Explain how you will configure the routing

Assignment Help Computer Networking
Reference no: EM131428122

Question 1

(a)

210_figure1.jpg

Figure Q1 (a)

i. Explain the difference between attaching a serial interface to a service provider in a production environment and attaching a serial interface to another Router in a laboratory environment.

ii. Choose an appropriate routing technique between the Internet Service Provider and the Gateway Router. Justify your selection.

(b)

2045_Figure2.jpg

Figure Q1 (b)

i. Identify the type of route used between Routers R1 and R2 that facilitates Router R2 to reach the four networks shown in the Figure Q1 (b).

ii. Explain how you will configure the routing between Routers R1 and R2.

iii. Justify your selection by discussing its advantages.

(c) As a network administrator, explain in which situations you would choose to use the distance vector routing protocols and link-state routing protocols.

Question 2

(a)

1897_Figure3.jpg

Figure Q2 (a)

Analyze the routing table shown in the above Figure Q2 (a), and explain how the Router selects the path to the network 192.168.4.0.

(b) Provide FOUR (4) reasons routing loop occurrences and explain their respective implications on network operation.

(c) Routing Information Protocol (RIP) uses User Datagram Protocol (UDP) in the transport layer. UDP is considered as a connectionless and unreliable protocol. In this situation, how does RIP ensure the reliability and consistency of the routing updates between Routers.

Question 3

HQ# show ip route
<output omitted>

10.0.0.0/30 is subnetted, 1 subnets

C 10.10.10.252 is directly connected, Serial0/0/0

172.16.0.0/30 is subnetted, 1 subnets

C 172.16.100.0 is directly connected, Serial0/0/1

R 192.168.1.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.2.0/24 [120/16] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.3.0/24 [120/1] via 10.10.10.254, 00:00:03, Serial0/0/0

R 192.168.7.0/24 [120/1] via 172.16.100.2, 00:00:04, Serial0/0/1

Figure Q3 (a)

Analyze the output shown in the above Figure Q3 (a).

i. Explain why the network 192.168.2.0/24 is not reachable from the HQ Router.

ii. Explain how HQ Router was informed by RIP that the 192.168.2.0/24 is not reachable.

(b)

35_Figure4.jpg

Figure Q3 (b)

Both Routers R1 and R2 are configured with RIP as shown in the above Figure Q3 (b).

i. Analyse three ways the unnecessary updates in RIP negatively impact upon the Local Area Network (LAN) environments.

ii. Modify the RIP configuration so RIP updates do not affect the LAN segments.

(c) With the aid of a block diagram, explain how a Router performs the route lookup process when it receives an IP packet and decides which route in the routing table is the best match.

Question 4

(a) Router# show ip eigrp topology

IP-EIGRP Topology Table for AS 1

Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status

<output omitted>

P 10.10.12.0/24, 1 successors, FD is 5514496

via 172.16.1.38 (5514496/28160), Serial0/1/0 via 172.16.1.42 (7693056/6172416), Serial0/1/1

<output omitted>

P 10.10.14.128/25, 1 successors, FD is 6026496

via 172.16.1.38 (6026496/2172416), Serial0/1/0 via 172.16.1.42 (7181056/28160), Serial0/1/1

<output omitted>

Figure Q4 (a) Analyze the output shown in the above Figure Q4 (a).

i. Explain how the DUAL algorithm chooses the best path to the network 10.10.12.0/24 and 10.10.14.128/25.

ii. If the chosen path is suddenly down, explain what will happen.

(b) Even though Enhanced Distance Vector Routing Protocol (EIGRP) is classified as a Distance Vector Protocol, its architecture and operation are different from other Distance Vector Protocols as it has fast convergence. Explain why EIGRP is different from other Traditional Distance Vector Protocols apart from fast convergence.

(c) When analyzing your network traffic, you have found that only 50% of the bandwidth is available for data traffic in the 128 kbps serial connection between the HQ and Production yard. The network uses EIGRP as a protocol. The autonomous System number used is 5.

i. Explain how you will solve this problem and restrict the EIGRP to using less than 30% of the bandwidth.

ii. Provide the configuration for your proposed solution.

Question 5

(a) Your organization has decided to implement a link-state routing protocol and you are assigned to carry out this task. As a network administrator, explain briefly the requirements of routing devices that are important to configure the link state protocol.

(b)

1372_Figure5.jpg

Figure Q5 (b)


Calculate the best path to the network 10.0.0.0 from the Router A using the Edsger Dijkstra's Shortest Path First (SPF) algorithm.

(c)

2378_Figure6.jpg
Figure Q5 (c)

Identify the type of Routers A, B and C and explain their roles.

(d)

278_Figure7.jpg

Figure Q4 (d)

When designing OSPF networks, all areas should be connected to the backbone area. However, due to topography constraints in Panda Corporation, it is not possible to connect the area-2 with the area-0. You are assigned to solve this problem.

i. Propose a solution to establish the connectivity for the area-2.

ii. With the aid of diagram, explain your proposed solution.

iii. Provide the configuration of your proposed solution.

Question 6

(a) Provide examples where you would recommend using the Border Gateway Protocol (BGP).

(b)

1319_Figure8.jpg

Figure Q6 (b)

Demonstrate how BGP path attributes can be used to set the preferred route as AC from AS100 to 200 and the preferred route as BD from AS 300 to AS 500.

(c) Addresses which are globally routable and reachable on the IPv6 Internet are known as global unicast addresses. With the aid of a diagram, explain the structure of a global unicast address for a typical site.

Reference no: EM131428122

Questions Cloud

Movie production house which is represented by law firm : Henry owns a movie production house which is represented by a law firm. He also owns a shipping agency which is represented by Chase. The agency relationship between Henry and Chase will be terminated by the bankruptcy of which of the parties?
Find the line current for a load : A three-phase, balanced, Y-Y, one-line diagram is shown below. The source voltage is Vsource = 120 0 with a phase sequence of abc. Find the line current for a load of 16 + 12j. Assume the line is lossless.
Application typically means producing valuable behavior : Application typically means producing valuable behavior; valuable behavior usually meets extra-experimental reinforcement in a social setting; thus, valuable behavior, once set up, may no longer be dependent upon the ______ technique which created it..
Evaluate the effectiveness of safety training program : How would you evaluate the effectiveness of a safety training program in a manufacturing company? What are three tools (methods) you would use in the selection process of a software sales person and why would you choose those? Mass marketing is dead ..
Explain how you will configure the routing : CIS3202/ICT3216 : Routing Protocols and Concepts - Bachelor of Computing Science (Hons) - BCSI - Explain the difference between attaching a serial interface to a service provider in a production environment and attaching a serial interface to anot..
What will be the counselors role with this client : What concepts of the theory make it the most appropriate for the client in the case study?Why did you choose this theory over the others?What will be the goals of counseling and what intervention strategies are used to accomplish those goals?
How about a fantasy football commissioner : Some of you may be saying “I will never write a Formal Report.” But, my guess is that almost all of you will be required to write some sort of report outside of this class, not necessarily business related. Think about this, and give at least one exa..
Types of cultural barrier to communicate between companies : Discuss what companies have to do (or not to do) if they plan to do business abroad and with others cultures. Identify types of cultural barrier to communicate between companies. Use for your discussion examples of successful companies that show grea..
Understand the basics of financial statement analysis : The purpose of this assignment is to help you understand the basics of financial statement analysis using financial ratios on the assets section of the balance sheet, data interpretation, and how ratios are used to gain insight about the managemen..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd