Analyse and describe how a router performs

Assignment Help Computer Networking
Reference no: EM131428265

Question 1

(a) The primary function of a router is to determine the best path to use for sending packets. To determine the best path, the router searches its routing table for a network address that matches the destination IP address of the packet. Explain how the router processes an incoming packet using the routing table to determine the best path to forward the packet.

(b)

2318_Figure.jpg

Figure - 1(b)

i. Identify the type of route used between the routers R1 and R2 that facilitates the router R2 to reach the four networks shown in Figure - 1(b).

ii. Explain how you will configure the routing between the routers R1 and R2.

iii. Justify your selection by discussing its advantages.

(c) As a network administrator, explain the specific circumstances where you would use a static default route for packet routing.

Question 2

(a) Discuss any FOUR (4) reasons for an occurrence of routing loop and its implications on a network operation.

(b) Using Bellman Ford algorithm, construct a topology database of the network for router - A as shown in Figure - 2(b) and include the entries that are selected for routing table.

2443_Figure1.jpg

Figure - 2(b)

(c) One of the weaknesses of the Bellman Ford algorithm is that it does not have the capability to detect and eliminate routing loops.
i. With the aid of a diagram, explain how routing loops occur in Routing Information Protocol (RIP) enabled networks.

ii. Propose any TWO (2) methods which can be used to prevent the routing loops in the above said networks.

Question 3

(a) With the aid of a block diagram, analyse and describe how a router performs a hierarchical route lookup process when it receives an IP packet and decide which route in the routing table is the best match.

(b) Enhanced Interior Gateway Routing Protocol (EIGRP) has fast convergence time even though it is classified as Distance Vector Protocol. Explain the features of the EIGRP that reduces the time taken for convergence.

(c)

HQ# show ip route
<output omitted>

10.0.0.0/30 is subnetted, 1 subnets

C 10.10.10.252 is directly connected, Serial0/0/0

172.16.0.0/30 is subnetted, 1 subnets

C 172.16.100.0 is directly connected, Serial0/0/1

R 192.168.1.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.2.0/24 [120/16] via 10.10.10.254, 00:00:03,

Serial0/0/0 R 192.168.3.0/24 [120/1] via 10.10.10.254, 00:00:03,

Serial0/0/0 R 192.168.7.0/24 [120/1] via 172.16.100.2, 00:00:04, Serial0/0/1

Figure - 3(c)

Analyze the output shown in the Figure - 3(c).

i. Explain why the network 192.168.2.0/24 is not reachable from the HQ router.

ii. Explain how the HQ router was informed by Routing Information Protocol (RIP) that the 192.168.2.0/24 is not reachable.

Question 4

(a)

2216_Figure2.jpg

Figure - 4(a)

Calculate the best path to the network 10.0.0.0 from router-A in Figure - 4(a) using the Edsger Dijkstra's Shortest Path First (SPF) algorithm.

(b)

2449_Figure3.jpg

Figure - 4(b)

When designing Open Shortest Path First (OSPF) networks, all areas should be connected to the backbone area. However, due to topography constraint in Figure - 4(b) the Area-2 is connected with the Area-1. You are assigned to solve this problem.

i. Propose a solution to establish the connectivity for the Area-2.

ii. With the aid of diagram, explain your proposed solution.

iii. Provide the configuration of your proposed solution

(c)

Router# show ip eigrp topology

IP-EIGRP Topology Table for AS 1

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status

<output omitted>

P 10.10.12.0/24, 1 successors, FD is 5514496

via 172.16.1.38 (5514496/28160), Serial0/1/0 via 172.16.1.42 (7693056/6172416), Serial0/1/1

<output omitted>

P 10.10.14.128/25, 1 successors, FD is 6026496

via 172.16.1.38 (6026496/2172416), Serial0/1/0 via 172.16.1.42 (7181056/28160), Serial0/1/1

<output omitted>

Figure - 4(c)

Analyze the output shown in the above Figure - 4(c)

i. Explain how the Diffusing Update Algorithm algorithm chooses the best path to the network 10.10.12.0/24 and 10.10.14.128/25.

ii. If the chosen path is suddenly down, explain what will happen.

