Calculate the fragmentation offset for each fragment

Assignment Help Computer Networking
Reference no: EM133516901

Network Routing and Switching

Objectives

This assignment lets you demonstrate your knowledge of routing concepts by completing four tasks. You will utilise material you have studied in the unit and may extend that learning through additional reading as required. The assignment is designed to help you to achieve the unit learning outcomes listed in the unit profile.

Task 1 Routing Table construction

Consider a network scenario with four routers (labelled R1 to R4) and six subnets shown in Figure 1. A default router has been configured and all routers are fully updated.

Your task: using the table blanks provided, supply all the details of the routing table for routers R3 and R4. Arrange masks in longest-mask order, and in dotted-decimal format.

655_Network Diagram.jpg

 

Fig. 1 Network Diagram

Task two starts on the next page.

Task 2 - Forwarding process - classless addressing

Examine and understand the forwarding process as explained in the lecture (based on Forouzan). Answer the following two questions.

Question 1: Refer to Figure 1 network diagram from Question 1. Assume that a packet arrives at router R1 with a destination address of 140.21.3.250. Explain the router's logical processing of this packet (show its calculations as well) and its forwarding decision. (1 mark for correct forwarding decision, 3 marks for clear and correct explanation including calculations).

Question 2: In the same diagram (Figure 1), assume that a packet arrives at router R2 with a destination address of 160.22.14.10. Explain the router's forwarding decision and the processes it used to reach that decision. (1 mark for correct forwarding decision, 3 marks for clear and correct explanation including calculations).

Task three starts on the next page.

Task 3 - Distance Vector 3-step routing algorithm

In Week 8, you studied the distance vector algorithm used to calculate shortest path using RIP. The diagram below was used as an aid to understand how the algorithm works - it is based on Figure 8.6 in Forouzan 6th Edn and follows the same logic.

338_Distance Vector.jpg

 

Working through this task will give you a feel for the logical processing by which Routers update each other by broadcasting a copy of their table to one another. You may find reviewing the slides and video for Week 8 helpful. If you draw the network diagram described by the tables below and update the diagram as you go, it may help you answer the questions or verify your answers.

Shown below are the initial state routing tables for Routers A, B, C, D, E, and F which all have the same destination networks listed, abbreviated to destinations A, B, C, D, E, and F with aggregated costs. For example, a cost of 6 equates to 6 hops. The solution table blanks are provided in the Answer Template.

Initial State tables for A, B, C, D, E, F

To

Cost

Next

A

0

---

B

6

---

C

 

D

 

E

4

---

F

 

  A'   bl

To

Cost

Next

A

6

---

B

0

---

C

7

---

D

8

---

E

 

F

5

---

       B'   bl

To

Cost

Next

A

 

B

7

---

C

0

---

D

 

E

9

---

F

 

       C'   bl

To

Cost

Next

A

4

---

B

 

C

9

---

D

 

E

0

---

F

 

       E'   bl

To

Cost

Next

A

 

B

8

---

C

 

D

0

---

E

 

F

 

        '   bl

To

Cost

Next

A

 

B

5

---

C

 

D

 

E

 

F

0

---

Router F'  bl

To = Available network destinations
Cost = The number of hops to reach the network Next = The next hop toward the destination
∞ = infinity (network unknown, cannot be reached)
--- = no next hop or unknown

The assignment tasks:

Question 1: Router A receives an update from Router B. Process this update, showing Router A's modified and final table

Question 2: After processing B's data, Router A receives an update from Router C. Process this update, showing Router A's modified and final table.

Question 3: After a) and b) were processed, Router F receives an update from Router B. Process this update and show Router F's modified table, and its final updated table.

Question 4: What routes were unknown at the start (all tables in their initial state)? What routes are still unknown at the end (after you processed the updates in a, b & c? Express the routes in the form "A-B" = route from router A to router B.

Task 4 Fragmentation

An IP datagram 5,400 bytes long with no options arrives at a router, which determines that the next destination is an Ethernet network through which the datagram must travel. Answer the following questions, showing your calculations and reasoning.

Question 1: Assume that the router decides to fragment the packet into 4 fragments. Determine a correct size for each fragment and identify the starting byte and ending byte of each fragment.

Question 2: Calculate the fragmentation offset for each fragment.

Question 3: The total number of bytes from all 4 fragments leaving the router will be greater than the initial datagram size that arrived. Explain by how much, and the reason for this.

Reference no: EM133516901

Questions Cloud

Why it is essential for teachers to know about these : discuss why it is essential for teachers to know about these demographical characteristics and current changes in the English learner population in the United
What possible research questions you might explore : After reading your assigned chapter from Bad Ideas About Writing, explain what possible research questions you might explore related to your chapter.
Explaining something that you have been working on : explaining something that you have been working on, it is obvious that other people are doing other things; they are not even really trying to hide it.
Established in terms of the mitotic cycle : Describe and discuss briefly the means by which the primitive neuroepithelium is established in terms of the mitotic cycle.
Calculate the fragmentation offset for each fragment : COIT20261 Network Routing and Switching, Central Queensland University - Calculate the fragmentation offset for each fragment and What routes were unknown
Discuss how data collected from assessments inform : Discuss how data collected from assessments inform instruction and support students with and without exceptionalities
Caffeine receptor and signaling pathway : Determine the pathway/process the receptor is responsible for initialing. Caffeine receptor and signaling pathway.
How do you express joy sadness empathy and sympathy : How do you express joy, sadness, empathy and sympathy? Are able to express your emotions freely or do you feel that there is a certain type of behavior?
What are the most significant ways special education leaders : What are the most significant ways special education leaders can assist school districts in training staff to develop and implement IEPs?

Reviews

Write a Review

Computer Networking Questions & Answers

  Compare and analyze what these security issues

MN610 - Virtual Private Networks - VPN Replacement Technologies and compare and analyze what these security issues are and what solutions they propose

  Explain a peer-to-peer network verses client-server network

In a document of 2-3 pages, you will provide the following: Explain a peer-to-peer network verses a client-server network.

  Display the column names from the loan data set

Randomly shuffle the loan data set. Run 10-fold cross-validation to evaluate the out-of-sample performance of Random Forest, ANN and SVM. Based on your cross-validation results, which model has the best out-of-sample performance? Please briefly ex..

  Attacks and defenses to session key establishment protocols

Illustrate attacks and defenses to these session key establishment protocols at all levels, including one or both of communicating machines being compromised.

  Will server core be used on any servers

How many total servers are needed? Which roles will be combined? What edition of Windows will be used for each server (e.g., Standard, Datacenter)? Will Server Core be used on any servers

  What is the number of the first byte and number of last byte

What is the number of the first byte and number of the last byte in this datagram? Is this the last fragment, the first fragment, or a middle fragment?

  How to set up a small network in hardware and software

Explain how you would set up a small network in hardware and software for a charity with six computers running Windows 7. The charity would like to share an Internet connection and buy a multifunction device

  Apply the principles of networking protocols and standards

Give a brief description of any other network model that exists or has been in existence besides the OSI model and TCP/IP protocol suite?

  Wireless networksconsider a warehouse that is 60m by 30m

wireless networksconsider a warehouse that is 60m by 30m. wireless networking is required so that up to 20 staff

  Compare and contrast coaxial and utp

Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure..

  Performance of psk between awgn channel and rician channel

Is there a significant difference in BER performance of PSK between the AWGN channel and Rician channel?

  Is snort anomaly-based or signature-based

Is Snort an HIDS or an NIDS, how many sensors does Snort use and what does a preprocessor do?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd