Subnetting (EIGRP), Computer Networking

Assignment Help:
#questiGE 1-A


Objectives:

• Consolidate EIGRP knowledge.
• Introduce the Route Redistribution concept.
• Introduce the EIGRP External Routes concept.
• Introduce the Default Metric concept.

Intro:

OTB Inc. is having trouble on their network and needs help. Part of their network has no connectivity.

Topology:

Scenario:

According to the report, network 1 and network 2 are not able to reach network 3. As shown on OTB Network Topology above, OTB Inc. has 2 routing protocols running due transition issues. The goal is to have only one protocol running within the network but for now the older protocol must be kept. In order to achieve full connectivity, OTB routes generated by one routing protocol must be injected into the other one.

Step 1 – Checking the routers

You connect to R3 via console port to check its configuration. R3 is a RIPv2 speaker and a quick look at its configuration does not show anything unexpected: RIPv2 is correctly configured at R3, all R3 interfaces are up but R3 learned no routes via RIPv2.
Still from R3, you issue a few pings: pings to a few PCs under network 3 and to R4’s serial 0/0 interface are successful. Pings to R2’s interfaces and to R1’s interfaces fail.
You also issue a few pings from a few PCs under network 3 towards a few PCs under network 1 but all of such pings fail.

A quick look into R3’s routing table reveals it has no default route or routes to the EIGRP side of OTB’s network. Since R3’s configuration is correct, you assume some router was incorrectly configured and thus, wrongly advertising routes.
Since R3 is not learning routes from the EIGRP side, you decided to check EIGRP configuration into the EIGRP routers. You move to the EIGRP side, switch the console cable to R1 and check its configuration.

Once more, the configuration is correct: all R1’s interfaces are up, EIGRP is correctly configured and R1 has EIGRP routes installed into its routing table. R1 has a default route pointing to R4’s fa0/0 which was learnt via EIGRP from R4.
R1 also has EIGRP routes to network 3 (192.168.3.0/24). Such routes were learnt from R4 and are flagged as external EIGRP routes.

Question 1:
What is the meaning of an EIGRP External Route?
Question 2:
How are EIGRP external routes identified?
Question 3:
What is Two-Way Redistribution?
Question 4:
Why was the default metric set to 3?
For more info about route redistribution visit:
https://www.cisco.com/warp/public/105/redist.html
Question
5:
How do the EIGRP generated routes appear into R3’s routing table? Are they flagged as EIGRP routes or as RIP routes?
Question 6 – Challenge Question (OPTIONAL):
Is network 3 able to reach the Internet or any other network out of OTB? Explain. If not, what should be changed to allow network 3 reaching networks other than OTB’s?
on..

Related Discussions:- Subnetting (EIGRP)

System - network administrator, The program must be well documented which i...

The program must be well documented which includes meaningful variable and subroutine names ("self documenting code") along with comments in the code. The following block of code w

Deteemine token bus of 802.3, Token Bus Physical order of stations ...

Token Bus Physical order of stations doesn't matter Line is broadcast medium "Send" token by addressing neighbour Provisions for deleting, adding stations

Calculate the efficiency of stop-and-wait ARQ, Suppose that frames are 1250...

Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. Calculate the efficiency of stop-and-wait ARQ (a) Transmits a

What are firewalls, What are firewalls? Firewalls serve to protect an i...

What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that

IP address, what is variable ip address

what is variable ip address

What do mean by tunnel mode, What do mean by tunnel mode? This is a mod...

What do mean by tunnel mode? This is a mode of data exchange wherein two communicating computers do not use IPSec themselves. Instead, the gateway that is linking their LANs to

Shared programming using library routines, Shared Programming Using Library...

Shared Programming Using Library Routines The most well-liked of them is the use of combo function called fork() and join(). Fork() function is used to make a new child proces

Process management, Bootstrapping all the processes and establishing correc...

Bootstrapping all the processes and establishing correct lines of communication is, by itself, the toughest aspect of this assignment. Before writing any code you should think care

State about the future of the intranet, Future of the intranet At ...

Future of the intranet At present, the world of information technology is guided bythe C 3 paradigm that stands for Command, Control and Communication, which is normally

Node selection principle, QUESTION (a) Briefly describe the steps invol...

QUESTION (a) Briefly describe the steps involved in Network Simplex Method. (b) In Radix Heap Algorithm, the technique of buckets is employed. However this idea is an extens

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd