Compare and contrast link-state and distance-vector routing

Assignment Help Data Structure & Algorithms
Reference no: EM13324937

1. Compare and contrast link-state and distance-vector routing algorithms. Give examples of each.

2. Consider the following network.
a. With the indicated link costs, use Djkstra's shortest path algorithm to compute the shortest path from E to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3 in the textbook.
b. Eliminate node A, and redo the problem starting from node B.

Wireshark Lab

Part I:

This week's lab assignment will require you to learn the use of following two popular commands: ping [1], and tracert [2], [3], [4] (for windows). Please notice that these commands should be issued through the DOS windows of the system.

Ping (ping) between your location and thewww.google.comat three different hours of the day.

Find out the Internet address (IP address) of thewww.google.comand find out the Internet address (IP address) of your computer?

Find the average round trip time (delay).

Trace route (tracert) between your location andwww.google.comat three different hours of the day.

Find the average round trip delay. Is it the same as in case of ping?

Find the number of routers in the path at each of the three hours. Did the paths change during any of the hours?

Note: You can also use the VisualRoute (www.Visualroute.com). It will also give you the information about the physical location of each ISP network that the Traceroute packets pass through from source to destination. Free 15 days trial version is available at [5].

Part II: - Wireshark Lab for IP

Follow the instructions given at the text's web site (Wireshark lab for IP) and answer question 5.

Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer?

Part III:- Wireshark Lab for ICMP

Follow the instructions given at the text's web site (Wireshark lab for ICMP) and answer question 3 and 4.

Examine one of the ping request packets sent by your host. What are the ICMP type and code numbers? What other fields does this ICMP packet have? How many bytes are the checksum, sequence number and identifier fields?

Examine the corresponding ping reply packet. What are the ICMP type and code numbers? What other fields does this ICMP packet have?

How many bytes are the checksum, sequence number and identifier fields?

Note: You can use VisualRoute trial version [5] or ping and trace route commands at your command prompt.

[1]: MS-DOS ping command help, Computer Hope (tm), available athttps://www.computerhope.com/pinghlp.htm(Accessed on August 16, 2010)

[2]: MS-DOS tracert command help, Computer Hope (tm), available athttps://www.computerhope.com/tracert.htm(Accessed on August 16, 2010)

[3]: Understanding a Tracert, The Worldnet User's Reference Desk (WURD), AT&T Worldnet Service, AT&T Corp. available at:https://www.wurd.com/misc_tracert.php (Accessed on August 16, 2010)

[4]: Phillips George, Interpreting Traceroute Results, available athttps://oxide.sprintlink.net/traceroute.html (Accessed on August 16, 2010)

[5]: VisualRoute, Shareware downloads TCP/IP Networking - Traceroute Tools, by SnapFiles, available athttps://www.snapfiles.com/shareware/network/swtraceroute.html (Accessed on August 16, 2010)

Use the Turnitin linkbelow to submit your assignment.

Reference no: EM13324937

Questions Cloud

Explain moles of a monoprotic weak acid : The half-equivalence point of a titration occurs half way to the end point, where half of the analyte has reacted to form its conjugate, and the other half still remains unreacted. If 0.560 moles of a monoprotic weak acid
What are some advantages of written over oral communication : What are some advantages of written over oral communication? Breakdowns in the written process are less difficult to locate than are breakdowns in the oral process. Discuss this statement. Give an example of where two written messages on the same top..
Discussion on matching technology with the message : Explain why a sensitive message should be sent on a medium with a wide bandwidth. Why would a contemporary manager be tempted to use a medium with a narrow bandwidth for a sensitive message? What are the disadvantages to categorizing messages in the ..
Examples of critical errors in communication : Cite several examples of critical errors in communication. How could they have been avoided? Give an examples of polarization. Demonstrate how communication technology has advanced in the past five years. How has this technology affected the manageme..
Compare and contrast link-state and distance-vector routing : Examine the corresponding ping reply packet. What are the ICMP type and code numbers? What other fields does this ICMP packet have?
Example of status distorting the communication process : Give an example of a channel. What channel is used by a restaurant to tell you the price of a meal? Identify some cultural differences between people who work in a hospital and a manufacturing plant. Give an example of status distorting the communica..
Define what is the pressure inside the container : A container of gas with an adjustable volume has an initial pressure of p. The container volume is tripled at constant temperature. What is the pressure inside the container after the volume is increased
Increases the demand for more efficient communication : Give a specific example in which a demand for greater quality also increases the demand for more efficient communication. Describe a situation that may have cased a manager to be unethical in which the problem was more one of poor communication than ..
Develop a fact-finding plan including interviews : Review the organizational model above and list the individuals you would like to interview. Prepare a list of objectives for each of the interviews you will conduct.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Designing and populating a course table

Use data to design and populate a course table. Designate the CourseID field as a Primary Key and permit your database to automatically produce a value for this field.

  Steps of asymmetric encryption algorithms to read message

Using only asymmetric encryption algorithms write down any steps taken by Bob which permit him to read the message.

  Determine the transmission rate

Assume two TCP connections are available over some bottleneck link of rate R bps. Both connections have a huge document to send in the similar direction over the bottleneck link

  Create a program to calculate each income bracket

People from 3-different income levels, A, B, and C, rated each of 2-different items with a number 0 through 10. Create a file in which each line contains the income level and item rankings for one respondent.

  Determining ciphertext generated by encryption

Determine ciphertext (in binary form) generated by encryption of character X?

  Discussion on clustering and data mining

Clustering is generally used along with classification in some applications. In such a case, typically clustering is applied to a dataset to recognize natural grouping of the objects in the dataset,

  Simplify rsa cryptosystem using prime number

Assume we tried to simplify RSA cryptosystem using just prime p instead of composite modulus N = pq. As in RSA, we would have encryption exponent.

  Designing asp.net assignment

Design an ASP.NET assignment with Visual Studio.NET 2005. Create an event handler that assigns the entry in the TextBox control to Label control's Text property when the consumer clicks the Button control.

  Users and it organizations arm against phishing attacks

How users and IT organizations must arm themselves against these attacks?

  Algorithm for string of numbers recognize all the substrings

Write down algorithm, using pseudocode, to perform the following task, Given a string of numbers, recognize all of the substrings that form numbers that are divisible by 3.

  How to move from any spanning tree to other spanning tree

Illustrate that it is possible to move from any spanning tree T to any other spanning tree T0 by performing series of edge-swaps, that is, by moving from neighbor to neighbor.

  Write a c++ program that creates and populate a tree

Write a C++ program that creates and populate a tree for an arithmetic expression. Then it should perform an in-order and a post-order traversal on the tree. The input of the program will be a text file with the arithmetic expressions in RPN.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd