Network topology and design, Computer Networking

Assignment Help:

Question 1:

The following is a dump of a TCP header in hexadecimal format:

00CD0018 00000EF1 00000D5D 502200D1 01BF0010

Please answer the following two parts of questions:

Part I

1.1 What is the source port number?

1.2 What is the destination port number?

1.3 What is the sequence number?

1.4 What is the acknowledgment number?

1.5 What is the length of the header?

1.6 Which control bits are set and what do they represent?

1.7 What is the window size?

Part II

1.8 What does the last four digits '0010' of the above dump represent? What action will the destination node take when it receives this packet?

Question 2:

Based on the output from the "show cdp neighbours" command please draw the topology.

Show connections between devices and label the interfaces.

Question 3:

An organization is assigned the network number 172.17.0.0/16, and it must create a set of subnets that supports variable amount of hosts on each subnet. The topology is shown as following figure.

Please use VLSM to design and answer the following questions:

3.1 Define subnet masks (or extended prefix length) for the LANs in this organization

3.2 Write the usable IP range for each Subnet.

3.3 Write explicitly IP address of the host number 68 on the LAN5 explicitly in binary and decimal notation.

3.4 What is the broadcast address for the LAN4?

3.5 Setup and configure the network you designed above using the Packet Tracer router simulator.

a) with RIP v1

b) with RIPv2

Show the routing table for Router 1 after the network is fully converged. Your table should include the route, routing protocol route learned from/or directly connected interface, next hop router address, and metric (bandwidth measured in kbps for metric if appropriate) that are used.

c) Explain why there is no successful connectivity between different subnets when using

RIPv1

3.6 By using RIPv2 protocol, set up one PC in LAN1 and another PC in LAN6. Test the connectivity between them. Based on your observation please give an explanation of the ping process from PC in LAN1 to PC in LAN6 and the routing table lookup progress on R1.


Related Discussions:- Network topology and design

Format of hardware address, FORMAT OF HARDWARE ADDRESS:    It have ...

FORMAT OF HARDWARE ADDRESS:    It have of a numeric value and its size is chosen for specific network technology. The length of the message format is one to six bytes.

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Explain the term data routing functions, Data Routing Functions The dat...

Data Routing Functions The data routing functions are functions that when executed set the path between source and destination. In dynamic interconnection networks there may be

Error correcting code - hamming code, Error Correcting Code - Hamming Code:...

Error Correcting Code - Hamming Code: Hamming code is the one of the error-correcting code named after its inventor. Because of the simplicity of the hamming code, it can dete

Networks edge and technologies - computer networks , Networks Edge  and Te...

Networks Edge  and Technologies Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network

Dns tunneling – domain name server, DNS Tunneling – Domain Name Server ...

DNS Tunneling – Domain Name Server "If, on one system, it is possible to transmit bits to another in any form, and in turn receive a reply as a result of that transmission, th

How two adjacent layers communicate in a layered network, How two adjacent ...

How two adjacent layers communicate in a layered network? (or What do you mean by Service Access Point?) In layered network, each layer has lots of entities and entities of lay

Fiber optic extension, FIBER OPTIC EXTENSION:  The LAN extension using f...

FIBER OPTIC EXTENSION:  The LAN extension using fiber optic is given in the figure below:   Figure The fiber-modem translates digital data into pulses of light the

Define the term socks- network security, Define the term Socks- Network sec...

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd