Question 1 – Routing Protocols
Answer to Question 1: Routing protocols
- Working of Dijkstra’s Shortest path algorithm
. Computation of distance tables after the initialization step and after each iteration of the distance-vector algorithm.Table: Node x Cost tox y zx 0 3 4From y ∞ ∞ ∞ z ∞ ∞ ∞ Cost tox y zx 0 3 4From y 3 0 6 z 4 6 0Table: Node y Cost tox y zx ∞ ∞ ∞From y 3 0 6 z ∞ ∞ ∞ Cost
tox y zx 0 3 4From y 3 0 6 z 4 6 0Table: Node z Cost tox y zx ∞ ∞ ∞From y ∞ ∞ ∞ z 4 6 0 Cost tox y zx 0 3 4From y 3 0 6 z 4 6 0
- The count to infinity problem would not occur in case of decreasing the cost of the link because no loops could be created by decreasing the cost of the link. If two nodes are connected that don’t have a link it would decrease the weight of the link form infinity to a finite weight.
Answer to Question 2: IP Addressing
- The calculation of the network address for the IP address 23.1.17/24.
Subnet 1: It requires 63 interfaces + 2 (broadcast + network) = thus 128 number of addresses
Subnet 2: It requires 95 interfaces + 2 (broadcast + network) = thus 128 number of addresses
Subnet 3: It requires 16 interfaces + 2 (broadcast + network) = thus 32 number of addresses
Subnet 1: 223.1.17.128/ 25 à 223.1.16.129 – 223.1.16.254
Subnet 2: 223.1.17.0 /25 à 223.1.16.1 – 223.1.16.126
Subnet 3: 223.1.18.0/ 27 à 223.1.17.1 – 223.1.17.30
- IP address within the range
128.119.40.128 – 128.119.40.191
The prefixes for the four subnets identified are given below:
- 128.119.40.64/28
- 128.119.40.80/28
- 128.119.40.96/28, and
- 128.119.40.112/28
- Short note on Ipv6 – the IPv6 address is used as a replacement of the Ipv4 address for fixing the problems of limited number of IP address and addition if mire improvement such as auto configuration of the routing and the network. The length of the Ipv6 address are 128 bits and acts as an identifier for the interfaces of the network device. A multiple IPV6 address can be assigned to a single interface such as unicast address, anycast address and multicast address.
Answer to Question 3: IP Routing and Configuration
- Configuration of the Core Router with EIGRP
SanJones 1
SanJones 2
SanJones 3
- Allocation of one Class B IP address
- Use of VLSM on all serial Interface
Step |
N’ |
D(t),p(t) |
D(u),p(u) |
D(v),p(v) |
D(w),p(w) |
D(y),p(y) |
D(z),p(z) |
0 |
X |
∞ |
∞ |
3, x |
6, x |
5, x |
7, x |
1 |
Xv |
6, v |
6, x |
3, x |
6, x |
5, x |
7, x |
2 |
Xvu |
6, v |
6, x |
3, x |
6, x |
5, x |
7, x |
3 |
Xvuw |
6, v |
6, x |
3, x |
6, x |
5, x |
7, x |
4 |
Xvuwy |
6, v |
6, x |
3, x |
6, x |
5, x |
7, x |
5 |
Xvuwyt |
6, v |
6, x |
3, x |
6, x |
5, x |
7, x |
6 |
Xvuwytz |
6, v |
6, x |
3, x |
6, x |
5, x |
7, x |
. Network Plan
- Configuration of DHCP server in Vista and Eastasman
- Configuration of Internet Connectivity using a Static route
- Documentation of the configurations
The main problem was faced during configuration of the interface with the IP address and maintaining 99.9 percent availability of the IP address in the network.
- Implementation Issues and limitations
For the implementation of the network the scalability and performance of the network should be evaluated and the data packets should transverse to all the needs of the network. During the testing of the network the data transfer of data may be sometimes unsuccessful due to designing the network in the simulation software.
- Two suggestions for the improvement of the configuration and design
The two suggestion for the improvement of the design are given below:
- Increasing the security of the network with the implementation of a network firewall between the entry and the exit point of the network, and
- Implementation of wireless router for enabling the users of the network to connect their wireless devices with the network.
Number of host addresses required |
Number of host address required |
Subnet network address |
Subnet mask |
Subnet/ Value |
Max number of hosts possible |
Future Use Y/N |
VLAN Name |
1 |
SanJose 1 |
192.168.5.225 |
255.255.255.252 |
/30 |
2 |
Y |
SanJose 1 |
1 |
192.168.5.234 |
255.255.255.252 |
/30 |
2 |
Y |
SanJose 1 |
|
60 |
|
192.168.5.129 |
255.255.255.192 |
/26 |
62 |
Y |
SanJose 1 |
1 |
192.168.0.193 |
255.255.255.192 |
/30 |
2 |
Y |
SanJose 1 |
|
1 |
SanJose 2 |
192.168.5.230 |
255.255.255.252 |
/30 |
2 |
N |
SanJose 2 |
1 |
192.168.5.233 |
255.255.255.252 |
/30 |
2 |
N |
SanJose 2 |
|
30 |
|
192.168.5.193 |
255.255.255.224 |
/27 |
30 |
N |
SanJose 2 |
2 |
SanJose 3 |
192.168.5.226 |
255.255.255.252 |
/30 |
2 |
N |
SanJose 3 |
2 |
192.168.5.229 |
255.255.255.252 |
/30 |
2 |
N |
SanJose 3 |
|
126 |
|
192.168.5.1 |
255.255.255.128 |
/25 |
126 |
N |
SanJose 3 |
2 |
Singapore |
192.168.5.237 |
255.255.255.252 |
/30 |
2 |
N |
Singapore |
254 |
192.168.20.1 |
255.255.255.0 |
/24 |
254 |
Y |
Singapore |
|
2 |
Auckland |
192.168.20.2 |
255.255.255.0 |
/24 |
254 |
Y |
Auckland |
30 |
Westasman |
192.168.5.130 |
255.255.255.224 |
/27 |
30 |
Y |
Westasman |
2 |
Vista |
192.168.5.194 |
255.255.255.252 |
/30 |
2 |
N |
Vista |
254 |
192.168.10.1 |
255.255.255.0 |
/24 |
254 |
Y |
Vista |
|
254 |
Eastasman |
192.168.10.2 |
255.255.255.0 |
/24 |
254 |
Y |
Eastasman |
Internet |
172.16.0.1 |
255.255.255.240 |
/28 |
14 |
Y |
Internet |
Goralski, W., 2017. The Illustrated network: How TCP/IP works in a modern network. Morgan Kaufmann.
Horn, A., Ostwald, D., Reisert, M. and Blankenburg, F., 2014. The structural–functional connectome and the default mode network of the human brain. Neuroimage, 102, pp.142-151.
Hung, P.C., Kamen, K., Yasuto, S., Katsuhiko, Y., Masakatsu, N., Hiroshi, M. and Valerie, W., 2015, September. Towards advanced networking and m-services with enhanced information security and integrated support for big data analytics. In JJAP Conference Proceedings (Vol. 4). The Japan Society of Applied Physics.
Kuang, D., Yan, Q., Nie, Y., Feng, S. and Li, J., 2015, December. Image seam line method based on the combination of dijkstra algorithm and morphology. In Sixth International Conference on Electronics and Information Engineering (Vol. 9794, p. 97941R). International Society for Optics and Photonics.
Support, P., Products, E., Mainline, C. and References, C. (2018). [online] Cisco. [Accessed 21 Jan. 2018].
Swathika, O.G. and Hemamalini, S., 2016. Prims-Aided Dijkstra Algorithm for Adaptive Protection in Microgrids. IEEE Journal of Emerging and Selected Topics in Power Electronics, 4(4), pp.1279-1286.