Use of a distance vector routing algorithm, Computer Networking

Assignment Help:

Question:

(a) The diagram below shows a configuration of Internet routers (A-F) which achieve dynamic routing through the use of a Distance Vector routing algorithm. The metric used is a simple hop-count (if two equal-length routes are available then the one via the lower numbered interface is chosen)

2171_OSI-based protocol of the LAN of an organization.png

The link between A and C has been broken for some time and routing has stabilised to accommodate the situation. Each router maintains a routing table like the one below:

124_OSI-based protocol of the LAN of an organization1.png

(i) Give the current routing table for Router C

(ii) Router D now discovers that the link between B and D has broken. Immediately after this (i.e. before D has reported the fact to any other routers), D receives distance vectors from C and F based on their current routing tables. Clearly outline the reasoning that D would use in calculating its new routing table entry for node A following receipt of the distance vectors from C and F.

(iii) How will C's routing table for node A be amended next time it receives a distance vector from D? What problem of distance vector algorithms does this illustrate?

(iv) How is this problem handled?

(b) Bridges do not have to be manually configured. Describe how the bridge learns about the different computers connected. Assume a bridge connected to two LAN segments. Illustrate your answer using a typical filtering table.

(c) What protocol can a station operating in a TCP/IP network use to discover the IP address of a computer A when it knows only the physical address of A?

(d) Assume that the OSI-based protocol of the LAN of an organization needs to provide the services of: physical transmission, point-to-
point flow control, end-to-end delivery, data encryption and compression as well as network access interfaces. Which layers of the OSI model does this protocol need to implement?


Related Discussions:- Use of a distance vector routing algorithm

Wireless access - computer network, Wireless Access Wireless access co...

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

Explain the term hardware cost, Hardware Cost It indicates to the cost ...

Hardware Cost It indicates to the cost concerned in the functioning of an interconnection network. It comprises the cost of arbiter unit, connectors, switches, interface logic

Spanning tree protocol - ccna, Perform Basic Switch Configurations Step...

Perform Basic Switch Configurations Step 1: Cable a network that is similar to the one in the topology diagram.  You can use any current switch in your lab as long as it has

What can be done to fix signal attenuation problems, What can be done to fi...

What can be done to fix signal attenuation problems? A common way of dealing with like problem is to use repeaters and hub, because it will help regenerate the signal and thus

What are the access methods used in lan, What are the Access methods used i...

What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access

Give example of the physical layer, FDDI, Token Ring and Ethernet are all p...

FDDI, Token Ring and Ethernet are all physical layer framing standards.

What is the equivalent layer, What is the equivalent layer or layers of the...

What is the equivalent layer or layers of the TCP/IP Application layer in terms of OSI reference model? The TCP/IP Application layer really has three counterparts on the OSI mo

State the methods to keep the attackers at bay, State the methods to keep t...

State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design

What is anonymous FTP, What is anonymous FTP and why would you use it A...

What is anonymous FTP and why would you use it Anonymous FTP enables users to join to a host without using a valid login and password. Generally, anonymous FTP uses a login kno

What is retransmission timer, Q. What is Retransmission timer? Retrans...

Q. What is Retransmission timer? Retransmission timer if an ACK is received previous to the timer goes off - destroy the timer if the timer goes off before ACK a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd