Use of a distance vector routing algorithm, Computer Networking

Assignment Help:

Question:

(a) The diagram below shows a configuration of Internet routers (A-F) which achieve dynamic routing through the use of a Distance Vector routing algorithm. The metric used is a simple hop-count (if two equal-length routes are available then the one via the lower numbered interface is chosen)

2171_OSI-based protocol of the LAN of an organization.png

The link between A and C has been broken for some time and routing has stabilised to accommodate the situation. Each router maintains a routing table like the one below:

124_OSI-based protocol of the LAN of an organization1.png

(i) Give the current routing table for Router C

(ii) Router D now discovers that the link between B and D has broken. Immediately after this (i.e. before D has reported the fact to any other routers), D receives distance vectors from C and F based on their current routing tables. Clearly outline the reasoning that D would use in calculating its new routing table entry for node A following receipt of the distance vectors from C and F.

(iii) How will C's routing table for node A be amended next time it receives a distance vector from D? What problem of distance vector algorithms does this illustrate?

(iv) How is this problem handled?

(b) Bridges do not have to be manually configured. Describe how the bridge learns about the different computers connected. Assume a bridge connected to two LAN segments. Illustrate your answer using a typical filtering table.

(c) What protocol can a station operating in a TCP/IP network use to discover the IP address of a computer A when it knows only the physical address of A?

(d) Assume that the OSI-based protocol of the LAN of an organization needs to provide the services of: physical transmission, point-to-
point flow control, end-to-end delivery, data encryption and compression as well as network access interfaces. Which layers of the OSI model does this protocol need to implement?


Related Discussions:- Use of a distance vector routing algorithm

Merit and drawback of mpi, Merits of MPI Runs on any shared or dist...

Merits of MPI Runs on any shared or distributed memory architectures; Can be used on a wider range of troubles than OpenMP; Every process has its own local variabl

Distinguish between network devices computers and servers, The School of Co...

The School of Computing is planning to deploy a new network structure to accommodate the following scenario. Please make suggestions on how this LAN can be designed based on the fl

Topology, what is difference between Star and Mesh topology?

what is difference between Star and Mesh topology?

Permanent virtual circuits, ATM can give customers with virtual circuits th...

ATM can give customers with virtual circuits that seem traditional leased digital circuits. Such permanent virtual circuits (PVC) fixed as the customer pay the periodic fee for its

What are the key elements of protocols, What are the key elements of protoc...

What are the key elements of protocols? The key elements of protocols are a. Syntax   It refers to the structure or format of the data that is the order in which they a

Why we use filter option, When we specifically block, single router update ...

When we specifically block, single router update for other routers

State the list of protocols supported by the intranet, State the list of pr...

State the list of protocols supported by the Intranet The following is the list of protocols supported by the Intranet: ARP: Address resolution Protocol is used to resol

What is the importance of encryption on a network, What is the importance o...

What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o

How intranets encourage integration of applications, How Intranets encourag...

How Intranets encourage integration of applications Intranets encourage integration of applications; such as the simple word processing application could be easily linked with

Determine the switch in a physical ring, Switch In a physical ring ...

Switch In a physical ring configuration any disabled or else disconnected node can disable the entire network Use of a switch can permit the ring to bypass an inactive

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd