logo

NETWORKING NETWORKING 19 19 Name of the University Author

   

Added on  2022-08-17

26 Pages3990 Words335 Views
 | 
 | 
 | 
Running head: - NETWORKING
NETWORKING
Name of the Student
Name of the University
Author Note
NETWORKING NETWORKING 19 19 Name of the University Author_1

NETWORKING
1
Table of Contents
1. Assignment-1.........................................................................................................................2
1.1 Question-1........................................................................................................................2
1.2 Question-2........................................................................................................................2
1.3 Question-3........................................................................................................................3
1.4 Question-4........................................................................................................................4
1.5 Question-5........................................................................................................................4
1.6 Question-6........................................................................................................................5
1.7 Question-7........................................................................................................................6
1.8 Question-8........................................................................................................................6
1.9 Question-9........................................................................................................................7
1.10 Question-10..................................................................................................................21
1.11 Question-11..................................................................................................................21
1.12 Question-12..................................................................................................................21
1.13 Question-13..................................................................................................................21
1.14 Question-14..................................................................................................................21
1.15 Question-15..................................................................................................................22
2. References............................................................................................................................23
NETWORKING NETWORKING 19 19 Name of the University Author_2

NETWORKING
2
1. Assignment-1
1.1 Question-1
How does VLSM conserve IP addresses?
VLSM specifically stands for Variable-Length Subnet Masks that provisions every
single organisation with the allowance to make use of one or more than one subnet mask
existing within the same space of network address that has been provisioned to the
organization by the network provider (Dasmen 2018). This procedure can be used for the
purpose of maximizing the efficiency of the address in regards to the internet protocol.
In reference to this method, the VLSM breaks the entire address into various groups
or might as well be termed as subnets that has a variable range of sizes. The larger set of
subnets are specifically created for provisioning the LAN’s with addresses. On the other
hand, the smaller subnets are created for the links in relation to the WAN and the other
existing cases that have the requirement of an address.
1.2 Question-2
What routing protocols can VLSM be used with? Why just these – what is the limitation on
the others?
VLSM has some limitations regarding the routing protocols that can be used for the
method of IP addressing by using the VLSM technique. The routing protocols that can be
used for the method with the use of VLSM are EIGRP, RIPv2, OSPF, BGP as well as IS-IS.
All of these mentioned protocols for the process of routing have the primary inclusion of
subnet mask belonging to the network for advertising the various updates in regards to
routing as well as to publish the detailed level making the VLSM possible (Dhanapal and
Vijayakumar 2018). This primary technique for making the VLSM had been derived from the
need to make the networks for the right size to be specific.
NETWORKING NETWORKING 19 19 Name of the University Author_3

NETWORKING
3
1.3 Question-3
What special router commands are used with VLSM?
There exists a number of special commands that are used for the configuration of
routers with the help of VLSM. The following are some examples (Toba et al.. 2018),
interface ethernet 0
ip address 172.16.1.1 255.255.255.0
!---8 bits of host address space reserved for ethernets
interface serial 0
ip address 172.16.254.1 255.255.255.252
!---2 bits of address space reserved for serial lines
router ospf 107
!---Router is configured for OSPF and assigned AS 107
network 172.16.0.0 0.0.255.255 area 0.0.0.0
!---Specifies network directly connected to the router
NETWORKING NETWORKING 19 19 Name of the University Author_4

NETWORKING
4
1.4 Question-4
What is route summarization and what are the advantages of using it?
Route summarization refers to the specific method of creating one particular summary
route that highlights the representation of multiply existing networks or might as be subnets
belonging to the field of network. This particular term can also be referred to as route
aggregation or might as well be supernetting (Zhu et al.. 2018). This is specifically used
within the various procedures of networking for denoting a singular path of a network or a
subnet with the help of a single summarizing element.
Route summarization has a number of advantages that have been mentioned below,
i) The tables that state the routing are much smaller in size, which specifically
reduces the requirements for memory.
ii) There is the shared existence of a lesser amount of route for the process of
advertising the existing bandwidth.
iii) The process saves cycles of CPU by processing with lesser number of packets as
well as smaller length of routing tables to carry out the work with.
iv) This specifically prevents the routing table from the instability due to the presence
of flapping networks.
1.5 Question-5
Why does your initial subnetting plan need to be well conceived in order to implement
super-netting or route summarization effectively?
For the procedure of route summarization, the initial subnetting plan should have the
following requirements that need to be ready (McDonald et al.. 2017),
NETWORKING NETWORKING 19 19 Name of the University Author_5

NETWORKING
5
i) Multiply existing IP addresses that must be sharing the bits of highest-order.
ii) The protocols for the purpose of routing must have the base of their routing
decisions based upon the 32-bit IP address as well as the prefix length that has the
ability to be 32 bits.
iii) Updates in regards to the process of routing should carry the prefix length along
with that of the IP address that is 32-bit.
1.6 Question-6
Review the use and operation of the ping, extended ping, trace route, and extended trace
route utilities.
Ping- this specifically comes from the term that has a specific usage within the sonar
technology that particularly sends out the pulses of the sound followed by listening to the
echo that comes in return (Oo 2019). The ping is issued with the help of a ping command
with the inclusion of a specific URL or might as well be an IP address.
Extended Ping- this refers to a command that is used from the source IP address that
can be changed to any of the other existing IP address based upon the router. The extended
ping is used for performing an advanced check upon the host reachability as well as network
connectivity.
Trace route- this specifically refers to a function that traces the path starting from
one singular network to that of another (Wiesen et al.. 2019). It provisions with an allowance
to diagnose the source of multiple problems that might have the existence within a specific
network.
NETWORKING NETWORKING 19 19 Name of the University Author_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Configuring EIGRP Networking Scheme
|3
|744
|127

The Basic Networking Design Project
|17
|1419
|171

Computer Networks and Internet
|9
|863
|390

TCP/IP Networking
|18
|870
|199

Planning and Configuring a Computer Network
|20
|2687
|76

Computer Networking | Assignment-2
|15
|524
|22