CIS225_3
.docx
keyboard_arrow_up
School
ECPI University, Greensboro *
*We aren’t endorsed by this school
Course
225
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
6
Uploaded by corada5995 on coursehero.com
Performance Assessment Report: Dynamically Routed Network
1.
(10 pts) Add snippet DynamicPT.png
.
****Finished Diagram – Everything is connected, and Packet Tracer will not allow me to connect
via ssh command to the routers so I cannot do some of the commands this assessment wants me to do, and I have set my firewall up to allow TCP access via port 22 and 23 and still having issues.****
2.
(20 pts) Document the IP addressing scheme.
Subnet ID
Subnet Mask
192.168.1.1 – 192.168.1.126 (PC1)
255.255.255.128 192.168.1.129 – 192.168.1.190 255.255.255.192 192.168.1.193 – 192.168.1.222 255.255.255.224 Connection
IPv4 address Subnet Mask
PC1 192.168.1.1
255.255.255.128 /25
Server1
192.168.1.222
255.255.255.224 /27
R1 G 0/0/0
192.168.1.2
255.255.255.128 /25
PC2 192.168.1.129
255.255.255.192 /26
R2 G 0/0/0
192.168.1.194
255.255.255.224 /27
PC3
192.168.1.193
255.255.255.224 /27
R3 G 0/0/0
192.168.1.195
255.255.255.224 /27
R1 S 0/1/0
192.168.1.130
255.255.255.192 /26
R3 S 0/1/1
192.168.1.3
255.255.255.128 /25
R3 S 0/1/0
192.168.1.133
255.255.255.192 /26
R2 S 0/1/1
192.168.1.5
255.255.255.128 /25
R2 S 0/1/0
192.168.1.132
255.255.255.192 /26
R1 S 0/1/1
192.168.1.196
255.255.255.224 /27
3.
(15 pts) Add snippets R1.ip.png
, R2. Ip.png,
and R3.ip.png
.
4.
(15 pts) Add snippets R1.ssh.png
, R2. ssh.png,
and R3.ssh.png
.
Domain Name: adams.com Username: corada5995 Password: 4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
A 1-km-long, 10-Mbps CSMA/CD LAN (i.e., Classic Ethernet)has a propagation speed of 200 m/μsec (i.e., how fast the radio signal moves on the link). Thereare no repeaters in this system. Data frames are 512 bits long, including 480 bits of payload (i.e.,effective data) and 32 bits of overhead (e.g., header, checksum, and other overhead fields). Everydata frame should be confirmed by a 64-bit ACK frame. We assume the sender needs to use onecontention slot to seize the channel before transmitting the data frame, and the receiver needsto use one contention slot to seize the channel before transmitting the ACK frame. Answer thefollowing questions:
a. What is the minimum length of a contention slot in μsec?
b. What is the effective data rate for the sender to send one data frame? Assume that there areno collisions. Show the calculation
c. What would be the impact on the total delay and the effective data rate if we used a longerdata payload size in the data frame? Given one application…
arrow_forward
Figure has been attached
A) List down the functionality of each layer of a OSI model.( Do not write book type documents.only list the responsible functions. For instance: Data link layer: 1. Framing, 2. Error control,3…… etc.)B) According to the given figure, assume that, PC0 wants to send a message to PC4. If the distancebetween the two points is 22,000 km, 3.2-kbyte message sends in 2.4 x 100000000 mls speedthrough cable and the transmission link has 1.5 Gbps Bandwidth. When the message arrives atRouters ,a) Router0 already has 4 packets to process in the queue and each will need 2ms.b) Router1 has no packets in the queue, but if it had then would require 3ms to process.c) Router2 already has 5 packets to process in the queue and each will need 1ms.Calculate the total time to send the message from PC0 to PC4
arrow_forward
A- Demonstrate static and dynamic NAT (PAT). B- Define OSPF terms using the internal router, DR, BDR, ABR, and ASBR. C- Which VTP mode allows ylan creation, editing, and removal? D- Identify the three VTP modes and static and dynamic VLANs. E- Demonstrates loopback interface configuration.
arrow_forward
Refer the above diagram.
Two PC’s are connected to a switch. The IP addresses of the PC’s are as displayed in the diagram. PC (192.168.1.2) is connected to port Fa0/1 on the switch and PC (192.168.1.3) is connected to port Fa0/2 on the switch.
If PC1 requires to communicate with PC2, what is required from PC2.
Is a router required for PC1 to communicate with PC2.
In the above diagram, how many mac-addresses would be available in the mac-address table of the switch after PC1 communicates with PC2.
arrow_forward
Explain the differences between static and dynamic NAT with an example (PAT). B- Explain the significance of the internal router, DR, BDR, ABR, and ASBR in OSPF, as well as other terms that have been emphasized throughout this document. Which VTP mode allows us to make changes to, or delete, ylans? D- Differentiate between static and dynamic VLANs and the three VTP modes. E- Illustrates one way to set up the loopback interface.
arrow_forward
True or False:
[ ] Routing decision is always required for every packet of a message at each node in packet switched network.
[ ] In OSI model data link layer provides for the reliable transfer of information across the physical link; sends blocks (frames) with the necessary synchronization, error control, and flow control
[ ] Because the boundaries between layer are well defined change in standard in one layer effect already existing software in another layer; this makes it difficult to introduce new standard
arrow_forward
3.
Computer Networking:
A Top-Down Approach 8th Edition
For TCP connection, five measured ?ampleRTT values are 98 ms, 112 ms, 134 ms,92 ms, and 115 ms. The estimatedRTT and the devRTT just before the five measurements are 100 ms and 5 ms, respectively. Using ? = 0.125 and ? = 0.25, compute the revisions to estimatedRTT, devRTT, and TCP RTO (retransmit timeout) value after each of these samples is obtained. If a timeout occurred after the five measurements, what is the new RTO value?
arrow_forward
Computer Science
a. Explain with illustrations the hidden terminal and the exposed terminal problems in wireless networks, using four nodes A, B, C, and D. b. How can RTS/CTS help with removal of hidden terminal problem and exposed terminal problems? c. Does RTS/CTS message ensure that data frames from different nodes never collide? d. Suppose that the wireless links are vey noisy and different nodes communicate with each other via TCP segments, so that TCP segments may be lost/dropped due to bit errors. Discuss whether TCP could be a good protocol used in this scenario. To ensure mobility in wireless IP networks the Mobile IP scheme uses the concepts of Home Agent and Foreign Agent. Explain briefly with illustration how this works. By virtue of the redirections, the connection process is slow. Suggest a mechanism to improve this.
arrow_forward
5.2 From the above scenario, RIP and internal EIGRP routing protocols were configured on the same router. Identify and explain which one of the two routing protocols will be selected bythe network and why
arrow_forward
A TCP PDU of length 40,513 octets (including the TCP header) is to be transmitted over a physical link between two nodes at 1,064,218,818 bps using 802.3 with an MTU of 826 octets. Assume a LLC-PDU has an overhead of 4 octets and that the IP-PDU has no options. i) How many bits are sent over the connection from the source to destination assuming only full frames are sent? ii) What is the effective data rate from the TCP-PDU point of view (to nearest integer)? iii) If the propagation time between the two nodes is 5 microseconds what is the line efficiency to 3 decimal places assuming stop and wait is used between the two nodes?
arrow_forward
A data link layer switch SW1 is connected with four hosts (H1, H2, H3, H4) as shown in figure below:
Suppose switch table is empty and switch receives a frame with source MAC address of H1 (MAC-H1) and destination MAC address of H2 (MAC-H2). What actions will be performed by the switch in this case?
Consider switch MAC address learning capability, how many entries are expected in switch table?
Show all entries of switch table.
Consider the part “a” again, but with a fully populated switch table (all entries) instead of empty table.
H1 is unplugged from this LAN by the system administrator. Does this change affect the switch table? Explain your answer.
arrow_forward
2. Maintains routing tables and attached link state information, and computes the forwarding table for the router:
-Routing processor
-Switching fabric
-Forwarding processor
-None of the above
3. Maintains routing tables and attached link state information, and computes the forwarding table for the router.
-Routing processor
-Switching fabric
-Forwarding Processor
-Forwarding Table
arrow_forward
Computer Science
Suppose We Are Going To Import A Capture Dump File Via WIRESHARK(Networking Analysis) Version 3.6.0
Show all steps on how to solve the following problems:
A) Explore specific packet number let's suppose number 4 and give its source IP and MAC addresses (Show How To Do It With Steps - ScreenShots)
B) Identify the Application protocols used in the communication (Show How To Do It With Steps - ScreenShots)
C) Filter all TCP traffic and identify the login name and password (Show How To Do It With Steps - ScreenShots)
arrow_forward
Describe hidden node problem in wireless local area networks(WLANs) , Which mechanism is employed by IEEE 802.11(WLAN) to eliminate hidden node problem.
arrow_forward
Describe the role of a router in the OSI model and how it functions at different layers. Provide a real-world scenario where a router operates at multiple layers.
arrow_forward
(a) Assume that rdt 2.0 is being used and the receiver correctly gets a packet of data from the sender. What happens next? Explain without a diagram. (b) Describe two different types of sockets used in TCP communication. Use a diagram to assist in the explanation. (c) Why might UDP be chosen over TCP in an application?
arrow_forward
Use VLSM to subnet the 128.153.0.0/22 network based on the following requirements shown on the topology diagram below. Subnets do not need to be provided for the router-to-router links.
Provide the network address, broadcast address, second usable IP address, as well as the subnet mask for each subnet. Provide the subnet mask in dotted-decimal notation (eg. 255.0.0.0).
Please answer B, C, and D
arrow_forward
q no 5:
In the above network diagram, IP and MAC addresses are given for network nodes. Suppose Host1 (Shahid) sends a datagram to Host2 (Khalid). What IP and MAC addresses (source and destination) will be written in IP and Data link layer headers respectively, for the following intermediate points from Host1 to Host2?
Host1 to Router1 (R1)
Router1 to Router2 (R2)
Router2 to Host2
arrow_forward
In the following network diagram, label the following: Router, IP Tunnel, DS, AAA,LAP, STA, WLC, ESS, Control and Distribution Plane
arrow_forward
give proper solution for both (A) and (B) give proper explaination subject networking
(a)
The purpose of the OSI model is to show how to facilitate communication between different systems without requiring changes to the logic of the underlying hardware and software? In contrast to TCP/IP model this model is not practically implemented and TCP is practical. Why? Answer with valid reasons.
(b)
Nowadays, the “store-and-forward network” technique is not using in general communications, why? Also describe it’s working.
arrow_forward
You are employed as a network engineer and have been asked to analyze a communication network to determine the current data rates and ensure that the links aren’t at risk of “reaching capacity.” In the following figure of the network, the sender is transmitting data at a total rate of 100+50 = 150 megabits per second (Mbps). The data is transmitted from the sender to the receiver over a network of five different routers. These routers are labeled A, B, C, D, and E. The connections and data rates between the routers are labeled as , , , , and .
Directions
In this project, you will analyze the communication network and solve for the unknown data rates using a variety of techniques. The system can be modeled mathematically as a system of linear equations by writing an equation for each node/router in the network. Each of these equations can be written by noting that the sum of inputs must equal the sum of outputs.
To complete the project, work on the problems described below. As you…
arrow_forward
Explain in details with steps ( necessary diagrams) how a firewall does address translation when it receives a TCP packet from a remote web server intended for a web client on the private network and the translation table contains the matching tuple needed for NAT.
arrow_forward
Explain the role of a router in the OSI model and give an example of a real-world scenario where a router operates at the network layer.
arrow_forward
Question 5
(b)Construct the Routing Table for core router
Full explain this question and text typing work only
arrow_forward
Computer Science
IP is a Routed Protocol, just like ICMP and IGMP: whereas RIP, OSPF, BGP are all Routing Protocols, Could you please ustrato the respective roles, interactions and co-working of P4 and TOP 4 v6) with the OSPF and BGP in case of a Router that separates and interconnects Intranet of a large campus to the Internet? You may assume that this Router is one of the multiple Layer-3 devices that the campus has and that this router has three connected LAN interfaces and three connected WAN interfaces.
Does this kind of interaction require any specific protocol that is NOT explicitly listed above? If so, which one(s) and why?
arrow_forward
State two advantages of dividing a communication system into layers such as e.g. is done in the TCP / IP stack with 5 layers from the application layer down to the physical layer. Also indicate if there is any possible disadvantage to stocking one communication system?
arrow_forward
Problem 1: An OC-192 network line has a bandwidth of up to 9.510912 Gbit/s. Ignoring delays through OLAs and routers, calculate the maximum number of bytes that can be in transit on a link from Milwaukee to New Orleans. (Show your assumptions. Look up the transmission delay in optical fiber.)
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- A 1-km-long, 10-Mbps CSMA/CD LAN (i.e., Classic Ethernet)has a propagation speed of 200 m/μsec (i.e., how fast the radio signal moves on the link). Thereare no repeaters in this system. Data frames are 512 bits long, including 480 bits of payload (i.e.,effective data) and 32 bits of overhead (e.g., header, checksum, and other overhead fields). Everydata frame should be confirmed by a 64-bit ACK frame. We assume the sender needs to use onecontention slot to seize the channel before transmitting the data frame, and the receiver needsto use one contention slot to seize the channel before transmitting the ACK frame. Answer thefollowing questions: a. What is the minimum length of a contention slot in μsec? b. What is the effective data rate for the sender to send one data frame? Assume that there areno collisions. Show the calculation c. What would be the impact on the total delay and the effective data rate if we used a longerdata payload size in the data frame? Given one application…arrow_forwardFigure has been attached A) List down the functionality of each layer of a OSI model.( Do not write book type documents.only list the responsible functions. For instance: Data link layer: 1. Framing, 2. Error control,3…… etc.)B) According to the given figure, assume that, PC0 wants to send a message to PC4. If the distancebetween the two points is 22,000 km, 3.2-kbyte message sends in 2.4 x 100000000 mls speedthrough cable and the transmission link has 1.5 Gbps Bandwidth. When the message arrives atRouters ,a) Router0 already has 4 packets to process in the queue and each will need 2ms.b) Router1 has no packets in the queue, but if it had then would require 3ms to process.c) Router2 already has 5 packets to process in the queue and each will need 1ms.Calculate the total time to send the message from PC0 to PC4arrow_forwardA- Demonstrate static and dynamic NAT (PAT). B- Define OSPF terms using the internal router, DR, BDR, ABR, and ASBR. C- Which VTP mode allows ylan creation, editing, and removal? D- Identify the three VTP modes and static and dynamic VLANs. E- Demonstrates loopback interface configuration.arrow_forward
- Refer the above diagram. Two PC’s are connected to a switch. The IP addresses of the PC’s are as displayed in the diagram. PC (192.168.1.2) is connected to port Fa0/1 on the switch and PC (192.168.1.3) is connected to port Fa0/2 on the switch. If PC1 requires to communicate with PC2, what is required from PC2. Is a router required for PC1 to communicate with PC2. In the above diagram, how many mac-addresses would be available in the mac-address table of the switch after PC1 communicates with PC2.arrow_forwardExplain the differences between static and dynamic NAT with an example (PAT). B- Explain the significance of the internal router, DR, BDR, ABR, and ASBR in OSPF, as well as other terms that have been emphasized throughout this document. Which VTP mode allows us to make changes to, or delete, ylans? D- Differentiate between static and dynamic VLANs and the three VTP modes. E- Illustrates one way to set up the loopback interface.arrow_forwardTrue or False: [ ] Routing decision is always required for every packet of a message at each node in packet switched network. [ ] In OSI model data link layer provides for the reliable transfer of information across the physical link; sends blocks (frames) with the necessary synchronization, error control, and flow control [ ] Because the boundaries between layer are well defined change in standard in one layer effect already existing software in another layer; this makes it difficult to introduce new standardarrow_forward
- 3. Computer Networking: A Top-Down Approach 8th Edition For TCP connection, five measured ?ampleRTT values are 98 ms, 112 ms, 134 ms,92 ms, and 115 ms. The estimatedRTT and the devRTT just before the five measurements are 100 ms and 5 ms, respectively. Using ? = 0.125 and ? = 0.25, compute the revisions to estimatedRTT, devRTT, and TCP RTO (retransmit timeout) value after each of these samples is obtained. If a timeout occurred after the five measurements, what is the new RTO value?arrow_forwardComputer Science a. Explain with illustrations the hidden terminal and the exposed terminal problems in wireless networks, using four nodes A, B, C, and D. b. How can RTS/CTS help with removal of hidden terminal problem and exposed terminal problems? c. Does RTS/CTS message ensure that data frames from different nodes never collide? d. Suppose that the wireless links are vey noisy and different nodes communicate with each other via TCP segments, so that TCP segments may be lost/dropped due to bit errors. Discuss whether TCP could be a good protocol used in this scenario. To ensure mobility in wireless IP networks the Mobile IP scheme uses the concepts of Home Agent and Foreign Agent. Explain briefly with illustration how this works. By virtue of the redirections, the connection process is slow. Suggest a mechanism to improve this.arrow_forward5.2 From the above scenario, RIP and internal EIGRP routing protocols were configured on the same router. Identify and explain which one of the two routing protocols will be selected bythe network and whyarrow_forward
- A TCP PDU of length 40,513 octets (including the TCP header) is to be transmitted over a physical link between two nodes at 1,064,218,818 bps using 802.3 with an MTU of 826 octets. Assume a LLC-PDU has an overhead of 4 octets and that the IP-PDU has no options. i) How many bits are sent over the connection from the source to destination assuming only full frames are sent? ii) What is the effective data rate from the TCP-PDU point of view (to nearest integer)? iii) If the propagation time between the two nodes is 5 microseconds what is the line efficiency to 3 decimal places assuming stop and wait is used between the two nodes?arrow_forwardA data link layer switch SW1 is connected with four hosts (H1, H2, H3, H4) as shown in figure below: Suppose switch table is empty and switch receives a frame with source MAC address of H1 (MAC-H1) and destination MAC address of H2 (MAC-H2). What actions will be performed by the switch in this case? Consider switch MAC address learning capability, how many entries are expected in switch table? Show all entries of switch table. Consider the part “a” again, but with a fully populated switch table (all entries) instead of empty table. H1 is unplugged from this LAN by the system administrator. Does this change affect the switch table? Explain your answer.arrow_forward2. Maintains routing tables and attached link state information, and computes the forwarding table for the router: -Routing processor -Switching fabric -Forwarding processor -None of the above 3. Maintains routing tables and attached link state information, and computes the forwarding table for the router. -Routing processor -Switching fabric -Forwarding Processor -Forwarding Tablearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education