Network topology, Computer Engineering

Assignment Help:

1452_network topology.png

According to the report, network 1 and network 2 are not able to reach network 3. As shown on OTBNetwork Topology above, OTB Inc. has 2 routing protocols running due transition issues. The goal is tohave only one protocol running within the network but for now the older protocol must be kept. In order toachieve full connectivity, OTB routes generated by one routing protocol must be injected into the otherone.

Step 1 - Checking the routers

You connect to R3 via console port to check its configuration. R3 is a RIPv2 speaker and a quick look atits configuration does not show anything unexpected: RIPv2 is correctly configured at R3, all R3interfaces are up but R3 learned no routes via RIPv2.

Still from R3, you issue a few pings: pings to a few PCs under network 3 and to R4's serial 0/0 interfaceare successful. Pings to R2's interfaces and to R1's interfaces fail.

You also issue a few pings from a few PCs under network 3 towards a few PCs under network 1 but all ofsuch pings fail.

A quick look into R3's routing table reveals it has no default route or routes to the EIGRP side of OTB'snetwork. Since R3's configuration is correct, you assume some router was incorrectly configured andthus, wrongly advertising routes.

Since R3 is not learning routes from the EIGRP side, you decided to check EIGRP configuration into theEIGRP routers. You move to the EIGRP side, switch the console cable to R1 and check its configuration.

Once more, the configuration is correct: all R1's interfaces are up, EIGRP is correctly configured and R1has EIGRP routes installed into its routing table. R1 has a default route pointing to R4's fa0/0 which waslearnt via EIGRP from R4.

R1 also has EIGRP routes to network 3 (192.168.3.0/24). Such routes were learnt from R4 and areflagged as external EIGRP routes.

Question:

What is the meaning of an EIGRP External Route?

Question:

How are EIGRP external routes identified?

Question:

What is Two-Way Redistribution?


Related Discussions:- Network topology

What is the use of status command, What is the use of status command, data ...

What is the use of status command, data output command, and data input command. A status command is used to test a variety of status conditions in the interface and the periphe

Define windows authentication, Windows Authentication This provider uti...

Windows Authentication This provider utilizes the authentication capabilities of IIS. After IIS completes its authentication, ASP.NET uses the authenticated identity's token to

Numbers of students must be integer, A school district has I neighbourhoods...

A school district has I neighbourhoods, J schools and G grades at every school. Every school j has a capacity of C jg for grade g. In every neighbourhood i, the student population

What is unique port number, Q. What is Unique port number? A port is an...

Q. What is Unique port number? A port is an extra 16-bit number which uniquely identifies particular service on any given machine on Internet. Port numbers are 16 bit wide, con

Luminous Jewels - The Polishing Game, Byteland county is very famous for lu...

Byteland county is very famous for luminous jewels. Luminous jewels are used in making beautiful necklaces. A necklace consists of various luminous jewels of particular colour. Nec

Explain about interrupt procedure, Q. Explain about Interrupt Procedure? ...

Q. Explain about Interrupt Procedure? The interrupt procedure uses request header to conclude the function requested by DOS. It also performs all functions for device driver. T

What is the need of interrupt controller, What is the need of interrupt con...

What is the need of interrupt controller?  The interrupt controller is employed to expand the interrupt inputs. It can handle the interrupt requests from several devices and pe

Argument be passed to a subroutine in programming, How many ways can an arg...

How many ways can an argument be passed to a subroutine in programming? Ans)  An argument can be passed in two way in a programming language. They are Pass by Value and Passi

What is a parsing, what is parsin? Source programmed statements are ob...

what is parsin? Source programmed statements are observed as tokens, recognizing, building block of language the task of scanning the source statement and classifying the diff

Determine the number of lines for writing into memory, Words having 8-bits ...

Words having 8-bits are to be stored into computer memory.  The number of lines required for writing into memory are ? Ans. 8-bit words needed 8 bit data lines.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd