Network topology and design, Computer Networking

Assignment Help:

Question 1:

The following is a dump of a TCP header in hexadecimal format:

00CD0018 00000EF1 00000D5D 502200D1 01BF0010

Please answer the following two parts of questions:

Part I

1.1 What is the source port number?

1.2 What is the destination port number?

1.3 What is the sequence number?

1.4 What is the acknowledgment number?

1.5 What is the length of the header?

1.6 Which control bits are set and what do they represent?

1.7 What is the window size?

Part II

1.8 What does the last four digits '0010' of the above dump represent? What action will the destination node take when it receives this packet?

Question 2:

Based on the output from the "show cdp neighbours" command please draw the topology.

Show connections between devices and label the interfaces.

Question 3:

An organization is assigned the network number 172.17.0.0/16, and it must create a set of subnets that supports variable amount of hosts on each subnet. The topology is shown as following figure.

Please use VLSM to design and answer the following questions:

3.1 Define subnet masks (or extended prefix length) for the LANs in this organization

3.2 Write the usable IP range for each Subnet.

3.3 Write explicitly IP address of the host number 68 on the LAN5 explicitly in binary and decimal notation.

3.4 What is the broadcast address for the LAN4?

3.5 Setup and configure the network you designed above using the Packet Tracer router simulator.

a) with RIP v1

b) with RIPv2

Show the routing table for Router 1 after the network is fully converged. Your table should include the route, routing protocol route learned from/or directly connected interface, next hop router address, and metric (bandwidth measured in kbps for metric if appropriate) that are used.

c) Explain why there is no successful connectivity between different subnets when using

RIPv1

3.6 By using RIPv2 protocol, set up one PC in LAN1 and another PC in LAN6. Test the connectivity between them. Based on your observation please give an explanation of the ping process from PC in LAN1 to PC in LAN6 and the routing table lookup progress on R1.


Related Discussions:- Network topology and design

State in brief about the local area network, State in brief about the Local...

State in brief about the Local Area Network (LAN) LAN is an interconnection of computers and associated peripherals as well as to the communications system as shown in Figure

Define retransmission, Define Retransmission? Retransmission is a proce...

Define Retransmission? Retransmission is a process in which the receiver detects the occurrence of an error and asks the sender to resend the message. Resending is repeated unt

Internet transport service proposal, will you have this done to day? And ho...

will you have this done to day? And how long will this take?

sorting circuit along with odd-even merging circuit, As we previously know...

As we previously know, the merge sort algorithm needs two circuits, i.e. one for merging and second for sorting the sequences. Thus, the sorting circuit has been derived from the a

Importance of reliability engineering, The progress of any industry and ind...

The progress of any industry and indeed countries as well, today is linked to the effective performance of its equipments, processes and systems. Reliability engineering, not only

How a token ring networks allows sharing of bandwidth, Question: (a) E...

Question: (a) Explain how a Token Ring networks allows sharing of bandwidth (access control). (b) (i) CSMA/CD is not appropriate for wireless communication. Explain wh

Explain 10base2 - thinnet, 10Base2 - Thinnet Cable diameter is abou...

10Base2 - Thinnet Cable diameter is about 0.64 cm (RG-58) More flexible as well as easier to handle and install than Thicknet "2" represents a maximum segment len

System - network administrator, The program must be well documented which i...

The program must be well documented which includes meaningful variable and subroutine names ("self documenting code") along with comments in the code. The following block of code w

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd