What is being constrained and how

Assignment Help Computer Networking
Reference no: EM133702156

TCP/IP Principles and Protocols

Assignment

Question 1 Routing table and packet delivery

The figure below shows the configuration of a hypothetical section of the Internet. Assume that all routers have fully updated tables.

1995_Routing table.jpg

 

Construct the routing table of routers Adelaide and Sydney. Write the masks in dotted-decimal format and list in longest-mask order.

A packet arrives at the Hobart Router with the destination address 140.40.120.10. Explain the steps that the router takes to determine where next to forward this packet. What was the Router's forwarding decision? Show the Router's calculations for at least one of the table entries other than the default.

Question 2. Routing Protocol Configuration

For this question, open the file Assignment_Two_Q2.pkt.
All ports on all devices in the network are pre-configured with IP addresses. However, no routing protocol has been configured in the routers.
Configure RIP version 2 routing protocol in both routers and test the connectivity of the network by pinging from the East router to one of the PCs in Headquarters. Save this as a screenshot. Save the changed pkt file as ‘your-student-ID-Q2.pkt' and submit this file - it must have functional routing (e.g., if tested in a ping by the marker) to receive full marks. Use the CLI (Command Line Interface) to display the routing table (do for both routers) and save them in a screenshot. Include all screenshots in the Assignment2-answer-template_T1_2024.docx file.

Type the CLI commands you used to configure RIPv2 in both (HQ and East Branch) routers into the Assignment2-answer-template_T1_2024.docx file.

Question 3. DHCP Configuration

For this question, open the file Assignment_Two_Q3.pkt.
The PCs in this file are not configured yet i.e. they have no IP set up, static or otherwise.

Configure DHCP in both routers (HQ and East Branch) for the networks listed below.
(4 marks)
HQ router:

141.14.0.0
141.14.64.0

East Branch router:

192.168.1.0
192.168.2.0

Type the CLI commands you have used in both (HQ and East Branch) routers for DHCP implementation into Assignment2-answer-template_T1_2024.docx as your answer and submit.

After configuring DHCP, configure the PCs to obtain their IP address through DHCP. Then test the network's DHCP configuration by sending a packet from one host to another. Take a screenshot that demonstrates a successful transmission and include it in your Assignment2-answer-template_T1_2024.docx. Save your packet tracer file as your_student_ID-Q3.pkt' (replace "your_student_ID" with your student ID) and submit it.

Question 4. Research Questions on IoT Protocols

Study the two articles in Week 10 about IoT protocols focusing on basic functions and purposes. You may also engage with other literature as necessary. Then discuss the protocols by answering the following three questions.

Three main IoT protocols were discussed in the articles: The CoAP (Constrained Application Protocol), MQTT (Message Queuing Telemetry Transport) and XMPP (Extendible Message Persistent Protocol). In your own words, discuss the core purpose and function of each of these protocols. Your discussion should clearly explain why each protocol was named such. For example, why is CoAP called the "Constrained Application Protocol" - what is being constrained and how? Deep technical discussion is not required in this answer, rather you need to demonstrate a basic grasp of the concept behind each protocol.

Discuss the circumstances or scenarios in which each of the above protocols could be beneficial to use - for example when would it be better to use MQTT rather than XMPP, or what difference does it make?

Regarding the issue of whether IoT protocols should be standardised, there is more written about the advantages of standardising, than on the disadvantages of doing so. In your view, what might be some disadvantages of standardising IoT protocols? Based on that do you think IoT protocols should be standardised? Give reasons for your thoughts.

You should structure your report into a section for each of the above parts. There is no minimum/maximum length of the report. Support your assertions or conclusions by quoting reputable sources of information. You may include pictures or diagrams, but they must be relevant and must directly support your writing. Assume an audience with a similar background in networking as you. Your writing should demonstrate that you understand the main concepts and issues. Technical depth and expertise is not expected.

Reference no: EM133702156

Questions Cloud

Which approach do you think is a more accurate description : Horney and Fromm revised Freud's theory by emphasizing. Which approach do you think is a more accurate description of human beings, and why do you think so?
History of hypertension treated with lisinopril : A 65-year-old man presents to the office for his annual physical. He has a 10-year history of hypertension treated with lisinopril.
Implications regarding the antiplatelet drug clopidogrel : The nurse knows which of the following are correct nursing implications regarding the antiplatelet drug Clopidogrel
Good health and reports no symptoms : A 61-year-old woman presents to the clinic for a wellness exam in October. She is in good health and reports no symptoms.
What is being constrained and how : COIT12206 TCP/IP Principles and Protocols, CQ University - Discuss the circumstances or scenarios in which each of the above protocols could be beneficial
Woman presents with mild lower back pain : An overweight 63-year-old woman presents with mild lower back pain. She has a history of two normal vaginal deliveries and hypertension
How do you prevent medical emergencies in a dental office : How do you recognize persons at high risk for a medical emergency? how do you prevent medical emergencies in a dental office?
Boy presents to clinic for follow-up of cough : A 12-year-old boy presents to clinic for follow-up of cough. His father reports patient has history of asthma and in the past had used an albuterol inhaler
Analyze the event and your feelings about the event : What happened? Analyze the event and your feelings about the event. Summarize your past learning process (actions and feelings).

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd