Use of a distance vector routing algorithm, Computer Networking

Assignment Help:

Question:

(a) The diagram below shows a configuration of Internet routers (A-F) which achieve dynamic routing through the use of a Distance Vector routing algorithm. The metric used is a simple hop-count (if two equal-length routes are available then the one via the lower numbered interface is chosen)

2171_OSI-based protocol of the LAN of an organization.png

The link between A and C has been broken for some time and routing has stabilised to accommodate the situation. Each router maintains a routing table like the one below:

124_OSI-based protocol of the LAN of an organization1.png

(i) Give the current routing table for Router C

(ii) Router D now discovers that the link between B and D has broken. Immediately after this (i.e. before D has reported the fact to any other routers), D receives distance vectors from C and F based on their current routing tables. Clearly outline the reasoning that D would use in calculating its new routing table entry for node A following receipt of the distance vectors from C and F.

(iii) How will C's routing table for node A be amended next time it receives a distance vector from D? What problem of distance vector algorithms does this illustrate?

(iv) How is this problem handled?

(b) Bridges do not have to be manually configured. Describe how the bridge learns about the different computers connected. Assume a bridge connected to two LAN segments. Illustrate your answer using a typical filtering table.

(c) What protocol can a station operating in a TCP/IP network use to discover the IP address of a computer A when it knows only the physical address of A?

(d) Assume that the OSI-based protocol of the LAN of an organization needs to provide the services of: physical transmission, point-to-
point flow control, end-to-end delivery, data encryption and compression as well as network access interfaces. Which layers of the OSI model does this protocol need to implement?


Related Discussions:- Use of a distance vector routing algorithm

What is a binary semaphore, What is a binary semaphore? What is its u...

What is a binary semaphore? What is its use? A binary semaphore is takes only 0 and 1 as values. They are used to execute mutual exclusion and synchronize concurrent p

How to install an anti-virus program, In a network that contains two server...

In a network that contains two servers and twenty workstations, where is the best place to install an Anti-virus program? An anti-virus program must be installed on all servers

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Sequence number - transport layer, Sequence Number After  the bytes...

Sequence Number After  the bytes have been numbered TCP assigns a sequence number to each segment   that is  being sent. These sequence number for each segment  is the numb

Database management, University of Wolverhampton School of Technology 6CI00...

University of Wolverhampton School of Technology 6CI007 Database Server Management Resit Assessment Hand in December 14th 2012 In this assignment you will build a small database t

Simple mail transfer protocol ( smtp), Simple Mail Transfer Protocol ( SMTP...

Simple Mail Transfer Protocol ( SMTP) SMTP is the principal  application layer protocol for  internet electronic  mail. It uses the reliable data transfer  service of TCP  to

what is a typical value when rtp is used, In the VOIP system, let h be the...

In the VOIP system, let h be the total number of header bytes added to each chunk, including UDP and IP header. a)  Assuming an IP datagram is emitted every 20 msec, find the tr

What is the difference among tftp and ftp application, What is the differen...

What is the difference among TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) permits a local host to get files from a remote host but does n

Explain the 802.11 fhss, 802.11 FHSS Frequency-hopping spread spectrum ...

802.11 FHSS Frequency-hopping spread spectrum in a 2.4 GHz band Carrier sends on one frequency for short duration then hops to another frequency for same duration, hops agai

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd