Use of a distance vector routing algorithm, Computer Networking

Assignment Help:

Question:

(a) The diagram below shows a configuration of Internet routers (A-F) which achieve dynamic routing through the use of a Distance Vector routing algorithm. The metric used is a simple hop-count (if two equal-length routes are available then the one via the lower numbered interface is chosen)

2171_OSI-based protocol of the LAN of an organization.png

The link between A and C has been broken for some time and routing has stabilised to accommodate the situation. Each router maintains a routing table like the one below:

124_OSI-based protocol of the LAN of an organization1.png

(i) Give the current routing table for Router C

(ii) Router D now discovers that the link between B and D has broken. Immediately after this (i.e. before D has reported the fact to any other routers), D receives distance vectors from C and F based on their current routing tables. Clearly outline the reasoning that D would use in calculating its new routing table entry for node A following receipt of the distance vectors from C and F.

(iii) How will C's routing table for node A be amended next time it receives a distance vector from D? What problem of distance vector algorithms does this illustrate?

(iv) How is this problem handled?

(b) Bridges do not have to be manually configured. Describe how the bridge learns about the different computers connected. Assume a bridge connected to two LAN segments. Illustrate your answer using a typical filtering table.

(c) What protocol can a station operating in a TCP/IP network use to discover the IP address of a computer A when it knows only the physical address of A?

(d) Assume that the OSI-based protocol of the LAN of an organization needs to provide the services of: physical transmission, point-to-
point flow control, end-to-end delivery, data encryption and compression as well as network access interfaces. Which layers of the OSI model does this protocol need to implement?


Related Discussions:- Use of a distance vector routing algorithm

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Network devices - network layer and routing , Network Devices a.Hub ...

Network Devices a.Hub b.Repeater c.Bridge d.Gateway e.Switch f.Router Connecting devices can  classified  into networking and internetworking  devices when

What are the data units at dissimilar layers of the tcp / ip, What are the ...

What are the data units at dissimilar layers of the TCP / IP protocol suite? The data unit formed at the application layer is called a message, at the transport layer the data

Show the masking process, Q. Show the Masking process? Masking ...

Q. Show the Masking process? Masking Take out the address of the physical network from an IP address Used by routers inside the organization

Show the error detection- check sum, Error Detection- Check Sum Th...

Error Detection- Check Sum The Checksum generator are subdivides the data unit into equal segments of "n" bits (usually 16) These segments are added utilizing one's c

Wideband digital cross connects, Wideband Digital Cross Connects A SONE...

Wideband Digital Cross Connects A SONET  cross  connect  accepts  various  optical  carries  rates accesses the  STS signals  and switches at this level . it  is idally used at

Which type of switching is considered to be ''wire speed'', Cut-Through is ...

Cut-Through is the best mode of switching. Store and Forward reads in the whole frame, confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only chec

What is meant by 3-tier architecture, In 3-tier Client/Server systems, the ...

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is removed from the data and the user interface. In theory, the 3-tier Client/Se

Determine the term - backend lan, Determine the term - Backend LAN Back...

Determine the term - Backend LAN Backend networks are used to interconnect large systems like mainframes, supercomputers, and mass storage devices. The key needs here is for bu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd