Network topology, Computer Engineering

Assignment Help:

1452_network topology.png

According to the report, network 1 and network 2 are not able to reach network 3. As shown on OTBNetwork Topology above, OTB Inc. has 2 routing protocols running due transition issues. The goal is tohave only one protocol running within the network but for now the older protocol must be kept. In order toachieve full connectivity, OTB routes generated by one routing protocol must be injected into the otherone.

Step 1 - Checking the routers

You connect to R3 via console port to check its configuration. R3 is a RIPv2 speaker and a quick look atits configuration does not show anything unexpected: RIPv2 is correctly configured at R3, all R3interfaces are up but R3 learned no routes via RIPv2.

Still from R3, you issue a few pings: pings to a few PCs under network 3 and to R4's serial 0/0 interfaceare successful. Pings to R2's interfaces and to R1's interfaces fail.

You also issue a few pings from a few PCs under network 3 towards a few PCs under network 1 but all ofsuch pings fail.

A quick look into R3's routing table reveals it has no default route or routes to the EIGRP side of OTB'snetwork. Since R3's configuration is correct, you assume some router was incorrectly configured andthus, wrongly advertising routes.

Since R3 is not learning routes from the EIGRP side, you decided to check EIGRP configuration into theEIGRP routers. You move to the EIGRP side, switch the console cable to R1 and check its configuration.

Once more, the configuration is correct: all R1's interfaces are up, EIGRP is correctly configured and R1has EIGRP routes installed into its routing table. R1 has a default route pointing to R4's fa0/0 which waslearnt via EIGRP from R4.

R1 also has EIGRP routes to network 3 (192.168.3.0/24). Such routes were learnt from R4 and areflagged as external EIGRP routes.

Question:

What is the meaning of an EIGRP External Route?

Question:

How are EIGRP external routes identified?

Question:

What is Two-Way Redistribution?


Related Discussions:- Network topology

Rule in a single direction - equivalences rules, Rule in a single direction...

Rule in a single direction - equivalences rules: Hence there the power to replace  sub expressions always allows use to prove theorems with equivalences: as given in the above

Explain what the difference between the two readings, The following sentenc...

The following sentences have a (potential) scope ambiguity. Give two translations into predicate logic for each sentence (one formula for each reading), and explain in words what t

Rdbms relational database system, RDBMS relational database system - Re...

RDBMS relational database system - Relational databases are composed of relations and managed through relational operations, and governed through data integrity constraints.

Set up the minunit test framework - mortgage code, Set up the minunit test ...

Set up the minunit test framework examples in your environment (i.e. build or compile the code). Once you can run the example, use the minunit test framework to create and run a bo

What is double entry - verification, What is Double entry - Verification ...

What is Double entry - Verification In this approach, data is entered twice (using two different people); data is only accepted if both versions match up. Generally used to ve

Optical storage - computer architecture, Optical storage - computer archite...

Optical storage - computer architecture: Optical storage, the distinctive Optical disc, stores information in deformities on the surface of a circular disc and reads this info

Describe about the digital cameras, Describe about the Digital cameras ...

Describe about the Digital cameras The microprocessor would be used to control the below functions, for instance: - shutter speed - lens focus - Flash - Aperture (l

At least two optional data fields, As an XML expert you are needed to model...

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information: The detail of th

Explain token ring, Explain Token Ring. Token Ring: A token ring is ...

Explain Token Ring. Token Ring: A token ring is a collection of single point -to-point links, which arise from a circle. In a token ring a special bi t pattern, termed as th

Different ways in which a thread can be cancelled, What are the different w...

What are the different ways in which a thread can be cancelled?  Cancellation of a target thread may occur in two different scenarios: Asynchronous cancellation: One thre

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd