Implement a link-state routing protocol

Assignment Help Computer Networking
Reference no: EM131428319

Question 1

(a) Routing Information Protocol (RIP) uses User Datagram Protocol (UDP) in the transport layer and it is considered as a connectionless and unreliable protocol. In this situation, how does RIP ensure the reliability and consistency of the routing updates between routers?

(b)

2479_Figure1.jpg

Figure 1(b)

The HQ and the Branch of ABC Corporation are connected through a private WAN (cloud) using leased line as well as via the Internet for backup as shown in Figure 1(b).

i. Identify the type of routing used between the routers and the Branch that facilitates high availability and also prevents layer-3 looping.

ii. Justify your proposed solution and explain its working principle.

iii. Explain the disadvantage of your proposed solution if any.

Question 2

(a) You have been assigned to manage an enterprise network and you found that the network performance is poor due to the faulty switch (Cisco) in the switching rack and it is replaced with new one (Juniper) as shown in Figure - 2(a). The existing switches were configured with Inter Switch Protocol.

488_Figure2.jpg

Figure 2(a)

There are six VLANs in this switching rack and all VLANs should be able to communicate with each other.

i. Propose an appropriate solution to establish the full connectivity of the network.

ii. Discuss a solution to resolve the problems you identified in part i., explaining fully your solution.

(b)

1069_Figure3.jpg

Figure 2(b)

All routers shown in Figure 2(b) are enabled with Open Shortest Path First (OSPF) with default settings. Router-A learns the network 10.0.0.0 via routers B, C and D.

i. Analyze and explain the operational problems involved in building a topology table to establish a route from router-A to the network 10.0.0.0.

ii. Propose your solution to solve the problems and explain the result of your proposed solution.

(c) As a network administrator, evaluate the situations in which you would choose to use the distance vector routing protocols.

SECTION B

Answer ANY TWO (2) of the THREE (3) questions in this section. All questions carry equal marks.

Question 3

(a) Your organization has decided to upgrade the network and also implement a link-state routing protocol and you are assigned to carry out this task. As a network administrator, evaluate the requirements of routing devices that are important to implement the link state protocol.

(b) Using the Bellman Ford algorithm, construct the routing table for router B in Figure 3(b)".

2077_Figure4.jpg

Figure 3(b) Use Table-3(b) to create the routing table.

Network Exit interface Next Hop Address Hop Count Administrative Distance

Table-3(b)

Network

Exit interface

Next Hop Address

Hop Count

Administrative Distance

(c)

2277_Figure5.jpg

Figure - 3(c)

A default static route is configured on the core router that provides access to the Internet. Within the organization, Open Shortest Path First (OSPF) is used for routing with private IP addressing. Choose and explain an appropriate routing technique that provides the complete Internet connectivity.

(d)

SW1#show interfaces fastEthernet 0/1 switchport

Switchport: Enabled

Administrative Mode: trunk Operational Mode: trunk

Operational Trunking Encapsulation: dot1q Negotiation of Trunking: On

Access Mode VLAN: 99

Trunking Native Mode VLAN: 1 (default)

Trunking VLANs Enabled: ALL Pruning VLANs Enabled: 2-1001 Capture Mode Disabled

Capture VLANs Allowed: all Protected: false

Appliance trust: none

SW2#show interfaces fastEthernet 0/1 switchport

Switchport: Enabled

Administrative Mode: access Operational Mode: trunk

Operational Trunking Encapsulation: dot1q Negotiation of Trunking: On

Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Trunking VLANs Enabled: ALL

Pruning VLANs Enabled: 2-1001 Capture Mode Disabled

Capture VLANs Allowed: all Protected: false

Appliance trust: none

Figure- 3(d)

Figure - 3(d) shows the partial output of trunk link configuration between layer-2 switches SW1 and SW2. However, a trunk is still not established across the configured link. Identify any TWO (2) problems in the above configurations and provide solution(s).

Question 4

(a)

755_Figure6.jpg

Figure - 5(a)

Identify the type of routers A, B and C shown in Figure - 4(a) and explain their roles in routing.

(b)

1858_Figure7.jpg

Figure - 5(b)

When designing OSPF networks, all areas should be connected to the backbone area. However, due to topography constraint in ABC Corporation, it is possible to connect the area-2 with the area-1. You are assigned to solve this problem.

i. Propose a solution to establish the connectivity for the area-2.

ii. With the aid of diagram, explain your proposed solution.

iii. Provide the configuration of your proposed solution

(c)

475_Figure8.jpg

Figure - 4 (c)

An online trading company has dual connections to local ISP for 24/7 connectivity. A main link between HQ and A is 1.544 Mbps and a backup link between HQ and B is 512 Kbps. You are assigned to provide the routing as per the user's requirements. Assess this situation and provide a routing solution with justification.

Question 5

(a)

1586_Figure9.jpg

Figure - 5(a)

You have been assigned to configure the Gateway router to establish the connectivity to all the subnets as shown in Figure 5(a).

i. Propose the most efficient and economical solution that does not gives router overhead.

ii. Explain your proposed solution.

(b) By default, OSPF routers exchange Link State Advertisements (LSAs) by flooding them to all OSPF neighbors and this action affects the performance of the Broadcast and Non- Broadcast Multiple Access topology shown in Figure 5(b). Explain how OSPF addresses this LSA flooding problem to enhance network performance.

1237_Figure10.jpg

Figure - 5(b)

(c) A Teredo client has the address 2001::62C3:1B8D:346B:EBC9:7C94:EA26. With reference to this IPv6 address, answer the following questions.

i. What is the external IPv4 address?
ii. What is the UDP port number for this Teredo client's traffic?

Reference no: EM131428319

Questions Cloud

What cultural values shape your beliefs : What cultural values shape your beliefs? How would you know whether you have stepped outside a cultural norm with regard to the social clock? Does a specific developmental theory support your personal views of healthy development for a young adult..
What is your monthly payment for loan a : You are buying your first home and need to get a loan for $200,000. Compare these two options: Loan A: a 30-year loan with APR of 4.2% Loan B: a 20-year loan with an APR of 3.9% (a) What is your monthly payment for Loan A?
Analyze the level of violence in the chosen children show : For this assignment, you need to watch an hour of children's television, preferably cartoons, and analyze the level of violence in the chosen children's show
Exponential and logarithmic functions : You have just come into a large sum of money! You make the wise decision to invest the money to use at a later date. Use the exponential equation to find the total amount in the investment account after a certain number of years.
Implement a link-state routing protocol : CIS3202 ROUTING PROTOCOLS AND CONCEPTS What is the external IPv4 address and what is the UDP port number for this Teredo client's traffic - Propose the most efficient and economical solution that does not gives router overhead and Explain your propo..
Compute their federal income tax : John and heather are married, filing jointly, and had a taxable income of $105.500 and a tax credit of $ 1,000 in 2013. Using the 2013 Marginal Tax Rate Table from your textbook, compute their federal income tax. (Round to the nearest whol..
What are some problems you see with enmeshment in families : The family systems perspective is unique and relevant to how families function.  One of the maladaptive consequences of a strong bond between family members is known as enmeshed boundaries. What are some problems you see with enmeshment in families
Probability that he gets four or fewer questions correct : A multiple choice test consists of six questions, each of which has five choices. Each question has exactly one correct answer. William guesses randomly at each answer. What is the probability that he gets four or fewer questions correct? (Round yo..
How you would respond to the scenario : A client comes to your office without an appointment. Write a 700- to 1,050-word APA formatted paper that includes a transcript of how you would respond to the scenario

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd