Why are different inter-as and intra-as protocols

Assignment Help Computer Networking
Reference no: EM133001793

Active class 7: Who is Instructing What

The learning objective of this class is to learn about routing and routing algorithms.

At the end of this activity, you should be able to:
1. Explain the control plane operation of the Network layer
2. Build a simple network in Cisco Packet Tracer and simulate static routing and dynamic routing.
This class activity is designed to be worked through active participation and collaborating with peers under the guidance of the teaching team in the class. The active classes are designed to be interactive, and they are here for you to extend your learning. However, these classes will only help you to enhance your learning if you come prepared.

Activity 1: Routing
This is a group activity. Therefore, you need to form a group of four (4) or five (5) people. At your table (or in MSTeams chat) discuss the following questions and conduct the role play with your group members. Remember to take notes as they will help you prepare your task submissions and complete other activities.

1. Assume your network has two routers and a separate LAN connects to each router as shown in the following figure.

2487_figure.jpg

2. Now we are ready to do a role play. Two group members are acting as LANs (one member for each LAN). They are responsible for all the PC's connected to their corresponding LAN. Two group members (or one member) are acting as data plane of Router 0 and Router 1. The remaining member is acting as the control plane of both routers.

3. Now assume PC1 wants to send a message to PC3, you need to work together to support the request. Each device needs to list your configurations.

4. Discuss the responsibilities of the control plan of the routers. Tips: How router 0 knows about the LAN 2 and router 1

5. You are going to use these discussions for Activity 2 and 3.

Activity 2: Putting what you have learned into practice using Cisco Packet Tracer.

Now it's time to implement your network in Cisco Packet Tracer. Make sure to take screenshots of the networks you build, analysis, and verifications.
1. Open the packet tracer and implement the following network as a group and make sure to use Activity 1 discussions to configure each device in the network.
a. You need to make sure PC1, PC3 and PC5 can communicate with each other. Tip: You need to add static routing to each router now.
b. Verify that PC1 can communicate with both PC3 and PC5 using PING command and simulations.

199_figure1.jpg

2. Now, add another serial connection between Router 1 and 3 and remove the direct connectivity between router 2 and 3.

2420_figure2.jpg

a. Discuss what changes now you need to make to enable the communication between PC1 and PC5 (Tip: what static routes you need to add).

b. Implement the changes and verify that PC1 and communicate with PC5 using PING command and simulations.

Activity 3: Alternative for Static Routing

In activity 2, you have noticed that you need to make changes in routers every time there is a change in the connection. Discuss the following with the group members.

1. Is there any alternative to stop manually configuring the routing table every time the connectivity changes?

2. What are the latest routing algorithms you can use?

3. Is there any routing algorithm available in Cisco Packet Traces?

4. Implement the same network as shown in the following figure. However, this time make sure to use the routing algorithm available in the routers that you use.

937_figure3.jpg

5. Verify the network connections using PING (in each PC).

6. Use the simulation tool to send a packet from PC1 to PC5. Have you seen any differences compared to the route you have seen in Activity 2? Explain what happened.

7. Now remove the connection between router 1 and 3 and use the simulation tool to send a packet from PC1 to PC5 without changing any configuration.

8. Explain what you observed.

Active class 8: Internet is Full of Network Protocols

The learning objective of this class is to learn the role of Network Address Translation (NAT) protocol, Dynamic Host Configuration Protocol (DHCP) and Internet Control Message Protocol (ICMP) which are (perhaps considered as) significant network layer protocols.
At the end of this activity, you should be able to:

1. Explain the functionalities of the mentioned protocols

2. Build a simple network and analyse the protocols.

Activity 1: Group Discussion.

It is predicted that we will have 50 billion IoT devices in our networks soon. Yes, just IoT devices! If you think about this, most devices need an IP address to communicate with the network. Discuss the following questions with your group members.

1. Do we have enough IP addresses to assign for each device that connect to the network?

2. Do we have any solution?

3. Explain a protocol that we can use along with IPv4 to conserve the global IP address space?

Activity 2: Who does assign an IP address when your computer connects to the network?

This is the role of DHCP. First, we are going to do a small role play to mimic DHCP. Each member of the group has a role to play. Assume your group is your local area network (LAN). For example, you could consider a LAN at home or at Campus or at your workplace.

1. One group member can act as a router with a DHCP server and other three members are host devices that try to connect to the network. These host devices could be a PC, a printer, and network storage device. A sample network is shown in the below figure.

690_figure4.jpg

2. Assume the all the devices are physical connected as shown in the above figure. Now, your job is to set up the network and establish the connections with the router using DHCP. Each member needs to send/ respond with the correct message and message sequence to establish the connections and receive IP address for each host.

3. Draw a timing diagram to indicate the sequence of messages transferred between devices.

4. Next, we are going to implement a DHCP server in Cisco packet tracer and check the DHCP in action. Make use to take screenshots of the networks you build, analysis, and verifications. Open the packet tracer and implement the following network. You may need to use the same model of the devices shown in the diagram. Today, we are not going to use static IP configuration for the hosts as we are going to check the DHCP in action. Tips: You need to add a module with a fast ethernet port to the router, so that the router can support three LANs as shown in the below network diagram.

1286_figure5.jpg

a. Set up the DHCP server by configuring network pools, default gateway, and IP address (use the subnets mentioned in the diagram).
b. Set up the router by configuring the interfaces and DHCP (use the subnets mentioned in the diagram).
c. Set up each host with DHCP to obtain IP configuration and verify the IP address and the default gateway configured.
d. Verify the connectivity between each host in the network.

Activity 3: ICMP
In this activity, we are going to use Cisco Packet tracer's simulation tool to explore ICMP. To do this, you are going to use the network that you have implemented in Activity 2.

1. Use the Simulation mode and send a simple packet from one host (Host A) from LAN1 to another host (Host B) in LAN2. In simulation tool, you can run the simulation step by step. When you go through each step, pay attention to the type of the message passed (highlighted in the below figure).

2. You may notice when Host A ping Host B, we use ICMP protocol. Double click on one entry as shown below to explore the ICMP message,


3. You should be able to view the packet details as follows.

4. Explain what information you can find in "outbound PDU details".

5. Have a closer look at the ICMP message format. Can you identify the type of ICMP message and specific information is in there (type and code)? You can refer to RFC792 for more help. https://datatracker.ietf.org/doc/html/rfc792
6. Can you identify the changes in ICMP message when you use a traceroute from Host A to Host B compared to what you have witnessed in the above question? Note that you can use tracert command in each device (in command prompt) similar to the way that ping command is used.

Above and Beyond Tasks:

Those who are targeting for Credit and above can complete the following task as part of Task 4.1C and 5.2D to demonstrate your deeper understanding on network layer.

1. Analyze DHCP in Wireshark (you may want to disconnect your wireless connection and connect it again whilst capturing the packets). You can show the sequence of DHCP messages and the details of those messages.
2. Why are different inter-AS and intra-AS protocols used in the Internet? What are the examples of these two different types of routing protocols?

Attachment:- Protocols.rar

Reference no: EM133001793

Questions Cloud

Prepare surfing journal entries for the land : Surfing Corporation purchased land and a building. Prepare Surfing's journal entries for the land, building, and note payable on the January 1, 2020 dates.
What is its weighted average cost of capital : After effective taxes, Clifford Chance's effective tax rate is 20%. If Clifford Chance's beta is estimated at 1.4, what is its weighted average cost of capital
What is the interest earned for the first compounding period : Beginning Balance $535.00 Interest is 8 %, compounded 3times per year. What is the interest earned for the first compounding period.
What has taken the place of cash in the transactions : The use of cash for transactions by individuals and business has steadily been decreasing. What has taken the place of cash in these transactions?
Why are different inter-as and intra-as protocols : Why are different inter-AS and intra-AS protocols used in the Internet? What are the examples of these two different types of routing protocols
What amount should be reported as vacation liability : The rate for all employees during 2019, 2020, and 2021 are P70, P75 and P80 per hour, What amount should be reported as vacation liability
Write a short analysis of the information gathered : Write a short analysis of the information gathered. Your discussion should address, among other things, whether cash flow from operating activities
What amount should be reported as vacation pay expense : Pre-2020 accrued vacations used during January 1 - September 30, 2020 250,000. What amount should be reported as vacation pay expense
What is cost of goods sold using variable costing : What is cost of goods sold using variable costing? Laramie Manufacturing produces snow shovels. The selling price per snow shovel is $ 29.00.

Reviews

len3001793

9/30/2021 2:45:24 AM

Secure networking task The "exercises" and "reflections" given in the first five files need to be done. For the last two files (class7 and class8) these are the active classes. These exercises need to be done according to the questions in the file(class7 and 8). and also provide short reflections for the active classes that are done. In the end, the submission should contain both exercises(and active class exercises included) and reflections(also including the reflections of the active class exercises mentioned above).

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd