Network topology and design, Computer Networking

Assignment Help:

Question 1:

The following is a dump of a TCP header in hexadecimal format:

00CD0018 00000EF1 00000D5D 502200D1 01BF0010

Please answer the following two parts of questions:

Part I

1.1 What is the source port number?

1.2 What is the destination port number?

1.3 What is the sequence number?

1.4 What is the acknowledgment number?

1.5 What is the length of the header?

1.6 Which control bits are set and what do they represent?

1.7 What is the window size?

Part II

1.8 What does the last four digits '0010' of the above dump represent? What action will the destination node take when it receives this packet?

Question 2:

Based on the output from the "show cdp neighbours" command please draw the topology.

Show connections between devices and label the interfaces.

Question 3:

An organization is assigned the network number 172.17.0.0/16, and it must create a set of subnets that supports variable amount of hosts on each subnet. The topology is shown as following figure.

Please use VLSM to design and answer the following questions:

3.1 Define subnet masks (or extended prefix length) for the LANs in this organization

3.2 Write the usable IP range for each Subnet.

3.3 Write explicitly IP address of the host number 68 on the LAN5 explicitly in binary and decimal notation.

3.4 What is the broadcast address for the LAN4?

3.5 Setup and configure the network you designed above using the Packet Tracer router simulator.

a) with RIP v1

b) with RIPv2

Show the routing table for Router 1 after the network is fully converged. Your table should include the route, routing protocol route learned from/or directly connected interface, next hop router address, and metric (bandwidth measured in kbps for metric if appropriate) that are used.

c) Explain why there is no successful connectivity between different subnets when using

RIPv1

3.6 By using RIPv2 protocol, set up one PC in LAN1 and another PC in LAN6. Test the connectivity between them. Based on your observation please give an explanation of the ping process from PC in LAN1 to PC in LAN6 and the routing table lookup progress on R1.


Related Discussions:- Network topology and design

Routers - network layer and routing , Routers The network  layer (also ...

Routers The network  layer (also  called layer3) manages device  addressing  tracks the location  of devices on the network  and determines  the best  way to  move data. Which

Layer, what is end to end and host to host?

what is end to end and host to host?

Explain priority and reservation of token passing, Priority and Reservation...

Priority and Reservation Higher priority stations may possibly access the token sooner Each station has a priority code Since token passes by station waiting to t

What is the full form of FDM and TDM, What is the full form of FDM and TDM ...

What is the full form of FDM and TDM It is both. Each of the 100 channels is possess its own frequency band (FDM), and on every channel two logical streams are intermixed by th

Show the seven layers of iso''s osi model, Q. Show the seven layers of ISO'...

Q. Show the seven layers of ISO's OSI model? Ans:- The seven layers are given below:   -  Application Layer -  Presentation Layer -  Session Layer -  Transport Laye

Command to configure a explanation on an interface, Recognize the command t...

Recognize the command to configure a explanation on an interface Ans) Router(config-if)# explanation Finance department

Responses - application layer, Responses Responses  are sent  from the...

Responses Responses  are sent  from the  server to the client. A responses is a three  digit code that  may be followed by additional textual information.

Vpn technology - point to point , VPN Technology For an organization  ...

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

Describe the datawarehouse and data mining, Question 1: ‘There is an ov...

Question 1: ‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advant

Disadvantages - point to point , Disadvantages You typically  would  no...

Disadvantages You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages. a. Low securit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd