5.12. BGP: importing advertisements. Consider the network below, and assume that a provider network only wants to carry traffic to or from its customer networks. Which of the following statements are true (Hint: more than one statement is true)? B W A D-C legend: provider network customer network: X D will receive an advertisement Bx. y D will forward an advertisement for a path that terminates at x to z. D will receive an advertisement Cx. D will forward an advertisement for a path that terminates at x to w. D will receive an advertisement ABx.
Q: Q3) Consider the following schedule: rl(x), r2(x), w2(x), rI(y), r2(y) Let TS(TI)=1 and Ts(T2)=2.…
A: According to the timestamping-orderning protocol. To check the all transction issues about read and…
Q: 5.14. SDN implementation of Dijkstra's algorithm. Consider the implementation of Dijkstra's…
A: Dijkstra's algorithm, a widely used algorithm for finding the shortest path in a graph, can be…
Q: Server A makes a DNS request to Server B to Suppose A, B, and C are DNS servers. determine the…
A: Suppose A,B and C are DNS servers.Server A makes a DNS request to Server B to determine the mapping…
Q: Overlapping WiFi networks. Suppose there are two ISPs providing WiFi access in a particular café,…
A: Question 1: Overlapping WiFi NetworksThe question discusses a scenario where two ISPs provide WiFi…
Q:  Assume a simple network of two directly adjacent routers. At time T=0 seconds both sent updates (A…
A: Let's analyze each statement:If at T=15s A sends a packet to 20.0.0.1, A will immediately drop the…
Q: An ISP is granted a block of addresses starting with 180.100.0.0/16. The ISP needs to distribute…
A:
Q: 5.14. SDN implementation of Dijkstra’s algorithm. Consider the implementation of Dijkstra’s…
A: In this question we need to choose all the correct options which are true considering the…
Q: 7. Which of the following statements is true? TCP is generally faster than UDP. TCP does not care…
A: an explanation for 7: TCP is a connection-oriented protocol. It requires a logical connection to be…
Q: Consider the following network. With the indicated link costs, use Djikstra's shortest- path…
A: Dijkstra’s Algorithm: Dijkstra algorithm is a greedy algorithm that solves the single-source…
Q: Assign network addresses to each of these six subnets,with the following constraints: All addresses…
A: From 214.97.254/23, possible assignments are : - 1). Subnet A : 214.97.255/24 (256 addresses)…
Q: Please draw a sequence diagram for the following scenario. In a network, two nodes communicate with…
A: A sequence diagram is a type of interaction diagram that shows how objects or components of a system…
Q: SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts…
A: Introduction: Simple Mail Transfer Protocol (SMTP) is a protocol for sending emails. It is a…
Q: Assign network addresses to each of these six subnets,with the following constraints: All addresses…
A: HERE IS COMPLETE SOLUTION REGARDING YOUR PROBLEM :
Q: • D sends its distance vector to E What will E do (eg will it execute something or just ignore the…
A: Below i have answered:
Q: Use this figure as a reference, if the values are A, B, C and D (3rd octet) with the following…
A: Answer A*************** Specify routing table R1, R2, and R3, using this table! Destination…
Trending now
This is a popular solution!
Step by step
Solved in 4 steps
- Using BGP path advertisements to implement routing policy. Consider the network below with interconnected provider networks and customer networks. Assume that provider network D only wants to carry traffic that originates in one of its customer networks (w, z) or is destined to one of its customer networks. It specifically does not want to forward datagrams between two other provider networks, since that transit traffic is neither sourced from, nor destined to, a customer network of D. W Oz à X customer network: Given these policies, to which other networks will network D advertise the path Dw? ПА П В Oy A DC legend: B provider networkIn Cisco Packet Tracer, I have three routers (A, B, and C). B and C should be in a cluster; this cluster should have one IP address: 205.128.216.18. A, which should have an IP address of 172.167.5.8, should only use one cable to connect to the cluster.Assume a company has three offices: Central, East, and West. The company is granted a block of 64 addresses with the beginning address 70.12.100.128/26. The management has decided to allocate 30 addresses for the Central office and divides the rest of addressesbetween the two other offices equally. Design the subnets. (Find: Mask, Network and Broadcast address, First and last address, number of usable addresses in each network).
- 3.3-4a. What is a checksum? Which of the following statements are true about a checksum? Hint: more than one statement is true. A checksum is computed at a sender by considering each byte within a packet as a number, and then adding these numbers (each number representing a bytes) together to compute a sum (which is known as a checksum). The sender-computed checksum value is often included in a checksum field within a packet header. The receiver of a packet with a checksum field will add up the received bytes, just as the sender did, and compare this locally-computed checksum with the checksum value in the packet header. If these two values are different then the receiver knows that one of the bits in the received packet has been changed during transmission from sender to receiver. The receiver of a packet with a checksum will add up the received bytes, just as the sender did, and compare this locally-computed checksum with the checksum value in the packet header. If these two values…Bridge Self Learning Algorithm. Five LANs are connected by four bridges. Each bridge maintains two tables that describe what stations are in each LAN. Initially, all the tables are empty. Show how the tables of the four bridges change after each of the following events happen in sequence. A sends a frame to B B sends a frame to A C sends a frame to A G sends a frame to BComputer Network LAN Network Topology Image. the image below Use the image as a reference, if the values are A, B, C and D (3rd octet) with the following conditions: Value A = 29 Value B = A + 1 Value C = A + 2 Value D = A + 3 x1, y1, z1 are the interfaces for the router gateway, while x2, x3, y2, y3, z2, z3 are for the router interface a. Find the Routing Table R1, R2, and R3 using the following table! Destination Next hop Interface b. With the Routing Table that you have specified in point a, which path will PC1B take when communicating with PC2B and PC3B c. In theory there is a routing table for Network Address 0.0.0.0 with a Subnet Mask of 0.0.0.0, explain the function of this routing table?
- Consider a wireless network with the following parameters. There are three Access Points operating with both bands (2.4G and 5G) enabled. The three Access Points are operating with the identical configuration. The 2.4G radios are each configured with 2 VAPS where SSID1-Printer and SSID2-Contractor. The 5G radios are each configured with 1 VAP where SSID-VolP. All SSIDS have connected users. Answer the following questions. Only enter a number without units (i.e. 5) How many unique BSSIDS are required? How many ESSIDS are configured? How many VAPS or SSIDS are configured? The three Access Points are connected to the same network. How many Distribution Systems are there?13). F = Suppose you are distributing a 10 Gbit file to N number of files. Server us = 20 MbpsIt has upload speed and each es di = 1 Mbps download speed and upload speed. N = 10,Both client-server distribution and P2P for 100 and 1000 and u = 200 Kbps, 600 Kbps and 1 MbpsA chart that gives the minimum distribution time for each combination of the N and u values for the distributionprepare.SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts. A TCP connection is set up between a user agent and a server program. The server listens on TCP port 25 for incoming connection requests. The user end of the connection is on a TCP port number above 1023. You have defined the packet filter rule set shown in the table below. These rules permit and/or deny inbound and outbound traffic between the user agent and the mail server. Describe the purpose of each packet filter rule in the table. Rule Direction Source Address Destination Address Protocol Destination Port Action A2 In External Internal TCP 25 Permit B2 Out Internal External TCP > 1023 Permit C2 Out Internal External TCP 25 Permit D2 In External Internal TCP > 1023 Permit E2 Either Any Any Any Any Deny
- Make a map → from source to destination there are many routes that can be taken within the map. Connect the 5 routers → name it A (has 3 connections), B (has 2 connections), C (has 2 connections), D (has 2 connections), and E (has 1 connection). IP addressing: LAN A1 A2 A3 B1 B2 C1 C2 D1 D2 E1 Network Address 192.168.1.0 192.168.2.0 192.168.3.0 192.168.10.0 192.168.11.0 192.168.20.0 192.168.21.0 192.168.32.0 192.168.33.0 192.168.40.0 Subnet Mask /240. AS1 has the following routing table, draw the network of AS’s that these paths imply: prefix path P1 AS2 P2 AS4 AS5 AS3 P1 AS4 AS2 P2 AS5 AS3 P1 AS5 AS2 Assuming AS 1 accepted all the paths advertised to it, what paths does AS4 advertise to AS1? What AS is P1 in? What about P2? AS5 no longer wants to forward packets destined for prefix P1 on behalf of AS1, but it is ok forwarding prefix P2, how would it change the paths it advertises to AS1? If AS1 sends a packet to AS4 destined for P1, what path will it take? How do we know AS4 won’t forward it back to AS1? If AS1 gets the following advertisement from AS4, P1 AS4 AS1 AS2 how would it update its table? Why?Question 7: An ISP has the following block of addresses 132.204.192/20. The manager of this ISP hired you to help him assign IP block of addresses to the following subnets. • Subnet A should have enough addresses to support at least 850 interfaces; • Subnet B should have enough addresses to support at least 55 interfaces; • Subnet C should have enough addresses to support at least 46 interfaces; • Subnet D should have enough addresses to support at least 40 interfaces; • Subnet E should have enough addresses to support at least 20 interfaces. • Subnet F should have enough addresses to support at least 28 interfaces. Give the range of addresses (in binary) assigned to each subnet. Show your work.