Network topology and design, Computer Networking

Assignment Help:

Question 1:

The following is a dump of a TCP header in hexadecimal format:

00CD0018 00000EF1 00000D5D 502200D1 01BF0010

Please answer the following two parts of questions:

Part I

1.1 What is the source port number?

1.2 What is the destination port number?

1.3 What is the sequence number?

1.4 What is the acknowledgment number?

1.5 What is the length of the header?

1.6 Which control bits are set and what do they represent?

1.7 What is the window size?

Part II

1.8 What does the last four digits '0010' of the above dump represent? What action will the destination node take when it receives this packet?

Question 2:

Based on the output from the "show cdp neighbours" command please draw the topology.

Show connections between devices and label the interfaces.

Question 3:

An organization is assigned the network number 172.17.0.0/16, and it must create a set of subnets that supports variable amount of hosts on each subnet. The topology is shown as following figure.

Please use VLSM to design and answer the following questions:

3.1 Define subnet masks (or extended prefix length) for the LANs in this organization

3.2 Write the usable IP range for each Subnet.

3.3 Write explicitly IP address of the host number 68 on the LAN5 explicitly in binary and decimal notation.

3.4 What is the broadcast address for the LAN4?

3.5 Setup and configure the network you designed above using the Packet Tracer router simulator.

a) with RIP v1

b) with RIPv2

Show the routing table for Router 1 after the network is fully converged. Your table should include the route, routing protocol route learned from/or directly connected interface, next hop router address, and metric (bandwidth measured in kbps for metric if appropriate) that are used.

c) Explain why there is no successful connectivity between different subnets when using

RIPv1

3.6 By using RIPv2 protocol, set up one PC in LAN1 and another PC in LAN6. Test the connectivity between them. Based on your observation please give an explanation of the ping process from PC in LAN1 to PC in LAN6 and the routing table lookup progress on R1.


Related Discussions:- Network topology and design

Define v - 32 modem, Q. Define V - 32 modem? - ITU-T's V.32 standard w...

Q. Define V - 32 modem? - ITU-T's V.32 standard was issued in 1989 for asynchronous and full-duplex operation at 9600 bps. - Even though designed for asynchronous DTEs two

Roles of host system, Q.Role of Host System? Hosts on OSI implementatio...

Q.Role of Host System? Hosts on OSI implementations don't handle network operations (simple terminal) but TCP/IP hosts participate in most network protocols. TCP/IP hosts do su

What are major types of networks and explain, What are major types of netwo...

What are major types of networks and explain? Server-based network: Give centralized control of network resources and depend on server computers to give security and network

Failure reporting and analysis, 1. A systematic study of failures will help...

1. A systematic study of failures will help in identifying areas that may cause :   i.  Loss of adjacent parts/ equipment/ whole equipment. ii.  Loss of production and rev

Explain the term- bits and bitmap, Explain teh term- Bits and Bitmap ...

Explain teh term- Bits and Bitmap Many tiny dots, which are put together to make a picture. Bits are combined to make a graphic image called a bitmap. GIF and JPEG files are

Repeater - network layer and routing, Repeater Repeater is  also named...

Repeater Repeater is  also named as active hub operates at physical  layer of OSI model. Repeater is an  electronic  device that simply regenerates the signal. Signals travell

Causes of failures, CAUSES OF FAILURES Every failure has a well-define...

CAUSES OF FAILURES Every failure has a well-defined cause.  Any system or device has an inherent strength or capacity to resist failures. This depends on design, material, man

What is nos, What is NOS? NOS, or Network Operating System, are special...

What is NOS? NOS, or Network Operating System, are specialized software whose major task is to give network connectivity to a computer in order for it to be able to converse wi

Give the solutions to the threats, Give the solutions to the threats In...

Give the solutions to the threats In order to implement solutions to the threats, it is advisable that the company should maintain proper password protected hardware. Wherever

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd