Calculate the fragmentation offset for fragment

Assignment Help Computer Networking
Reference no: EM131984999

Question 1 - Routing

Given the following network diagram, assume that all the networks shown are aware of each other and have fully updated routing tables. Answer the questions that follow.

2367_figure.jpg

The questions:

1. From the point of view of router R4, what is the next-hop address for a packet addressed to host 161.22.0.15/18?

2. From the point of view of router R1, which of its interfaces would it choose for a packet being sent to network 161.22.0.0/18?

3. A host with an IP address of 200.11.60.36/24 has just sent a packet to a host with address 150.32.0.240/18. How many hops is required between source and destination?

4. A packet originating from network 220.10.40.0/24 arrives at router R1, however, R1 determines that the destination network is not in its routing table. What does R1 do with the packet?

5. A packet arrives at router R2 with a destination address of 140.21.0.10/22. Which interface port does R2 forward the packet out of?

6. A packet at router R3 has a destination address of 220.10.40.5/24. What next-hop address would R3 use for this packet?

7. A packet is waiting at router R4 for forwarding. If the next-hop was a "direct delivery", which of these three networksis the destination network? 150.3.0.0/16, or 150.32.0.0/18, or 220.10.40.0/24?

8. Complete the information in the routing table for router R2 as shown in the Answer Template for networks 150.3.0.0/16, 150.32.0.0/18, and the Default network. Show the masks in longest mask order using CIDR format.

Question 2 - Fragmentation in IPv4

An IPdatagram5,400 bytes long with no options arrives at a router, which determines that the next destination has an MTU of 1,500 bytes.Use the Answer Template to complete the following questions, showing your calculations and reasoning.

a) Assuming that the router decides to fragment the packet into 4 fragments, determinea correct size for each fragment, and identify the starting byte and ending byte of each fragment.

b) Calculate the fragmentation offset for each fragment.

c) State whether the total number of bytes from all 4 fragments leaving the router will be greater than the initial datagram size that arrived, or less than the initial datagram size, and the reason.

Question 3 - Congestion controls in TCP

This question affords you the opportunity to extend your thinking about congestion controls in TCP beyond the textbook to observe what a real-world technology company, Google, is doing in this space.

First, read this Network World article that reports on Google's approach to improving congestion controls in TCP: "How Google is speeding up the Internet"

You should also read the following more technical paper about it: "BBR Congestion Control - draft-cardwell-iccrg-bbr-congestion-control-00"

After reading both articles, answer the following questions:

1. Write a brief summary of the congestion controls currently available in TCP as covered in this Unit

2. Identify and explain two problems with current congestion controls in TCP that are pointed out in the articles

3. Summarize in your own words the difference(s) between the current TCP congestion controls and Google's new BBR protocol

4. The Network World article points out that it is difficult to get a new protocol accepted as a global standard for TCP/IP. Why do you think this is the case? Give carefully thought out reasons for your answer.

Important: for every direct quotation you use from these two sources or any other source, you must immediately, after the quote, provide your own explanation of the quotation (for example, explain why are you quoting it, how does it help answer the question, how does it support what you are saying?) - marks will be deducted for failure to do so. In addition, correct referencing conventions must be used throughout your work using the Harvard referencing convention. Your answers will be marked on clarity, logic, relevance, use of own words and fully addressing all parts of each question.

Remember that quotations alone will not be accepted as your explanation of the questions. Quotations can support your explanations, but you must still provide the explanations yourself. Best way forward is to keep direct quotations to a minimum, and use your own words.

Attachment:- Template.rar

Verified Expert

This assignment is related to the demonstration of knowledge of routing concepts. There are some questions which need to be answer. All the questions are related to the routing concepts. There are 3 main questions each with sub-questions and the requirements are stated for each one.

Reference no: EM131984999

Questions Cloud

Rising co2 and el nino impact on coral reef : Just like coral bleaching, rising CO2 level in the atmosphere creates risk for the coral reef in the ocean. Ocean is the second biggest reservoir of carbon
What are multiprogramming and multithreading : What are multiprogramming and multithreading? List Two advantages of user level threads (ULTs) over kernel level threads (KLTs).
Is technology creating a family divide : 1) Select one passage/quote from the article that summarizes the main point of the article. Is Technology Creating a Family Divide?
List and describe three methods to monitor windows server : List and describe three methods to monitor Windows Server 2012. Be sure to rank them by importance (to you) and briefly defend why you choose.
Calculate the fragmentation offset for fragment : Calculate the fragmentation offset for fragment - Write a brief summary of the congestion controls currently available in TCP as covered in this Unit
Implication of global warming on coral reef : Please let me know if there is any grammatical mistake or wrong sentence structure used in this researched paper.
List all of the fire accident classification classes : List all of the fire accident classification classes. Find at least three different fire extinguishers (do not touch them) and document their location.
List down the components of a data center : List down the components of a data center. What specifically did you learn in this process and how will this practice be applicable to your real world career?
Find the last occurrence of the word time : Find and delete the line with the word existentialism in it, delete the following line as well. Find the last occurrence of the word time.

Reviews

Write a Review

Computer Networking Questions & Answers

  Do you think cert should continue to post security holes

What are the pros and cons on both sides of this argument? Do you think CERT should continue to post security holes?

  Design a circuit with 3 inputs

Design a circuit with 3 inputs (x,y,z) representing the bits in a binary number, and three outputs (a,b,c) also representing bits in a binary number. When the input is 1,2,3, the binary output should be one less than the inpu

  Describe the operation of transport layer security

Presentation of the Report Power Point Voice Over - describe the operation of Transport Layer Security (TLS), VPNs and IPSec. With the possible options describe the benefits and limitations of the solutions and provide a recommendation for which se..

  Write a research paper about the threat modeling

Select any article or research paper that is related to Threat Modeling, and specifically references STRIDE.

  Analyzes the behavior of spam-oriented botnets

BotLab is a platform at the University of Washington that continually monitors and analyzes the behavior of spam-oriented botnets.

  Explain are lans a stable technology or changing

Are LANs a stable technology or are they changing just as rapidly as other forms of communication technologies? Should software licenses be dropped completely?

  Give hypothetical situation for signal type used in wan

Give a hypothetical situation for each signal type which illustrates how it could be, or is being, used in WAN. In what circumstance, for example, would a company choose to use a satellite signal?

  1 give an example to show that the group of permutations s5

1. give an example to show that the group of permutations s5 is not commutative.2. use ecb mode with block length 3 and

  Prepare assignment about impact of hacking

You need to prepare assignment about impact of hacking - Introduction Analysis Conclusion Refrence (harvard)

  Computer network power point slide

LLMD Co. has 5 locations across the country, with each location housing a division of the company. Each division houses several hundred users, totaling approximately 1,000 users.

  Explain privacy issues related with acxiom-s business

Break into small groups with classmates, and explain privacy issues related with Acxiom's business. Do you believe they are doinganything wrong?

  Suggest a method for consolidating core network services

Suggest a method for consolidating Core Network services. Provide a plan for integrating both AD forests eliminating duplication of service wherever possible.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd