Compare and contrast distance vector routing protocols

Assignment Help Computer Networking
Reference no: EM132204194

Tasks:

Task 1:

Submit a work proposal for this assignment on or before 28th November, 2018, which must include:

• Understanding of deliverables - a detail description of deliverables
• General overview of proposed plan - initial understanding of solution to all the tasks
• Resources identified

Task 2:

Write a detailed report on ACL (Access Control List) and STP (Spanning Tree Protocol). The report should have literature review about the different types of access control lists and STP (Spanning Tree Protocol) from various published sources.

Task 3:

As a computer network professional, you have to prepare a report on the following:

a) Evaluate IPV6 editions of the routing protocols RIPNG, OSPFv3, and EIGRP based on the following:
i. Scalability
ii. Routing Overhead
iii. Network Convergence
b) Types of VLAN memberships

Learning Outcomes:

1. Compare and contrast distance vector routing protocols and link state routing protocols.
2. Achieve network security and optimal performance using ACL
3. Examine the fundamental concepts and techniques of layer 2 switching, including spanning tree protocols and virtual LANs.

Verified Expert

The overview of access control lists and spanning tree protocol are provided. The detailed discussion is made regarding these concepts. The literature review is provided for access control lists and spanning tree protocol.The literature review is discussed based on the analysis of various papers. Then the explanation is provided for IPv6 protocols such as RIPNG, OSPFv3, and EIGRP. These routing protocols are analyzed and discussed based on three factors such as routing overhead, scalability and network convergence. And the types of VLAN memberships are provided.

Reference no: EM132204194

Questions Cloud

March treasury bond futures settlement : On March 16, the March Treasury bond futures settlement price was 101 21/32. Assume that the 12 1/2 percent bond maturing
Securities analyst recommended general cinema : On March 1, a securities analyst recommended General Cinema stock as a good purchase in the early summer. The portfolio manager plans to buy
Between individual demand and market demand : What are some. differences between individual demand and market demand.
What assessment strategies each model recommends : Compare and contrast three of the models. Pay particular attention to how each model conceptualizes addiction through a systemic lens
Compare and contrast distance vector routing protocols : Routing and Switching - COMP 20015 - Compare and contrast distance vector routing protocols and link state routing protocols
Discuss intellectual property and the major issues : Discuss intellectual property and the major issues it has on international trade negotiations.
What are the benefits and risks associated : Define stock, bond, and mutual fund. What are the benefits and risks associated with each of these investments?
Describe intervention you implement to promote resiliency : Describe an intervention you would implement to promote resiliency. Describe the presenting problem in one concise sentence
Own life an example : How do you think economic relates to you in your own life an example

Reviews

len2204194

12/28/2018 10:24:11 PM

Deliverable s Aspects 0 1-20 21-35 36-45 Marks Task 3 a Evaluation of RIPNG, OSPFv3, and EIGRP Not Attempted /Plagiarized Report Reasonable work with only one criteria done Good work with two/three criteria done Perfect work with all criteria and appropriate referencing done Deliverable s Aspects 0 1-6 7-12 13-15 Marks Task 3 b Types of VLANs membership Not Attempted/ Plagiarized Report Average report with partially correct details Satisfactory report Excellent work with complete and accurate details

len2204194

12/28/2018 10:24:05 PM

Deliverable s Aspects 0 1-6 7-12 13-15 Marks Task 2 a Literature review about types of ACL Not Attempted/ Plagiarized Report Reasonable literature review but not with latest research paper and no proper references/cit ations Reasonable literature review with latest research paper and proper references/cit ations Perfect literature review with latest research paper and proper references/citatio ns Task 2 b Literature review about STP

len2204194

12/28/2018 10:23:57 PM

c. The total amount of similar material in any form of student work from a single source should not exceed 7 percent. However, cases having a similarity of less than 7 percent in such cases may still be investigated by the faculty depending on the seriousness of the case. d. If faculty member find enough merit in the case of a student work with a similarity (with a single source) of more than 7 percent as not a case of plagiarism, the faculty member should provide detailed comments/remarks to justify the case.

len2204194

12/28/2018 10:23:30 PM

? Use page numbers ? Assignment should be computer typed using Calibri size 12 font and the Softcopy is to be submitted through Moodle(Turnitin). ? Heading should be with Font Size 14, Bold, Underline ? Use Diagrams and Examples to explain your topic. ? Copy paste from the Internet is strictly not acceptable. ? In-text citation and referencing using CU Harvard referencing Style. ? The students should scan and attach the completed declaration form which is given on the Moodle after signing. Feedback to Students Work proposal should be submitted through Moodle on or before . Feedback will be given by

len2204194

12/28/2018 10:23:21 PM

Guidelines: Follow the guidelines mentioned below for your assignment: ? The document should be well presented and neatly done. ? Assignment should be submitted through Moodle (Turnitin). ? Handwritten assignments will not be accepted. ? Assignment should have a title page. Title page should contain the following information: o Title of the assessment, o Names of the student, o Student ID, o Session, o Department Name, o Semester Name, Academic Year ? It should have Table of Contents, references.

len2204194

12/28/2018 10:23:15 PM

• Assignment report submission : 90 Marks Submit the assignment report on or before • Zero marks will be awarded if student is absent for Viva. Task 2: Report should include: Detailed literature review of types of: a) Access Control List (ACL) (15 Marks) b) Spanning Tree Protocol (STP) (15 Marks) (Note: Literature review from at-least three sources) Task 3: a. Evaluate IPV6 editions of the routing protocols RIPNG, OSPFv3, and EIGRP based on the following: i. Scalability ii. Routing Overhead iii. Network Convergence (30 Marks) b. Types of VLANs (Virtual Local Area Networks) memberships (15 Marks)

len2204194

12/28/2018 10:23:04 PM

Evaluation Criteria: The evaluation will be done on the strength of analysis presented in the assignment: • Assignment work proposal submission : 10 Marks Submit a work proposal for this assignment on or before, which must include: ? Understanding of deliverables – a detail description of deliverables ? General overview of proposed plan - initial understanding of solution to all the tasks ? Resources identified

len2204194

12/28/2018 10:22:58 PM

Instructions to Student: • Present the relevant references /citation at the end of document • Marks will be awarded for the content written in your own words • Viva is mandatory. Students absent for viva will be awarded zero marks for the assignment. • Report must be uploaded on Moodle on or before the date of submission. • The students should scan and attach the completed declaration form with coursework report after signing.

Write a Review

Computer Networking Questions & Answers

  Why is it significant to secure windows and unix servers

CIO has asked you to describe why you suggest it is so significant to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Write report on the project management and ethical issues

MN601 Network Project Management Assignment, Melbourne Institute of Technology, Australia. Write report on the project management and ethical issues

  How to use the encrypting file system

You will learn how to use the Encrypting File System in this activity. You will create a folder, copy a file to the folder, and then encrypt the folder's contents

  Describe any of the internetworking equipment that you have

discuss any of the internetworking equipment that you have experience with and the advantages and disadvantages of

  Domain name system (dns.dynamic host configuration protocol

On the Internet, the entity that looks up a domain name and retrieves information about it is the:Select one: A. Domain Name System (DNS) B. Dynamic Host Configuration Protocol (DHCP) C. Internet Corporation for Assigned Names and Numbers (ICAAN) ..

  Explain sliding window error control system

In a sliding window error control system in which each byte is numbered, Station A sends a packet with bytes numbered 801 to 900. If the packet arrives with no errors, how does Station B respond?

  Designing the most secure network possible

Designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN

  Review of the current market for online education

Your task is to provide a critical review of the current market for online education as well as providing an overview and definition of what online education is and how it works.

  Implementing threading in a client-server protocol

write a 5- to 7-page paper documenting the changes that you made and analyzing the impact the changes will have on the overall throughput and latency of the server.

  Explain how csma ca dcf works

How does Wi-Fi differ from shared Ethernet in terms of topology, media access control, and error control, Ethernet frame?- Explain how CSMA/CA DCF works.

  Wireless protocol contains the mac addresses of sender

Each frame in the 802.11 wireless protocol contains the MAC addresses of the sender and receiver. Thus, both sender and receiver are identified in every frame, giving more data to an interceptor who might want to spoof either party.

  What is the network address-broadcast and range

How many systems are involved in the communications in this capture? What are their operating systems (including version information if you can tell), MAC addresses, IPs, services presented to the network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd