Nat/pat helped address the ipv4 address

Assignment Help Computer Networking
Reference no: EM13941307

Question 1
a) Identify the class of the following IP addresses.
i) 100.168.1.42
ii) 129.0.0.1
iii) 193.33.33.33
iv) 6.7.8.9
v) 225.250.250.1

b) Compare MAC with IPv4 addresses providing an example of each, how those addresses are assigned and what role they play in the operation of a network.

c) Explain how NAT/PAT helped address the IPv4 address shortage problem.

Question 2
a) Routing tables are related to both the routing function and the forwarding function provided by the network layer. Briefly explain how the routing tables relate to the routing function and the forwarding function.

b) Router X and Router Y are initially directly connected in a network system. RIP is the routing protocol running on the routers, and DV (Distance Vector) algorithm is the routing algorithm for RIP. For some reasons the link between Router X and Router Y is broken down.
(i) Will this breakdown trigger Router X to re-compute its DV? Briefly explain your answer.
(ii) Will this breakdown cause the Router X to notify its neighbours of its DV? Briefly explain your answer

c) A network system is described as a graph shown in Figure, with nodes representing routers and edges representing network links.
-image-

Suppose DA = [dA(B), dA(C), dA(D)], DB, = [dB(A), dB(C), dB(D)], DD = [dD(A), dD(B), dD(C)], where DA represents the distance vector for node A, and dA(B) represents the cost of the least-cost path from node A to node B.
At the beginning, the routing table on all the routers are empty.
(i) Give the initialized DA.
(ii) After each router distributed its initialized distance vector,
what is the updated DA? You need to give details of how the updated DA is obtained.

Reference no: EM13941307

Questions Cloud

Tax avoidance as an ethical issue for business : Read the business ethics briefing, Tax Avoidance as an Ethical Issue for Business and answer all parts of the question below. The total word limit is 850.
Why was rome able to maintain an empire : Why was Rome able to maintain an empire that came to dominate the Mediterranean world, whereas the empires that rose in Egypt and Mesopotamia who had more stable and streamlined governments failed to rise to such strength? Be specific in your use ..
Size and extent of conceptual studies : Literature Review comprises the following typical tasks: Conduct a team brainstorming session to scope, the size and extent of conceptual studies needed and agree on strategies to complete the same on time.
Use the testcircle.java program to test your classes : Create a new class, Point, which inherits from Shape and contains two private instance variables of type int, x and y, which store the coordinates for the Point
Nat/pat helped address the ipv4 address : Compare MAC with IPv4 addresses providing an example of each, how those addresses are assigned and what role they play in the operation of a network.
Challenges that the company as well as the government faces : Identify possible constraints and problems that may hinder effective decision making. Explore and discuss the possible constraints or challenges that the company as well as the government faces,
Career development plan and commentary : A personal career development plan and commentary on the challenges you will face in undertaking it.
Most fundamental concepts in the culture : Do you agree with the notion suggested by Lakoff and Johnson that 'the most fundamental values in a culture will be coherent with the metaphorical structure of the most fundamental concepts in the culture'? Illustrate with your own examples where ..
Explain the purpose of confined space entry permits : Explain the purpose of confined space entry permits. In your response, include a discussion of how spaces are designated as permit-required, two examples of permit-required spaces that might be found in the process safety industry, and how spaces ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Question 1ai why has stuxnet virus been named as a

question 1ai why has stuxnet virus been named as a cyber-weapon?ii what has been the first identified target of the

  To do this your network should be designed to leverage

you work as a consultant for a small consulting firm located in south florida. your company was recently contracted to

  Provide network services

Your organization opened seven new branch offices in five states. Each branch office has five floors. All the branch offices use the same Internet domain name.

  Which eras were only the u.s. colleges can access internet

Which of the following eras were only the U.S. government, colleges, and universities able to access the Internet?

  Describe the concept of network file system

Describe the concept of network file system (NFS) and list the five major reasons NFS is used. How does Linux make file sharing safe and reliable

  Evaluate security implication of implementing virtualization

Discuss why virtualization is gaining so much popularity, and compare it with other types of networks that are currently available - Evaluate security implications of implementing virtualization. With reasons, recommend a typical virtualisation set..

  Explain get nearest server request from client

Each of network segments has at least one NetWare server on it. Which of the given replies to Get Nearest Server (GNS) request from client?

  In what ways can the business benefit from a web site

In what ways can the business benefit from a Web site

  What information is contained in the websites of cms

What information is contained in the websites of CMS, JC, CARF, and CLIA?What information is contained in the websites of CMS, JC, CARF, and CLIA?

  Deomonstrate the operation of the dns server

Configure a CNAME of www for host1, and a CNAME of dc1 for host2. Test the operation of your DNS server using an external client running DNS queries.

  Data center managers sometimes find that the most

data center managers sometimes find that the most conventional solutions to their data storage problems are not solved

  How you would subsequently optimize the network

Identify the possible causes of the problem. How you would subsequently optimize the network? Create an action plan to isolate the causes for the problems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd