Compute the distance tables after the initialization step

Assignment Help Computer Networking
Reference no: EM131488323

CONTENTS (Answer Any 3 Questions)

1. Subnetting and Routing Protocols

Question 1 - Routing Protocols

a) Consider the following network. With the indicated link costs, use Dijkstra's shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table.

168_Figure.jpg

b) Consider the three-node topology shown below. Let the link costs be c(x,y) = 3, c(y,z) = 6, c(z,x) = 4. Compute the distance tables after the initialization step and after each iteration of the distance-vector algorithm.

1992_Figure1.jpg

c) Consider the count-to-infinity problem in the distance vector routing. Will the count-to-infinity problem occur if we decrease the cost of a link? Why? How about if we connect two nodes which do not have a link?

Question 2 - IP Addressing

a) Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also suppose that Subnet 1 is required to support up to 63 interfaces, Subnet 2 is to support up to 95 interfaces, and Subnet 3 is to support up to 16 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints.

b) Consider a subnet with prefix 128.119.40.128/26. Give an example of one IP address (of form xxx.xxx.xxx.xxx) that can be assigned to this network. Suppose an ISP owns the block of addresses of the form 128.119.40.64/26. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets?

c) Write a short note on IPv6.

Question 3 - IP routing Configuration

Scenario

 

149_Figure2.jpg

The responsibilities of the network engineer with International Travel Agency include creating and maintaining the San Jose campus network, connectivity to all regional headquarters, and Internet access via one or more service providers. The San Jose campus network must maintain 99.9% availability, while supporting 99% availability to regional headquarters. The network will be based on and must meet the following requirements:

1. The San Jose core routers must run EIGRP.
2. The network has been allocated one Class B license.
3. Use VLSM on all serial interfaces as may be appropriate.

4. This network will have three branches. The regional headquarters in Singapore and Auckland will run EIGRP. The Westasman branch office will run EIGRP. The Vista and Eastasman branch offices will run IGRP. (for configuring routing protocols correctly for different

5. Summarize all routes from each area into the core. Plan for approximately 30 networks in each area with exception of the core, which is exactly as shown in the diagram.

6. In the IGRP cloud of Vista and Eastasman, configure a DHCP server for a LAN segment. Use an IP helper address so that a workstation on another segment in that area can obtain an IP address from the DHCP server.

7. Configure Internet connectivity through a static route.

8. Document the configuration and any difficulties that were encountered.

9. What were the implementation issues or limitations?

10. List two suggestions for improving this network configuration and design.

Verified Expert

Three questions are asked. We gave answered for the three questions. For Question No1, As per the requirement, Sortest path is found for all the network nodes by using the Dijikstra's shortest path algorithm. By using the three node topology diagram,the given costs are linked and the distance table is computed. For Question No 2, As per the requirement, Three subnet addresses are interconnected and the network addresses are provided. Prefixes and subnets are given for the four subnets. IPv6 is investigated and explained. All the designs and calcualtions are explained. For Question No 3, As per the requirement, Network design is created. San Jose core router is configured and running in the EIGRP. VLSM plan is created. Eastasman and Vista branch offices are run in IGRP.

Reference no: EM131488323

Questions Cloud

Pop an elementoff the stack : Then pop an elementoff the stack and add the element to a queue, and repeat that three more times. In what order will you remove the elements from the queue?
Write code that does the opens : Write code that does the following opens an output file with the filename number_list.txt, uses a loop to write the numbers 1 through 100 to the file.
Identify the types of hardware and software : Identify the types of hardware and software that are appropriate for use in distributed enterprise systems.
Calculate the value of the bond : (Bond valuation) Kyser Public Utilities issued a bond with a $1,000 par value that pays $30 in annual interest. It matures in 20 years.
Compute the distance tables after the initialization step : Compute the distance tables after the initialization step and after each iteration of the distance-vector algorithm.
Communicate and share resources in a number of ways : Networks have changed the way we communicate and share resources in a number of ways. Shared resources are a definite advantage of networking.
At what price should the latham corporation sell these bonds : (Bond valuation-zero coupon) The Latham Corporation is planning on issuing bonds that pay no interest but can be converted into $1,000 at maturity.
Model for the human resources department tables : Use Microsoft® Visio® to create an Entity Relationship Diagram (ERD) model for the Human Resources Department tables in the business case when Human Resources.
What would be the value of the given bonds : (Bond valuation) You are examining three bonds with a par value of $1,000 (you receive $1,000 at maturity) and are concerned with what would happen.

Reviews

len1488323

5/8/2017 5:23:51 AM

What You Submit and How? 1. You need to submit a Report and Packet Tracer File. • Report – Should contain answers for question 1, 2 and the questions that cannot be addressed by the configuration • Packet Tracer File - You need to do the relevant configurations following the instructions and answering the questions. And you need to save the Packet Tracer configuration file. 2. Submission Instructions • Create a folder with your student ID and add both report and the Packet tracer file into the folder. • Compress the folder and create a .ZIP file (Make sure you compress you file to a zip file. If you submit different files penalties of 5 marks will be applied.). Rename the file with your student number and name (e.g. 345678_John_Smith) • Submit the ZIP file via Moodle link. • If you do not follow above instructions 10 marks of penalties will apply.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd