Calculate the fragmentation offset for each fragment

Assignment Help Computer Networking
Reference no: EM131494247

Network Routing and Switching Assignment

Objectives - This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions.

Question 1 - Routing table construction

Given the following network, construct the routing table for routers R2 and R3.

611_Figure.png

Question 2 - Allocating subnets from a block

You are the Network Administrator for a startup company that has been granted a new block of addresses starting with the address 139.145.56.0/22.

a) Calculate the total number of addresses available in this block including all the special addresses.  Show your calculation.

b) As Network Administrator, you need to distribute the available addresses on a departmental needs basis (meaning not allocating more than you have to), with 4 new subnets determined as follows:

Marketing needs 65 addresses

Accounting needs100 addresses

Head Office needs 33 addresses and,

Customer Services needs 13 addresses.

Create the 4 subnets. For each subnet, list the subnet or first address, the last address, and the subnet mask in CIDR format. Show your calculations for all subnets, briefly showing how you arrived at the sub-block addresses.

c) How many addresses are left unallocated? Show your calculation.

Question 3 - Fragmentation

An IPdatagram 5,600 bytes long (including header with no options) arrives at a router, which determines that the next destination has an MTU of 1,500 bytes. Answer the following questions, showing your calculations and reasoning.

a) Assuming that the router decides to fragment the packet into 4 fragments, for each fragment, determine a correct size, and identify the starting byte and ending byte.

b) Calculate the fragmentation offset for each fragment.

c) The total number of bytes from all 4 fragments leaving the router should be greater than the initial datagram size that arrived. Explain why this is so

Hints: Working out part (a) can be a fiddly (messy) exercise and you may find it helpful to use a spread sheet to work out appropriate sizes and offsets. Remember that the offset needs to be evenly divisible by 8, as explained in the textbook.  You may need to do additional reading to understand the process if it is unclear to you - Forouzan is a good place to start.

Question 4: Advanced routing study

Research and review appropriate materials, including the textbook, and answer the first two questions (a & b).

a) Define the terms and discuss the relationship between Autonomous Systems, Inter-domain routing, and Intra-domain routing.

b) Identify the major routing protocols associated with Inter-domain and Intra-domain routing and list their similarities and differences. Finish by commenting on why we need different protocols for Inter-domain and Intra-domain routing.

Study the two articles listed below - both are freely available on the Internet.  You may use other references in addition to these, as needed. Then answer the remaining 3 questions (c, d & e). 

c) Briefly summarize in your own words the problems with current routing methods that the authors have identified.

d) Contrast and compare the concepts of embedded routing and extensible routing.

e) How does the proposal of Routing As A Service (RAAS or just RAS) address the problems with current routing methods?

The two articles for questions 3 - 5 (both articles have the same title):

1. Routing as a Service by K.Lakshminarayanan et al

2. Routing as a Service by K.Lakshminarayanan, Stoica, and Shenker

Question 5- IPv6 Packets

An IPv6 packet travelling within an Autonomous System, consists of a base header, extension headers, a TCP segment and data.   The data is 128,000 bytes long (jumbo payload).  The following diagram shows the packet:

Version

Traffic class

Flow label

Payload length

Next header

Hop limit

Source Address

Destination Address

Hop-by-hop exthdr

 

 

 

Source port address

Destination port address

Sequence number

Acknowledgement number

HLEN

Reserved

Control

Window size

Checksum

Urgent pointer

128000 bytes of data









Determine a correct or valid value for the following fields in the base header with a brief explanation of the value you selected.  Note: the brief explanation is half the marks.

  • Version;
  • Payload Length;
  • Next Header;
  • Hop limit:
  • Source Address and Destination Address.

Do not type your answers here: type it in the Answers Template provided.

Suggested sources of information: Forouzan (textbook) chapter 27.

Attachment:- Assignment File.rar

Reference no: EM131494247

Questions Cloud

Was the evidence sufficient to support a finding : Mr. and Mrs. Volkman entered into a contract with DP Associates for construction advice on building a house. They brought suit, claiming a breach of contract.
Solve for monthly volume to break even : Solve for monthly volume to break even. Solve for monthly volume needed to break even at desired $5,000 per month profit level.
Is reeves entitled to contribution from his partners : Flynn, a patient of Reeves, a doctor, sued Reeves for injuries allegedly caused by Reeves's malpractice. Reeves was a partner in a medical firm.
Is partner entitled to compensation under the circumstances : A partner sued another partner for compensation for services rendered to the partnership that were unforseen at the time the partnership agreement was signed.
Calculate the fragmentation offset for each fragment : COIT20261 Network Routing and Switching Assignment. Calculate the fragmentation offset for each fragment. Discuss the relationship between Autonomous Systems
How advances in technology are improving the process : Determine which one is preferential for responding to questions about a tests fairness - Identify at least two advantages and two disadvantages
Discuss the case of rice v travelers express company : Rice and Campbell were doing business as partners. They entered into an agreement with Travelers to write money orders. The partnership sold some of the money.
Review the case study of moser v williams : Moser and Williams were partners in a land development business. By agreement, title to the land was placed in Williams's name. Williams had contracted to sell.
Business in the highly competitive sector of market : Explain what you would say to a friend who wanted to start an online-only business in the highly competitive sector of the market

Reviews

len1494247

5/13/2017 2:17:43 AM

Australian student, need it as per the guidelines. This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions. The questions contain various numerical as well as descriptive questions covering the material from Weeks 1 to 9. Question #4 requires you to research further and then demonstrate knowledge of advanced concepts. Completing these questions should help you to achieve the unit learning outcomes as listed in the unit profile. You must do this assignment on your own – it is not a group assignment. Referencing: List all references and use proper in-text citation using the Harvard referencing convention. Remember that diagrams also need to be cited. Marks will be deducted on a per-question basis for not adhering to referencing standards.

len1494247

5/13/2017 2:17:37 AM

Type all your answers in the ‘Template for Your Answers’ Section of this document and upload only that template. You could do that by copying the Template section into a new Word document for uploading. Answers that are not typed into the “Template for Your Answers” section may not be marked, or may be returned to you for re-typing and re-submission – late penalties will apply. You must show the steps you took to arrive at your answers. Write your answers in your own words to avoid potential plagiarism and copyright violations. You must submit the template section as a Word file (.doc or .docx). There are 4 main questions with some sub-questions and the requirements are stated for each one. You must answer all 4 questions and their sub-questions. Marks are indicated in the Answer Template. The questions will be marked on correctness, clarity, and addressing all parts of the question.

Write a Review

Computer Networking Questions & Answers

  Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

  What are three qos issues for a voip network

What is the disadvantage of replacing an existing PBX tie line with a VoIP network?

  What is important to understand is that the speed and

it is almost time to go away for the holiday but before you begin your vacation the cio has asked that you attend a

  Why does ratio of read operations to write operations matter

Why does the ratio of read operations (those not updating internal state vari- ables) to write operations (those updating internal state variables) matter?

  What are the sizes of ram, flash and nvram

Identify the different subnets according to network requirements. Please analyse and design the best IP addressing scheme and what is the version number of IOS? What are the sizes of RAM, Flash and NVRAM?

  What doe eia and tia stand for

What are the three parts of the EIA/TIA 568-B standard? Identify the six subsystems of a structured cabling system.

  How to perform recursive queries of other dns servers

You are expected to turn in a network diagram. and access control lists for both incoming and outgoing traffic for the appropriate interface.

  Write main advantage of using domain controlled network

Write down the main advantages to using Domain controlled network? Write down some concerns and disadvantages to switching to domain network?

  How will ad organizational units be organized

How will the second and the third site factor into domain controller placement? How will AD sites be configured? How will AD organizational units be organized?

  Explain how to upgrade bus topology lan

You are asked to upgrade bus topology LAN at a friend's house to a star topology LAN. your friend wishes to connect three computers and printer and use Ethernet access method.

  What is the type or name of the message

The TCP or UDP port that a VoIP protocol uses must be kept open in a firewall so that the traffic can pass through. In this same file, what, TCP or UDP port is used in Frame 1

  What are the functional control types

What are the functional control types. provide an example for each type. What is the principle of least privilege. Why is it important to implement

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd