R2 has three interfaces. The IP of these interfaces are shown. From the IP of these interfaces, network addresses and Masks are derived. Interfaces are marked by referring the given network diagram. R3 has three interfaces. The IP of these interfaces are shown. From the IP of these interfaces, network addresses and Masks are derived. Interfaces are marked by referring the given network diagram (NETworking, 2013). |
||||||||||||||||||||
Given IP Block is 139.145.56.0/22 Subnet Mask is 255.255.252.0 (It is a classless SNM) If we take the SNM and convert the decimal numbers to binary 111111111 11111111 11111100 00000000, The host’s formula is 2 n – 2 [ – 2 = 2 IPs are network and broadcast address ] = 2 10 = 1024 126.145.56.0 – 126.145.59.255 Total number of addresses including network and broadcast address: 1024 |
||||||||||||||||||||
|
||||||||||||||||||||
Total number of address in this subnet is 1024. Since it has /22 subnet (Lifewire, 2017). 11111111.11111111.11111100.00000000. Used IP Subnet The IP address starting from 139.145.56.0 to 139.245.57.79. IP range in the full subnet is 139.145.56.0 to 139.145.59.255 Free IP range of the subnet: 139.145.57.80 – 139.145.59.255. IP address in 139.145.58.0 – 255 IP addresses Used IP’s : 80, Free IP’s : 175 IP addresses IP address in 139.145.59.0 – 255, Free IP addresses: 255 Total no of Free IP addresses : 430 |
||||||||||||||||||||
5600 is the size of the IP datagram. It also includes the header. 5600 bytes packet is received by the router (Study-ccna.com, 2017). The fragments of the data is given below.
|
||||||||||||||||||||
· A reason is that the length is increased by 60 bytes · It created three additional IP headers for each fragment (Lakshminarayanan, Stoica and Shenker, 2017). |
||||||||||||||||||||
· Autonomous system is a group of network which is managed by the single entity. It is a heterogeneous network which is used for the communication in the network (FreeWimaxInfo.com, 2017). · Inter domain routing is used for the allocation of IP address and IP routing. Inter domain routing is also used to reduce the routing table and routers growth (Watanabe, 2004). · Autonomous system mostly uses the intra domain networking. A network in the outside of the autonomous system is ignored by intra domain networking. Intra domain networking is also called as interior protocol. OSPF and RIP are the main routing protocols (Cnp3book.info.ucl.ac.be, 2017). |
||||||||||||||||||||
· RIP protocol is mostly used by the WAN and LAN. · Interior gateway uses the EIGRP protocol. · Exterior gateway uses the EGP protocol (Ephremides, 2017). · IS-IS protocol is used as an intermediator in the network devices. · OSPF protocol also used in the exterior gateway. · BGP protocol is used to maintain the internet protocol table and this protocol is widely used in the internet (Technet.microsoft.com, 2017). · The main reason to use the intra domain protocols in internet is it has multiple networks and domains (Nokia Networks, 2017). · A list of network is grouped to form the network. To establish a communication between the domains, inter domain protocol is used (Kurose, J. and Ross, K. (n.d.). |
||||||||||||||||||||
Routing methods has some problems, it occurs if the routing table information are not updated in the topology of the network (Ruf et al., 2017). · Routing loop is one of the network problem which occurs in the routing process. In routing loop problem the packets are forwarded based on the routing table information (www2.eecs.berkeley.edu, 2017). · If suppose the information in the routing table is not correct then it will lead to a misconfiguration. If the table information are correct, then the packets will be forward to the correct destination (connectone.com, 2017). · Black hole also a routing method problem which is due to the failure of router. · In black hole, there is no connection between the IPX and IP protocols. · Here there is no guarantee for the delivery of the packet (Chen, 2017). · Black hole will form if the router is reconfigured in the static environment. In a dynamic environment the router, the link will be downed if the router is expired (Erg.abdn.ac.uk, 2017). |
||||||||||||||||||||
The difference between embedded routing and extensible routing is given below. Embedded routing gives high security for the mobile networks, data, video communication and stationary in the wireless and wired network (Chen, Yuan and Greenberg, 2017), (Wilkins, 2017). · It consumes high energy. It has high capacity to solve the issues in weight, power and size. · This embedded routing devices are different from the routers. It is not associated with the gadgets (www.cisco.com, 2017). Extensible routing is mostly used in the harsh environment (“Routing Problems”, 2017). · It has the capacity to solve the weight and power challenges.it is also called as next generation routing. · It is also used for the market growth (Kalamani and Kumar, 2014). · The gadgets are associated with the extensible routing. · It provides less security for the data. It consumes low energy. · But this routing has high capacity while comparing with the embedded routing (Puri and Priya, 2015) |
||||||||||||||||||||
· Internet routing is a challenging task for the network administrators in the autonomous system. It has end to end path control (Fibre-systems.com, 2017). · A traffic flow in the network is known by the network administrators. · RAAS uses different routing method. It is different from the current routing methods. RAAS allows to customize the routing (Technet.microsoft.com, 2017). · Internet routing is used in the customized routing. · RAS uses high level control panel to approach the multiplexes. · It uses forwarding infrastructure to support high level interfaces (Comer, 2014). |
||||||||||||||||||||
Note: source & destination address are worth 1 mark together The version number of IPv6 is 6 and theIPv4 : 4. The size of hop filed: 8bits. The hop limit is based on the maximum number of links the IPv6 packet traversed. The source and destination IP address has 128 bits length. The extension headers and the upper layer PDU together with Payload Length field (Euclid.nmu.edu, 2017). |
Reference
Chen, C. (2017). Routing-as-a-Service (RaaS): A Framework For Tenant-Directed Route Control in Data Center. [online] https://qurinet.ucdavis.edu. Available at: https://qurinet.ucdavis.edu/pubs/conf/george-info-2011.pdf [Accessed 18 May 2017].
Chen, C., Yuan, L. and Greenberg, A. (2017). Routing-as-a-Service (RaaS): A Framework For Tenant-Directed Route Control in Data Center. [online] https://spirit.cs.ucdavis.edu. Available at: https://spirit.cs.ucdavis.edu/pubs/journal/ton-g.pdf [Accessed 18 May 2017].
Cnp3book.info.ucl.ac.be. (2017). Interdomain routing — Computer Networking : Principles, Protocols and Practice. [online] Available at: https://cnp3book.info.ucl.ac.be/2nd/html/protocols/bgp.html [Accessed 18 May 2017].
Connectone.com. (2017). Embedded IP Routing. [online] Available at: https://ww.connectone.com/?page_id=289 [Accessed 18 May 2017].
Comer, D. (2014). Internetworking with TCP/IP. 1st ed. Boston [etc.]: Pearson.
Erg.abdn.ac.uk. (2017). IP Fragmentation Processing. [online] Available at: https://www.erg.abdn.ac.uk/users/gorry/eg3567/inet-pages/ip-fragmentatiion.html [Accessed 17 May 2017].
Euclid.nmu.edu. (2017). IPV6 HEADER. [online] Available at: https://euclid.nmu.edu/~randy/Classes/CS442/Notes/IPv6_Header.html [Accessed 17 May 2017].
Ephremides, A. (2017). The Routing Problem in Computer Networks.
Fibre-systems.com. (2017). 7950 Extensible Routing System | Fibre Systems. [online] Available at: https://www.fibre-systems.com/product/7950-extensible-routing-system [Accessed 18 May 2017].
FreeWimaxInfo.com. (2017). Type of Routing Protocol – RIP – IGRP – OSPF – EGP – EIGRP – BGP – ISIS Protocols | FreeWimaxInfo.com. [online] Available at: https://freewimaxinfo.com/routing-protocol-types.html [Accessed 18 May 2017].
Kalamani, P. and Kumar, M. (2014). Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) by using OPNET Simulator tool – A Practical Approach. IOSR Journal of Computer Engineering, 16(4), pp.57-64.
Kurose, J. and Ross, K. (n.d.). Computer networking. 1st ed.
Lakshminarayanan, K., Stoica, I. and Shenker, S. (2017). Routing as a Service. [online] https://www.cse.tkk.fi. Available at: https://www.cse.tkk.fi/fi/opinnot/T-110.7190/2008_Spring/papers/06b_ras.pdf [Accessed 18 May 2017].
Lifewire. (2017). Top 5 network routing protocols demystified. [online] Available at: https://www.lifewire.com/top-network-routing-protocols-explained-817965 [Accessed 18 May 2017].
NETworking. (2013). 1st ed. [Hong Kong]: Regional NET Coordinating Team, NET Section, CDI, EDB.
Nokia Networks. (2017). 7950 Extensible Routing System. [online] Available at: https://networks.nokia.com/products/7950-extensible-routing-system [Accessed 18 May 2017].
Puri, A. and Priya, A. (2015). BLACK HOLE IN NETWORK: A REVIEW. International Journal of Advanced Engineering Technology, 6(2).
Routing Problems. (2017). Technet.microsoft.com. Retrieved 18 May 2017, from https://technet.microsoft.com/en-us/library/cc957847.aspx
Ruf, L., Farkas, K., Hug, H. and Plattner, B. (2017). Network Services on Service Extensible Routers. [online] pdfs.semanticscholar.org. Available at: https://pdfs.semanticscholar.org/7e16/49e05d1c24a2959f3773803a72add994fae4.pdf [Accessed 18 May 2017].
Study-ccna.com. (2017). Routing protocols. [online] Available at: https://study-ccna.com/routing-protocols/ [Accessed 18 May 2017].
Technet.microsoft.com. (2017). Routing Problems. [online] Available at: https://technet.microsoft.com/en-us/library/cc957847.aspx [Accessed 18 May 2017].
Technet.microsoft.com. (2017). Networking Basics: Network addressing. [online] Available at: https://technet.microsoft.com/en-us/library/cc527495(v=ws.10).aspx [Accessed 17 May 2017].
Watanabe, M. (2004). Networking, Networking, Networking, Networking, Networking. Nature, 430(7001), pp.812-813.
www2.eecs.berkeley.edu. (2017). Routing as a Service. [online] Available at: https://www2.eecs.berkeley.edu/Pubs/TechRpts/2006/EECS-2006-19.pdf [Accessed 17 May 2017].
www.cisco.com. (2017). IP Addressing Guide. [online] Available at: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-smart-business-architecture/sba_ipAddr_dg.pdf [Accessed 17 May 2017].
Wilkins, S. (2017). Network Routing Protocols and Methods, Part 1 | Routing Protocols and Methods, Part 1 | Pearson IT Certification. [online] Pearsonitcertification.com. Available at: https://www.pearsonitcertification.com/articles/article.aspx?p=2435847 [Accessed 17 May 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download