Explain how you will configure the routing

Assignment Help Computer Networking
Reference no: EM131428122

Question 1

(a)

210_figure1.jpg

Figure Q1 (a)

i. Explain the difference between attaching a serial interface to a service provider in a production environment and attaching a serial interface to another Router in a laboratory environment.

ii. Choose an appropriate routing technique between the Internet Service Provider and the Gateway Router. Justify your selection.

(b)

2045_Figure2.jpg

Figure Q1 (b)

i. Identify the type of route used between Routers R1 and R2 that facilitates Router R2 to reach the four networks shown in the Figure Q1 (b).

ii. Explain how you will configure the routing between Routers R1 and R2.

iii. Justify your selection by discussing its advantages.

(c) As a network administrator, explain in which situations you would choose to use the distance vector routing protocols and link-state routing protocols.

Question 2

(a)

1897_Figure3.jpg

Figure Q2 (a)

Analyze the routing table shown in the above Figure Q2 (a), and explain how the Router selects the path to the network 192.168.4.0.

(b) Provide FOUR (4) reasons routing loop occurrences and explain their respective implications on network operation.

(c) Routing Information Protocol (RIP) uses User Datagram Protocol (UDP) in the transport layer. UDP is considered as a connectionless and unreliable protocol. In this situation, how does RIP ensure the reliability and consistency of the routing updates between Routers.

Question 3

HQ# show ip route
<output omitted>

10.0.0.0/30 is subnetted, 1 subnets

C 10.10.10.252 is directly connected, Serial0/0/0

172.16.0.0/30 is subnetted, 1 subnets

C 172.16.100.0 is directly connected, Serial0/0/1

R 192.168.1.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.2.0/24 [120/16] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.3.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.7.0/24 [120/1] via 172.16.100.2, 00:00:04, Serial0/0/1

Figure Q3 (a)

Analyze the output shown in the above Figure Q3 (a).

i. Explain why the network 192.168.2.0/24 is not reachable from the HQ Router.

ii. Explain how HQ Router was informed by RIP that the 192.168.2.0/24 is not reachable.

(b)

35_Figure4.jpg

Figure Q3 (b)

Both Routers R1 and R2 are configured with RIP as shown in the above Figure Q3 (b).

i. Analyse three ways the unnecessary updates in RIP negatively impact upon the Local Area Network (LAN) environments.

ii. Modify the RIP configuration so RIP updates do not affect the LAN segments.

(c) With the aid of a block diagram, explain how a Router performs the route lookup process when it receives an IP packet and decides which route in the routing table is the best match.

Question 4

(a) Router# show ip eigrp topology

IP-EIGRP Topology Table for AS 1

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status

<output omitted>

P 10.10.12.0/24, 1 successors, FD is 5514496

via 172.16.1.38 (5514496/28160), Serial0/1/0 via 172.16.1.42 (7693056/6172416), Serial0/1/1

<output omitted>

P 10.10.14.128/25, 1 successors, FD is 6026496

via 172.16.1.38 (6026496/2172416), Serial0/1/0 via 172.16.1.42 (7181056/28160), Serial0/1/1

<output omitted>

Figure Q4 (a) Analyze the output shown in the above Figure Q4 (a).

i. Explain how the DUAL algorithm chooses the best path to the network 10.10.12.0/24 and 10.10.14.128/25.

ii. If the chosen path is suddenly down, explain what will happen.

(b) Even though Enhanced Distance Vector Routing Protocol (EIGRP) is classified as a Distance Vector Protocol, its architecture and operation are different from other Distance Vector Protocols as it has fast convergence. Explain why EIGRP is different from other Traditional Distance Vector Protocols apart from fast convergence.

(c) When analyzing your network traffic, you have found that only 50% of the bandwidth is available for data traffic in the 128 kbps serial connection between the HQ and Production yard. The network uses EIGRP as a protocol. The autonomous System number used is 5.

i. Explain how you will solve this problem and restrict the EIGRP to using less than 30% of the bandwidth.

ii. Provide the configuration for your proposed solution.

Question 5

(a) Your organization has decided to implement a link-state routing protocol and you are assigned to carry out this task. As a network administrator, explain briefly the requirements of routing devices that are important to configure the link state protocol.

(b)

1372_Figure5.jpg

Figure Q5 (b)


Calculate the best path to the network 10.0.0.0 from the Router A using the Edsger Dijkstra's Shortest Path First (SPF) algorithm.

(c)

2378_Figure6.jpg
Figure Q5 (c)

Identify the type of Routers A, B and C and explain their roles.

(d)

278_Figure7.jpg

Figure Q4 (d)

When designing OSPF networks, all areas should be connected to the backbone area. However, due to topography constraints in Panda Corporation, it is not possible to connect the area-2 with the area-0. You are assigned to solve this problem.

i. Propose a solution to establish the connectivity for the area-2.

ii. With the aid of diagram, explain your proposed solution.

iii. Provide the configuration of your proposed solution.

Question 6

(a) Provide examples where you would recommend using the Border Gateway Protocol (BGP).

(b)

1319_Figure8.jpg

Figure Q6 (b)

Demonstrate how BGP path attributes can be used to set the preferred route as AC from AS100 to 200 and the preferred route as BD from AS 300 to AS 500.

(c) Addresses which are globally routable and reachable on the IPv6 Internet are known as global unicast addresses. With the aid of a diagram, explain the structure of a global unicast address for a typical site.

Reference no: EM131428122

Questions Cloud

Movie production house which is represented by law firm : Henry owns a movie production house which is represented by a law firm. He also owns a shipping agency which is represented by Chase. The agency relationship between Henry and Chase will be terminated by the bankruptcy of which of the parties?
Find the line current for a load : A three-phase, balanced, Y-Y, one-line diagram is shown below. The source voltage is Vsource = 120 0 with a phase sequence of abc. Find the line current for a load of 16 + 12j. Assume the line is lossless.
Application typically means producing valuable behavior : Application typically means producing valuable behavior; valuable behavior usually meets extra-experimental reinforcement in a social setting; thus, valuable behavior, once set up, may no longer be dependent upon the ______ technique which created it..
Evaluate the effectiveness of safety training program : How would you evaluate the effectiveness of a safety training program in a manufacturing company? What are three tools (methods) you would use in the selection process of a software sales person and why would you choose those? Mass marketing is dead ..
Explain how you will configure the routing : CIS3202/ICT3216 : Routing Protocols and Concepts - Bachelor of Computing Science (Hons) - BCSI - Explain the difference between attaching a serial interface to a service provider in a production environment and attaching a serial interface to anot..
What will be the counselors role with this client : What concepts of the theory make it the most appropriate for the client in the case study?Why did you choose this theory over the others?What will be the goals of counseling and what intervention strategies are used to accomplish those goals?
How about a fantasy football commissioner : Some of you may be saying “I will never write a Formal Report.” But, my guess is that almost all of you will be required to write some sort of report outside of this class, not necessarily business related. Think about this, and give at least one exa..
Types of cultural barrier to communicate between companies : Discuss what companies have to do (or not to do) if they plan to do business abroad and with others cultures. Identify types of cultural barrier to communicate between companies. Use for your discussion examples of successful companies that show grea..
Understand the basics of financial statement analysis : The purpose of this assignment is to help you understand the basics of financial statement analysis using financial ratios on the assets section of the balance sheet, data interpretation, and how ratios are used to gain insight about the managemen..

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine number wait states for proper system operation

How many wait states (clock cycles) need to be inserted for proper system operation if bus clocking rate is 8 MHz?

  What is data warehousing.what are xml databases.

Do you believe data warehousing is a fad or a "real" technology which will benefit organizations?

  Assignment on wireless networking

Wireless Networking, What do wireless clients use to identify a specific wireless access point, How do multiple access points identify themselves as part of the same network

  Designating which pc s are part of the network

Designating which PC s are part of the network b. Wiring the network c. Designating how ? les, folders and peripherals will be shared d. Installing the proper hardware and software

  Determining size of ethernet mac addresses

Determine the size of Ethernet MAC addresses?

  What is a lan subnet

What is a LAN subnet? What are some of the strategies for a network administrator to consider use subnetting (why do it)? What, if any, equipment is needed? Are there other alternatives that can accomplish similar results

  Rewrite the ip addresses using binary notation

Rewrite the following IP addresses using binary notation- 12.74.16.18/22

  How you would propose protecting your chosen cloud solution

How you would propose protecting your chosen cloud solution from cyber-attack using current password and data protection protocol. Why and how the use of social media can ensure your company has a competitive edge.

  Explaining language of all strings in alphabet sigma

For a language L over alphabet Sigma, let sup(L) denote language of all strings in Sigma* that contain a string of L as s substring.

  Describe the interaction that should occur as client program

Describe the interaction that should occur as the client program encounters common network issues like delay, jitter or packet loss.

  Compute data transmission rate in bits per second

Assume that airliner carries 10,000 kg of those floppies at speed of 1000 km/h over distance of 5000 km. Compute data transmission rate in bits per second of this system?

  Discuss three configuration topologies in wireless topology

Wireless Topology Paper: Wireless communication, generally, useless three configuration topologies (1) point to point; (2) point to multipoint; and (3) multi-point to point. In this paper, (a) define each topology, (b) provide a scenario for usin..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd