Build a routing table for edge routers

Assignment Help Computer Networking
Reference no: EM133154903

ITECH1102 Networking and Security - Federation University

You have been appointed as a Network System Administrator by the Australian government to allocate public IP Version 4 (IPv4) addresses and build a routing table for edge routers to connect the Australian states as shown in Figure 1.

The IPv4 is an exhaustive list of IPv4 addresses for current Internet users in the world. However, in this scenario, you have the liberty to use the entire available unreserved public IPv4 addresses for the Internet users in Australia.

The major task is to allocate the unreserved public IPv4 addresses to different states in Australia based on the number of Internet users in those states. The number of Internet users for each state is given below:

New South Wales (NSW) Victoria (VIC) Queensland (QLD) Western Australia (WA) South Australia (SA) Tasmania (TAS) Northern Territory (NT)

: 6 Million

: 4 Million

: 3 Million

: 2 Million

: 1 Million

: 300 Thousand : 150 Thousand

The task needs to be completed based on the following constraints and assumptions:

• Only unreserved public IPv4 addresses should be used for allocation.
• Each state should have a unique set of addresses - no address or set of addresses can be reassigned to any other state.
• You should use only the classless IPv4 addressing in the assignment.
• The number of allocated addresses for each state should not exceed by 20% of the specified

Internet users for that particular state. For instance, the assigned addresses for Tasmania should not exceed 360 Thousand addresses.
• It is allowed to use one or more subnets to achieve the number of required address for a given state.
The minor task is to create routing table for edge routers only for the state NT, WA and SA. The task needs to be completed based on the following constraints and assumptions:
• The routing table should be minimal with no redundant routes in the table.
• Any packets from the source (NT or WA or SA) should take the minimal route to reach the destination (NT or WA or SA).
• Identify the Network Interface Card address to connect NT, WA and SA.

Attachment:- Network Planning Assignment Template.rar

Reference no: EM133154903

Questions Cloud

Growth decision in a crowded beer market : Case Study: "Wellington Brewery: Growth Decision in a Crowded Beer Market".
What is the number of annual miles driven : Based on this information, what is the number of annual miles driven, (the Point of Indifference) where the annual lease and fuel costs of operating each car
Defining the types of information : The project communications planning process concerns defining the types of information that you will deliver, who will receive it, the format for communicating
Evaluate the roles of information system applications : Evaluate the roles of information system applications common in healthcare organization and integrated delivery systems: including administrative systems/progra
Build a routing table for edge routers : Allocate public IP Version 4 (IPv4) addresses and build a routing table for edge routers to connect the Australian states
Created to control and surveil indigenous peoples : In thinking about the various laws and policies the US government created to control and surveil Indigenous Peoples,
Explain how key performance indicators help companies : Explain how Key Performance Indicators help companies to manage existing risks. Select a company other than Intuit and identify at least three KPIs unique to th
Promoting inclusion in the community and in the workplace : Using a journal writing style, write from your own point of view from what are the main differences of implementing inclusion in the workplace and in the commun
Calculate the total number of units accounted : Calculate the total number of units accounted for by the Assembly Department if it had 6000 units in ending inventory

Reviews

Write a Review

Computer Networking Questions & Answers

  Write a report on a network plan and configurations

Write a detailed implementation report which includes configurations of each networking device which are included in the whole network

  Calculate the efficiency of stop-and-wait

Calculate the efficiency of Stop-and-Wait ARQ in a system that transmits at R=1 Mbps and with reaction time of 1ms for channels with a bit error of 10-6,10-5 and 10-4

  How company ensure adequate destruction of materials

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Write a simple client-server network application

Socket Programming and Concurrency - write a client-server java program for transferring some file from the server to the client

  What is an intranet

What is an intranet. Give specific examples of benefits for firms that set up their own intranets. How does a computer virus work. What can individuals and organizational computer users do to reduce the likelihood of acquiring a computer virus

  Prepare a common-size balance sheet for intel

Intel Case The 2007 Intel Annual Report can be found at the following Web site: www .prenhall.com/fraser. Using the annual report, answer the following question

  In what ways can the business benefit from a web site

In what ways can the business benefit from a Web site

  Why do you think there is a need for four level of addresses

Why do you think there is a need for four levels of addresses in the Internet, but only one level of addresses (telephone numbers) in a telephone network?

  Describe key elements contained in a request for proposal

AMPS operates in what frequency range? Describe four key elements contained in a request for proposal (RFP). Discuss three strategic business advantages to wireless systems.

  Technology related to client-dominant local area network

What technology and cost-of-use issues are related with a client- dominant local area network? Think about what happens as the network grows in size and users are storing and retrieving vast amounts of data.

  Discuss the various different vpn solutions

Security is a major concern among all vendors in and out of the networking world. Despite this being a global issue, the network is still to blame. Discuss the various different VPN solutions and the protocols they use to secure data end-to-end

  Explain the events that can change the state of the system

Explain the events that can change the state of the system and write a programming code to generate 100 random variates according to exponential distribution and store them in an array.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd