it is almost time to go away for the holiday but before you begin your vacation the cio has asked that you attend a

  Describe what happens in getting this request message

Describe what happens in getting this request message to the server and how the server gets the response message back to the client.

  Selecting the network

She has bids from several companies in order to install (1) Wi-Fi, or (2) a switched Ethernet 100 Base T network. She wishes you to provide her some sense of relative performance of the alternatives so that it may be related to the costs of each o..

  Describe how aseptic technique is used by a surgical

1. what is aseptic technique and surgical conscience?2. how to open sterile suppliesa. peel pouchb.wrapped items3.ways

  Discuss the possibility of setting up a wireless network

Imagine you are a wireless network contractor and you are meeting with a potential client over lunch to discuss the possibility of setting up a wireless network in the client's building.

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  Explain physical locations distributed across county

Corporation is expanding from single physical location to three physical locations distributed across county to better serve the requirements of their customers.

  Briefly describing snmp

Write a two-and-a-half-page report briefly describing SNMP and its commands and describing MIB-1/MIB-2, including the hierarchical tree, object identifier (OID), groups, and object types

  What is the role of dns and how is it structured

What is the role of DNS, how is it structured, and why it is necessary? What are the different kinds of DNS servers and their purpose across a WAN or the Internet

  Demonstrate with a high degree of confidence that errors

The goal of testing is to demonstrate that the software satisfies its requirements and to demonstrate with a high degree of confidence that errors, which could lead to unacceptable failure condition, have been removed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd