Explain the routers decision at the end

Assignment Help Computer Network Security
Reference no: EM133144259

COIT20261 Network Routing and Switching - Central Queensland University

Objectives
This assessment lets you demonstrate your knowledge of routing concepts by completing several exercises. You will utilize material learned in the unit and may extend that learning through additional reading as required. The assignment is designed to help you to achieve the unit learning outcomes as listed in the unit profile.

Question 1 Routing Table construction

The network diagram below shows four routers named Toby, Joan, Mohan, and Boon. Assume that all the networks shown are aware of each other and have fully updated routing tables and router Boon was configured as default router. Construct the routing table for routers Boon and Toby. List masks in longest mask order, and in dotted-decimal format.

917_Network Diagram.jpg

 

Fig. 1 Network Diagram

Question 2 - Forwarding process - classless addressing

First study and understand the forwarding process as explained in Forouzan Chapter 7. Answer the following two questions.

a) Refer to Figure 1 network diagram from Question 1. Assume that a packet arrives at router Boon with a destination address of 140.21.3.120. Show the router's forwarding process, that is, all the calculations it does to determine where to send the packet, the results at each step, and explain the router's decision at the end. Use a table to organize your data.

b) In the same diagram (Figure 1), assume that a packet arrives at router Joan with a destination address of 200.11.64.2. Show the router's forwarding process, that is, all the calculations it does to determine where to send the packet, the results at each step, and explain the routers decision at the end. Use a table to organize your data.

Question 3 - Distance Vector 3-step routing algorithm

In Week 8, the algorithm used to calculate shortest path using RIP is discussed, and the following diagram is used as an aid:

2384_Network Diagram1.jpg

 

Working through this question will give you a feel for the logical processing by which Routers update each other by broadcasting a copy of their table to one another. You may find reviewing the materials for Week 8 helpful (especially the diagrams). You should draw the network diagram described by the tables below (use slide #12 & 13 in week 8 as a guide) and update the diagram as you go - this will help you answer the questions or verify your answers.

Shown below are the initial state routing tables for Routers A, B, C, D and E which all have the same destination networks listed, abbreviated to destinations A, B, C, D and E, with aggregated costs. For example, a cost of 6 equates to 6 hops. The solution table blanks are provided in the Answer Template. The initial state tables (five of them) are shown below:

The questions:

a) Router D receives an update from Router C. Process this update to show Router D's modified and final tables

b) Router A receives an update from Router B. Process this update to show Router A's modified and final tables.

c) Router E receives an update from Router A. Process this update to show Router E's modified table, and its final updated tables. Are the routes for E's final table now showing least possible cost i.e., the shortest paths? Discuss with reasons

d) Draw a diagram showing all routers and the known distances between them after the above three updates have been processed.

Question 4 Fragmentation

An IP datagram 5,140 bytes long with no options arrives at a router, which determines that the next destination is an Ethernet network through which the datagram must travel. Complete the following questions, showing your calculations and reasoning.

a) Assume that the router decides to fragment the packet into 4 fragments. Determine a correct size for each fragment and identify the starting byte and ending byte of each fragment.
b) Calculate the fragmentation offset for each fragment.
c) The total number of bytes from all 4 fragments leaving the router will be greater than the initial datagram size that arrived. Explain by how much, and the reason for this.

Attachment:- Routing and Switching.rar

Reference no: EM133144259

Questions Cloud

Calculate Chris income tax liability : Calculate Chris's income tax liability and his Class 2 and Class 4 National Insurance Contributions for 2021/22
What is the metaphor of the iceberg : What is the metaphor of the iceberg as related to systems thinking?
What is equivalent annual cost : What is the equivalent annual cost of the AC360? Assume that there are no taxes.
How equity markets have developed over time : Discuss how equity markets have developed over time, paying particular attention to technological innovation.
Explain the routers decision at the end : Determine a correct size for each fragment and identify the starting byte and ending byte of each fragment - Draw a diagram showing all routers and the known
Statements are true regarding the use of images : Which of the following statements are true regarding the use of images? (Select all that apply.)
Report prolonged services : Is there a coding mechanism available to report prolonged services that are performed by clinical staff under physician supervision?
Access balance sheet of real company and compute few ratios : Access balance sheet of a real company and compute few ratios that help us understand the liquidity of the company. Compare these ratios with the industry ratio
Assignments business research report final draft : Facebook Business Research Report Final Draft. Please share an example of a report on a trend in business that you've observed, and highlight at least the main

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd