Note: Done accordingly. Please comment for any problem. Please
Uprate. Thanks.
a) B to Y
B will advertise that it can reach w and x, since y needs to know which networks its provider can reach. It may also advertise that it can reach A and C. However if A and C are only transit networks (that is, only providing service to/from their customer's networks), then B would not have to advertise A and C to y.
b) B to C
B will advertise that it can reach y. Note that since A and C is a peer network, B will only advertise its customers to C.
C will advertise that it can reach w and y, since x needs to know which networks its provider can reach. It may also advertise that it can reach A and B. However, if A and B are only transit networks (that is, only providing service to/from their customers networks), then C would not have to advertise A and B to x.
d) X to C
X will not advertise any routes to C, since otherwise C might try to route through x, and x is a customer network, not a transit network.
2)
TTL
An IP TTL is set initially by the system sending the packet. It can be set to any value between 1 and 255; different operating systems set different defaults. Each router that receives the packet subtracts at least 1 from the count; if the count remains greater than 0, the router forwards the packet, otherwise it discards it and sends an Internet Control Message Protocol (ICMP) message back to the originating host, which may trigger a resend.
6. Consider the network below in which network W is a customer of ISP A, network Y is a custo mer...
Consider the following figure on the left showing a partial graph of a network. A, B, C and D are Internet service provider (ISP) networks; w, x, y and z are customer networks. Assuming we use policy-based routing, draw the network topologies from the point of view of w, x and z respectively. We assume that we always choose the least-hops path first then the least- traffic path. As an example, y's view is given on the right figure. Explain...
I need the help step by step. Thank you for your help.
Question 6: An IP packet of size 4576 bytes needs to be sent through a network. If the Maximum Transport Unit (MTU) size allowed by the network is 1536 bytes, the packet will need to be fragmented. Considering that a minimum number of fragments should be used, for each fragment, find the values for: DF and MF flags Fragment offset field Length of each fragment Then answer the...
Plz answer 27 to 40
flooding the network with 27. Which of the following is a type of denial-of-service attack that involves broadcast messages that contain a spoofed source address of an intended victim? a. packet storm b. broadcast flood c. smurf attack d. half-open SYN attack 28. When would you most likely NOT choose to use a leased line connection? a. when high-quality, 24/7 access is needed b. for mission critical applications c. when fast upstream as well as...
1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...
14) The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as A) access control list. B) deep packet inspection. C) intrusion filtering. D) packet filtering. 15) The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as A) deep packet inspection. B) stateful packet filtering. C) static...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
2. Suppose that 6 routers (u, v, w, x, y and z) are connected as follows with the cost of each link shown next to it. ul 4 a) Use Dijkstra's algorithm to compute the least cost path from Router u (8 points) b) Construct the shortest path graph from Router u to all other routers (3 points) to all other routers in the network. from your solution in Part a Find the routing table of Router u from your...
Consider the topology shown below with following requirements Three subnets A, B, C, should have enough addresses, starting from 192.100.10.0 to support 500 interfaces, 200 interfaces, and 100 interfaces, respectively. Each of subnets, D, E, and F has 32 interfaces. (not required for address assignment.) The IP addresses for three subnets should be assigned continuously, with spacing of power-2, that means, 250 will be rounded to 256, and so on. For each subnet, the assignment should take the form a.b.c.d/x...
Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...
4. Consider the network shown below, and assume that each node initially knows the costs to each of its neighbors. Consider the distance-vector algorithm. 6 2 What are the distances from y to all other nodes after y receives one message from each of its direct neighbors (assuming that these messages are the only messages that have been sent and received so far in the entire system)? What are the distances from x to all other nodes after x receives...