Question 5

(a) The Figure - 5(a) shows the output for the "ip ospf neighbour" command.

Router#sh ip ospf neighbor .

Neighbor

ID

Pri State

Dead Time

Address

Interface

192.168.1.4

1

FULL/DR

00:00:38

192.168.1.4

FastEthernet0/0

192.168.1.2

1

FULL/DROTHER

00:00:31

192.168.1.2

FastEthernet0/0

192.168.1.1

1

FULL/DROTHER

00:00:32

192.168.1.1

FastEthernet0/0

Figure - 5(a)

i. Analyse the above adjacency table and draw the topology diagram with details.

ii. Evaluate the design implications of the topology you analysed in part (a).i.

(b) Analyse the output of the "show running-config" command shown in Figure - 5(b) and explain the characteristics of a protocol used to establish the communication between networks 192.168.1.0 and 192.168.2.0.

Router# show running-config

Interface

Subinterface

Gateway IP Address/Mask

VLAN

ID

Router Encapsulation

Fa0/0

fa0/0.10

192.168.1.1/24

10

 

dot1q 10

Fa0/0

fa0/0.20

192.168.2.1/24

20

 

dot1q 20

(c) Compare and contrast OSPFv2 and OSPFv3

Question 6

(a)

821_Figure4.jpg

Figure - 6(a)

Figure - 6(a) shows two different scenarios for connecting Autonomous Systems (AS) using the Border Gateway Protocol (BGP). Explain how BGP path attributes are used to respectively set the preferred route as: AC from AS 100 to 200 and BD from AS 300 to AS 500.

(b) With the aid of a diagram, explain how the Internet Assigned Numbers Authority manages an IPv6 Global Unicast Address allocation to an organization.

(c) Discuss TWO (2) filter types that you can apply to the BGP update messages that your router exchanges with a particular BGP peer.

Reference no: EM131428265

Questions Cloud

Do you think tesla ceo elon musk did the right thing : Start reviewing and responding to the postings of your classmates as early in the week as possible. Respond to at least two of your classmates. Participate in the discussion by asking a question, providing a statement of clarification, providing a..
What are some of the obstacles that you might face : Imagine that you are a job recruiter for a national cable/internet company. How would you go about recruiting these potential reps and what are some of the obstacles that you might face
Research on program effectiveness reviewed : Research on program effectiveness reviewed and rated by expert reviewers. Easily understandable ratings based on the evidence that indicates whether a program achieves its goals
What types of techniques do leaders use to influence team : To support your work and demonstrate achievement of learning outcomes, be sure to incorporate the key relevant material from your reading as well as outside academically credible resources. All sources should be credited using APA which includes b..
Analyse and describe how a router performs : Discuss any FOUR reasons for an occurrence of routing loop and its implications on a network operation - Explain why the network 192.168.2.0/24 is not reachable from the HQ router - Calculate the best path to the network 10.0.0.0 from router-A in Fig..
What role conflicts forensic psychology professionals face : Using the module's readings and the Argosy University online library resources, respond to the following question: What role conflicts do forensic psychology professionals face while providing treatment in penal institutions
Describe the varieties of religious experience and practice : Choose ONE (1) category (origin of all things, nature of god, view of human nature, view of good and evil, etc.) from the chart to focus on for this assignment. Consider how the selected category relates to all of the religions covered and to your..
Briefly describe the essential features of the rnr model : Based on your research, respond to the following: Briefly describe the essential features of the RNR model and the GLM and analyze their strengths. Provide an opinion about whether both models are equally effective in enhancing community safety
Determine the service-related variance for patient days : Budgeting is an important activity within every healthcare organization. The particular challenges encountered, however, can vary depending on the type of organization. A state or federally funded organization, for example, will likely have a budg..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd