What is being constrained and how

Assignment Help Computer Networking
Reference no: EM133702156

TCP/IP Principles and Protocols

Assignment

Question 1 Routing table and packet delivery

The figure below shows the configuration of a hypothetical section of the Internet. Assume that all routers have fully updated tables.

1995_Routing table.jpg

 

Construct the routing table of routers Adelaide and Sydney. Write the masks in dotted-decimal format and list in longest-mask order.

A packet arrives at the Hobart Router with the destination address 140.40.120.10. Explain the steps that the router takes to determine where next to forward this packet. What was the Router's forwarding decision? Show the Router's calculations for at least one of the table entries other than the default.

Question 2. Routing Protocol Configuration

For this question, open the file Assignment_Two_Q2.pkt.
All ports on all devices in the network are pre-configured with IP addresses. However, no routing protocol has been configured in the routers.
Configure RIP version 2 routing protocol in both routers and test the connectivity of the network by pinging from the East router to one of the PCs in Headquarters. Save this as a screenshot. Save the changed pkt file as ‘your-student-ID-Q2.pkt' and submit this file - it must have functional routing (e.g., if tested in a ping by the marker) to receive full marks. Use the CLI (Command Line Interface) to display the routing table (do for both routers) and save them in a screenshot. Include all screenshots in the Assignment2-answer-template_T1_2024.docx file.

Type the CLI commands you used to configure RIPv2 in both (HQ and East Branch) routers into the Assignment2-answer-template_T1_2024.docx file.

Question 3. DHCP Configuration

For this question, open the file Assignment_Two_Q3.pkt.
The PCs in this file are not configured yet i.e. they have no IP set up, static or otherwise.

Configure DHCP in both routers (HQ and East Branch) for the networks listed below.
(4 marks)
HQ router:

141.14.0.0
141.14.64.0

East Branch router:

192.168.1.0
192.168.2.0

Type the CLI commands you have used in both (HQ and East Branch) routers for DHCP implementation into Assignment2-answer-template_T1_2024.docx as your answer and submit.

After configuring DHCP, configure the PCs to obtain their IP address through DHCP. Then test the network's DHCP configuration by sending a packet from one host to another. Take a screenshot that demonstrates a successful transmission and include it in your Assignment2-answer-template_T1_2024.docx. Save your packet tracer file as your_student_ID-Q3.pkt' (replace "your_student_ID" with your student ID) and submit it.

Question 4. Research Questions on IoT Protocols

Study the two articles in Week 10 about IoT protocols focusing on basic functions and purposes. You may also engage with other literature as necessary. Then discuss the protocols by answering the following three questions.

Three main IoT protocols were discussed in the articles: The CoAP (Constrained Application Protocol), MQTT (Message Queuing Telemetry Transport) and XMPP (Extendible Message Persistent Protocol). In your own words, discuss the core purpose and function of each of these protocols. Your discussion should clearly explain why each protocol was named such. For example, why is CoAP called the "Constrained Application Protocol" - what is being constrained and how? Deep technical discussion is not required in this answer, rather you need to demonstrate a basic grasp of the concept behind each protocol.

Discuss the circumstances or scenarios in which each of the above protocols could be beneficial to use - for example when would it be better to use MQTT rather than XMPP, or what difference does it make?

Regarding the issue of whether IoT protocols should be standardised, there is more written about the advantages of standardising, than on the disadvantages of doing so. In your view, what might be some disadvantages of standardising IoT protocols? Based on that do you think IoT protocols should be standardised? Give reasons for your thoughts.

You should structure your report into a section for each of the above parts. There is no minimum/maximum length of the report. Support your assertions or conclusions by quoting reputable sources of information. You may include pictures or diagrams, but they must be relevant and must directly support your writing. Assume an audience with a similar background in networking as you. Your writing should demonstrate that you understand the main concepts and issues. Technical depth and expertise is not expected.

Reference no: EM133702156

Questions Cloud

Which approach do you think is a more accurate description : Horney and Fromm revised Freud's theory by emphasizing. Which approach do you think is a more accurate description of human beings, and why do you think so?
History of hypertension treated with lisinopril : A 65-year-old man presents to the office for his annual physical. He has a 10-year history of hypertension treated with lisinopril.
Implications regarding the antiplatelet drug clopidogrel : The nurse knows which of the following are correct nursing implications regarding the antiplatelet drug Clopidogrel
Good health and reports no symptoms : A 61-year-old woman presents to the clinic for a wellness exam in October. She is in good health and reports no symptoms.
What is being constrained and how : COIT12206 TCP/IP Principles and Protocols, CQ University - Discuss the circumstances or scenarios in which each of the above protocols could be beneficial
Woman presents with mild lower back pain : An overweight 63-year-old woman presents with mild lower back pain. She has a history of two normal vaginal deliveries and hypertension
How do you prevent medical emergencies in a dental office : How do you recognize persons at high risk for a medical emergency? how do you prevent medical emergencies in a dental office?
Boy presents to clinic for follow-up of cough : A 12-year-old boy presents to clinic for follow-up of cough. His father reports patient has history of asthma and in the past had used an albuterol inhaler
Analyze the event and your feelings about the event : What happened? Analyze the event and your feelings about the event. Summarize your past learning process (actions and feelings).

Reviews

Write a Review

Computer Networking Questions & Answers

  Risk and control self-assessment

Identify approaches on how to plan for threats and events that could potentially cause disruptions.

  Define and describe the model including the seven layers

question 1 define and explain the model including the seven layers for the isoosi network reference model.question 2

  What is the application layer primarily concerned

With what is the Application layer primarily concerned and what is the broadcast address of the subnet address 178.55.20.88 255.255.0.0?

  Clusters can be implemented by leveraging most of the

clusters can be implemented by leveraging many operating systems and applications. in a report of 1-2 pages complete

  What are some of the major strategies behind implementing

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

  Discuss routing in the internet and other networks

One of the most important functions (protocols) in a packet-switched network is ROUTING. An array of routing algorithms have been invented, and many of them implemented.

  Identify and briefly explain any four key requirements

An organization called Ranbaxy Inc. has currently 3 divisions in 3 different locations within Sydney city. One of the divisions serves as the company headquarters.

  Network design topology - implement it in packet tracer

Network Technologies Assignment – Network Comprehension - business function as defined in the network design topology document

  Analytics professionals are able to run deep learning

Analytics professionals are able to run deep learning applications via the browser as the algorithms use hardware platforms accessed via the cloud to provide

  A company is interested in upgrading its current core

a company is interested in upgrading its current core infrastructure which comprises 2 100mbps switches which connect

  Discuss with the stakeholders about the requirements

Discuss with the stakeholders about the requirements of the network server. You need to elaborate the requirements for the network server for the organisation

  Which vpn service would be best for your own personal use

Using the Internet, locate TWO companies that provide VPN services. Compare the TWO different services offered. Include their services, pricing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd