Compare distance vector routing with link state routing

Assignment Help Computer Network Security
Reference no: EM131010963

Task

This assessment item is to produce a short report by investigating and addressing some key topics for this subject. Note answering these questions will help you build some understanding for the next assessment item as well as for the entire subject material. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the Resource section of Interact site.

Answers MUST be written in your own words. If an answer contains more than 20% direct quote (referenced or unreferenced) 0 marks will be awarded for this question.

One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated.

For mathematical and subnetting questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

Question 2

(Show your working and give a short explanation for each answer.)

Designing IP Addressing schemes and configuring IP Addressing is a common activity undertaken by network engineers. Consider an ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP needs to distribute these blocks to 2600 customers as follows:[7 marks]

a. The first group has 200 medium-size businesses; each needs approximately 128 addresses.

b. The second group has 400 small-size businesses; each needs approximately 16 addresses.

c. The third group has 2000 households; each needs 4 addresses.

Design the sub blocks and give the slash notation for each sub block. Find out how many addresses are still available after these allocations.

Question 3

Consider the diagram below. Which of the two central routers (R1 and R2) is more critical for network operations and why?

Question 4

Contrast and compare distance vector routing with link state routing.

Question 5

Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?

Rationale

This assessment relates to the following earning objectives of this subject:
• be able to explain the TCP/IP architecture and layers and compare with the OSI layers;
• be able to analyse IP addressing requirements and design an addressing scheme;
• be able to analyse the requirements of IP routing and choose appropriate routing methods;
• be able to demonstrate how internetworking devices obtain their network configuration;
• be able to explain how data flows through the internet;
• be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet; and
• be able to discuss the evolution and ongoing change of the internet.

Verified Expert

The work has been done on the networking, focusing on the routing, switching and ICMP messages. There are solutions for different questions on network and subnetting. The work has been provided considering the word limit 550 for all the theoritical questions. there is no work limit for the technical questions. APA format.

Reference no: EM131010963

Questions Cloud

What plan of action do you suggest : Plan an acquisition strategy to acquire the XYZ SBG(G)N. You reach an impasse with General Statics in your negotiations. What plan of action do you suggest
What is simpson''s average annual rate of growth of sales : Simpson Construction had sales seven years ago of $2,150,000. This year their sales hit $4,600,000. What has been Simpson's average annual rate of growth of sales?
Determining the investment in the partnership : Prepare the entry to record Nichols's investment in the partnership, assuming the equipment has a fair value of $4,000.
Decision rules payback-npv-irr : Which of the decision rules (payback, NPV, or IRR) do you think is the best rule for a firm to use when evaluating projects? Be sure to justify your choice.
Compare distance vector routing with link state routing : Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?
Underlying determinants of the projects cash flows : Bridgeway Pharmaceuticals manufactures and sells generic over-the-counter medications in plants located throughout the Western Hemisphere. What is the probability of a cash flow less than $150,000 in Year 1? In Year 5? What are the means and standard..
Determine the fair present value of the bond : BSW Corporation has a bond issue outstanding with an annual coupon rate of 5.8 percent paid quarterly and four years remaining until maturity. The par value of the bond is $1,000. Determine the fair present value of the bond if market conditions just..
Describe the structure of your ecosystem : Describe the structure of your ecosystem including important abiotic features and dominant plant and animal species. Explain some functions/processes of your ecosystem including one nutrient cycle and one food chain
What is a better pricing strategy for the monopolist : Demand is given by Qd = 620 - 10xP and supply is given by Qs = 100 + 3xP. What is the price and quantity when the market is in equilibrium?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe specific goals for the process area

Briefly describe what the process area is and why it is needed. Enumerate improvements you expect to see for these process areas in your enterprise.

  What are the various threats to information security

What are the various threats to information security

  Analyze the basic attacks that occur in cyberspace each

analyze the basic attacks that occur in cyberspace. each type of threat actor attempts to achieve certain goals

  Famous financial corporation

Your submission should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insight relating directly to the topic. Your response should reflect scholarly writing and APA stan..

  What is the value of the symmetric key

In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same?

  How does a security framework assist or affect

How does a security framework assist or affect in the design and implementation of a security infrastructure? Detail information security governance and what organizations and personnel will use it

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  It infrastructure management pg assessment item 2enterprise

assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014

  Appraise the individual and organizational consequences of

1.compare and contrast the mis in place in two distinctly different organizations.2.compare each organizations use of

  Each discussion question should be answered with about 200

each discussion question should be answered with about 200 words. no references should be used. responses should be

  How do tables track the state and context of exchange packet

What are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  What would the subnet mask be in dotted decimal notation

Assume the address of a network host is 198.4.81.120/27. If the first address in the subnet range is the address of the network that address would be

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd