Compare distance vector routing with link state routing

Assignment Help Computer Network Security
Reference no: EM131010963

Task

This assessment item is to produce a short report by investigating and addressing some key topics for this subject. Note answering these questions will help you build some understanding for the next assessment item as well as for the entire subject material. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the Resource section of Interact site.

Answers MUST be written in your own words. If an answer contains more than 20% direct quote (referenced or unreferenced) 0 marks will be awarded for this question.

One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated.

For mathematical and subnetting questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

Question 2

(Show your working and give a short explanation for each answer.)

Designing IP Addressing schemes and configuring IP Addressing is a common activity undertaken by network engineers. Consider an ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP needs to distribute these blocks to 2600 customers as follows:[7 marks]

a. The first group has 200 medium-size businesses; each needs approximately 128 addresses.

b. The second group has 400 small-size businesses; each needs approximately 16 addresses.

c. The third group has 2000 households; each needs 4 addresses.

Design the sub blocks and give the slash notation for each sub block. Find out how many addresses are still available after these allocations.

Question 3

Consider the diagram below. Which of the two central routers (R1 and R2) is more critical for network operations and why?

Question 4

Contrast and compare distance vector routing with link state routing.

Question 5

Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?

Rationale

This assessment relates to the following earning objectives of this subject:
• be able to explain the TCP/IP architecture and layers and compare with the OSI layers;
• be able to analyse IP addressing requirements and design an addressing scheme;
• be able to analyse the requirements of IP routing and choose appropriate routing methods;
• be able to demonstrate how internetworking devices obtain their network configuration;
• be able to explain how data flows through the internet;
• be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet; and
• be able to discuss the evolution and ongoing change of the internet.

Verified Expert

The work has been done on the networking, focusing on the routing, switching and ICMP messages. There are solutions for different questions on network and subnetting. The work has been provided considering the word limit 550 for all the theoritical questions. there is no work limit for the technical questions. APA format.

Reference no: EM131010963

Questions Cloud

What plan of action do you suggest : Plan an acquisition strategy to acquire the XYZ SBG(G)N. You reach an impasse with General Statics in your negotiations. What plan of action do you suggest
What is simpson''s average annual rate of growth of sales : Simpson Construction had sales seven years ago of $2,150,000. This year their sales hit $4,600,000. What has been Simpson's average annual rate of growth of sales?
Determining the investment in the partnership : Prepare the entry to record Nichols's investment in the partnership, assuming the equipment has a fair value of $4,000.
Decision rules payback-npv-irr : Which of the decision rules (payback, NPV, or IRR) do you think is the best rule for a firm to use when evaluating projects? Be sure to justify your choice.
Compare distance vector routing with link state routing : Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?
Underlying determinants of the projects cash flows : Bridgeway Pharmaceuticals manufactures and sells generic over-the-counter medications in plants located throughout the Western Hemisphere. What is the probability of a cash flow less than $150,000 in Year 1? In Year 5? What are the means and standard..
Determine the fair present value of the bond : BSW Corporation has a bond issue outstanding with an annual coupon rate of 5.8 percent paid quarterly and four years remaining until maturity. The par value of the bond is $1,000. Determine the fair present value of the bond if market conditions just..
Describe the structure of your ecosystem : Describe the structure of your ecosystem including important abiotic features and dominant plant and animal species. Explain some functions/processes of your ecosystem including one nutrient cycle and one food chain
What is a better pricing strategy for the monopolist : Demand is given by Qd = 620 - 10xP and supply is given by Qs = 100 + 3xP. What is the price and quantity when the market is in equilibrium?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Case study on research genetics

ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost.

  Seven phases of the systems development life cycle

iscuss and explain each of the seven phases of the systems development life cycle. Make sure your descriptions make connections between the different phases

  Which operating systems are best for particular hardware

Your task is to explain to her which operating systems are best for particular hardware - Should would like your help installing Windows 8.1 on the new Apple as she really likes the Windows operating system.

  Describe the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security

  Malware introductions to the network

Determine the best practices that should be implemented by the security department to help reduce the risks of malware introductions to the network. Propose what users and systems administrators should do when a potential infection has been suspec..

  Security testing differs from ordinary functionality testing

Describe how security testing differs from ordinary functionality testing. What artifacts (such as documents) would each produce. What results would each produce? How would you protect programs from malicous code, what should you look for.

  Describe specific goals for the process area

Briefly describe what the process area is and why it is needed. Enumerate improvements you expect to see for these process areas in your enterprise.

  Create a 7-10 slide presentation on information systems

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources

  Research on personally identifiable information

Learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools. These skills will be valuable throughout students' academic career. The paper will require a title page, NO a..

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Context of a systems development project

Outline the issues that Susan should consider which would support the purchase of a software package. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd