0% found this document useful (0 votes)
6 views

Assigment Solution

The document is an advanced network assignment covering various networking models including DoD, OSI, and RINA, along with explanations of MPLS and BGP operations. It includes detailed questions and answers on network configurations, IP addressing, and the concept of SD-WAN, as well as discussions on IoT and network resilience. The document also contains references for further reading on the discussed topics.

Uploaded by

Irfan Haider
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Assigment Solution

The document is an advanced network assignment covering various networking models including DoD, OSI, and RINA, along with explanations of MPLS and BGP operations. It includes detailed questions and answers on network configurations, IP addressing, and the concept of SD-WAN, as well as discussions on IoT and network resilience. The document also contains references for further reading on the discussed topics.

Uploaded by

Irfan Haider
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

MN621–Advanced Network

Exam Like Supplementary Major Assignment Trimester 2, 2020

Submitted To:-------------------------------

Prepared By:

Student Name:----------------------------------

Student ID:----------------------------------
Table of Contents
Question No 01..................................................................................................................................................2
a) DoD model:................................................................................................................................................2
b) OSI Model:.................................................................................................................................................3
c) RINA Model:...............................................................................................................................................4
Question No 02..................................................................................................................................................5
Question No 03..................................................................................................................................................6
a) MPLS Diagram............................................................................................................................................6
b) Explanation of MPLS Operations................................................................................................................6
Question No 04..................................................................................................................................................7
Question No 05..................................................................................................................................................7
Question No 06..................................................................................................................................................8
a) Replace The X.............................................................................................................................................8
b) Explanation of the figure for BGP operations............................................................................................8
Question No 07..................................................................................................................................................9
Question No 08................................................................................................................................................10
Question No 09................................................................................................................................................11
Question No 10................................................................................................................................................12
Question No 11................................................................................................................................................12
References...........................................................................................................................................................13
Question No 01

a) DoD model:
It is created by the department of defense. It is a simple TCP/IP Protocol with four layers to flow the data on
the network and save its integrity.

Process Application Layer

Host-to-Host Layer

Internet Layer

Network Access Layer

Process Application Layer :

This layer is responsible to make the protocols for end-to-end application communication and it is responsible
for the user interface specifications. FTP, DHCP, SMTP, Telnet, NFS, and DNS are examples of protocols run on
this layer.

Host to Host Layer:

It provides node to node connection between two devices and makes the communication process between
two devices by establishing the link and also do sequencing, acknowledgments, and flow controls. TCP and
UDP are the protocols of this layer.

Internet Layer:

Routing and single network interface are provided to upper layers by this layer. It contains the IP and ICMP
protocol. Network addressing and related information is kept here. Fragmentation and reassembling of data
packets are also done here.

Network access layer:

On this layer mac addressing is done and also protocols are set for physical data transmission. It also monitors
data exchange between host and network [1].
b) OSI Model:
The open system interconnection (OSI) is a reference model with a complete set of protocols and standards to
be maintained in software and hardware. It was published in 1984. This model contains seven layers.

Application

Presentation

Session

Transport

Network

Data Link

Physical

Application Layer:

The last and upper layer of the OSI model is responsible for providing the interface between the user and the
internet. It is used to remote the systems. SSH, FTP, and TFTP are the protocols that run on this layer.

Presentation Layer:

it is working as a translator for the OSI model. The encryption of data is performed here. Also, decrypt the
data for the application layer when it is received from the source.

Session Layer:

The start of the session and end of the session with other devices. it is responsible for the start and end of
communication between two computers. RCPs and NFS are examples of this layer.

Transport Layer:

The data is divided into segments and then send to further processing. Segmentation is done on the transport
layer and also this layer chose the transportation of data between two computers by choosing TCP or UDP
protocols.
Network Layer:

Network addresses are assigned here. It also finds the best path from source to destination. Routing is also
performed here. IP, IPX, and Apple talk are examples. Router work on this layer

Data Link Layer:

Physical addresses are defined here. Switching is performed here. Mac addressing is done here. PPP, HDLC are
examples of this layer

Physical Layer:

It provides the standers to move data on the physical medium. 10 base T, 10 base 100, DCE are a few examples
of protocols runs on this layer [2].

c) RINA Model:
RINA is a built-in Internet infrastructure built on a basic foundation, but it works on single layer of Inter-
Process Communication (IPC) that repeats itself over and over again, the same functions/methods but policies
are configured to operate at various working space levels (e.g., power, delay, loss) Specifically, the scope refers
to the Distributed IPC Facility (DIF) which has a set of IPC processes, which operate on a variety of equipment,
providing coordinated set of flow services [3].

Question No 02
Answer:

In this diagram it is shown that there are 2 source nodes. Which will send the request or data to receiver. The
Source node 1 is connected with the network by connecting with router A. the Source 2 Node is connected
with the Network by Router B. Both these routers are connected to a central switch A. The Receiver 1 is
connected with the network by connecting with router C. The receiver 2 is connected with the network by
connecting with router D.

So we have a Central switch A. 4 routers A, B, C, D. 2 source nodes and 2 receiver nodes.

When Source A send the data it will first go to the Router A and Router A will pass this request/data to Switch
A. Switch A checks the Destination and Send it to the concern receiver Router. If the Reciever1 is going to
receive the data than switch will send this data to router C and if Receiver 2 is going to receive the data than it
will send this to Router D and from where it will reach to the destination node. The IP addresses are assign
manually so the router and switches have source and source and destination addresses in there routing and
switching tables.
Question No 03

a) MPLS Diagram

b) Explanation of MPLS Operations


In the given MPLS Diagram 8 IPV6 Routers are interconnected with each other. R1and R8 are the router for
User. All the routers are centrally connected with R4 router. This router will have the details of sender and
receiver nodes. In MPLS, packets are networked based on a shared label. The label is associated with a pre-
determined network path, allowing for a higher level of control over the networks set by the packets. The
MPLS route allows for various Qos features and priorities to be allocated for the flow of certain data, and
operators can decide on ways to get back to the point where traffic should be restored.
With a pure IP path (Internet Protocol) on a network that has been bundled, each packet of data may
determine its path through the network - which was a powerful, but unpredictable flow. However, it was very
expensive. In the previously modified circuit networks, body cables and T1 lines were in charge of data and
voice volume. That provided predictable routes, but was more expensive and difficult to measure due to the
need to install comprehensive infrastructure.

Question No 04
Answer:

The given IP address is 192.148.10.XX

After putting my Last 2 digits of ID

The IP is 192.168.59.70

Subnet mask is 255.255.255.240

This means that 28 bits are occupied by the network and we have 4 bits for submitting.

I. Total Number of Subnets:

We can create 16 subnets for the given IP address.

II. Total Host per Subnet:

We have 2n – 2 formula for host so 16- 2= 14 host per subnet

III. Useable IP address range for first subnet:

192.148.10.1 to 192.148.10.14 (hosts)

192.148.10.0 Subnet Address

192.168.10.15 Broadcast Address

IV. Useable IP address range for Last subnet:

192.148.10.241 to 192.148.10.254 (Host)

192.148.10.240 Subnet address

192.148.10.255 Broadcast address

Question No 05
Answer:

In the given diagram the network address of routers are

For Router R1: the network address of R1 is 10.57.67.77/13


On the port s0/0 the address is 192.168.5.1/30

On the port s0/1 the address is 192.168.6.0/24

On the port s0/2 the address is 192.168.7.129/25

For Router R2: the network address of R2 is 10.22.22.22/13

On the port s0/0 the address is 192.168.5.2/30

For Router R3: the network address of R3 is 10.1.1.1/14

For Router R4: the network address of R4 is 172.30.5.5/21

On the port s0/0 the address is 192.168.7.130/25

Question No 06

a) Replace The X

b) Explanation of the figure for BGP operations

BGP stands for Broader Gateway Protocol. It is a protocol which is used for sharing of routing information
between network domains. BGP sends only unicast messages. It is path vector protocol as it only choose the
path from source to destination.

In the given figure The Router R101 wants to communicate with the router R103. For some reasons the R101 is
not connected with the R103. If he wants to communicate with R103 another router R102 is connected with
the R104 which belongs to same domain of R103 and they both are connected with each other.

Now BGP create the Path for communication from R101 to R103 and that is

R101 sends packet to R102 that will send this unicast packet to R104 and this router will send this packet to
R103. So the communication will take place by the BGP.
Question No 07
Answer:

MST Calculation

Minimum spanning tree is of nodes/vertices A,B,C,D,E is

A to B =7

A to c = 1

B to E= 4

C to D = 8

MST = 7+1+4+8 = 20

For ABE
7+4 = 11

For ACDE= 1+8+3 = 12

So MST for this graph is ABE and it is 11.

Question No 08
Answer:

Step N D(B),P(B) D(C),P(C) D(D),P(D) D(E),P(E) D(F),P(F)


0 A ∞ ∞ ∞ ∞ ∞
A 0 ∞ ∞ ∞ ∞ ∞
B 0 1 ∞ 3 4 3
C 0 1 2 3 4 3
D 0 1 2 3 4 3
E 0 1 2 3 4 3
F 0 1 2 3 4 3

Let we start from A

A={A} =0

A={B} =1

A={BC} =2

A={BCD} =3

A={FE} =4

A={F} =3

Question No 09
Answer:

A B C D E F G H
P C P C P C P C P C P C P C P C
First 0 0 ∞ 2 ∞ ∞ ∞ 3 ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞
Cycle
Secon 0 0 2 2 ∞ 4 3 2 ∞ 4 ∞ 4 ∞ ∞ ∞ ∞
d Cycle
Third 0 0 2 2 4 4 3 3 4 4 4 4 5 5 5 5
Cycle
Question No 10
Answer:

SD_WAN:

Software define wide area network is a virtual network that allows enterprises to perform any combination of
transport services and securely connect the users. It uses centrally control function to direct the traffic. Unlike
traditional router-centric WAN architecture, the SD-WAN model is designed to fully support applications
hosted on specific data areas, public or private cloud and SaaS services such as Salesforce.com, Workday,
Office 365 and Dropbox, while delivering standards high performance app performance.

Unlike traditional router-centric WAN architecture, the SD-WAN model is designed to fully support applications
hosted on specific data areas, cloud or private cloud and SaaS services such as Salesforce.com, Workday, Office
365 and Dropbox, while bringing performance standards high app performance.

Another suggestion of the SD-WAN value is to use ALL available bandwidth, not just the choice between
method A and method B. However, the choice of method should also prioritize critical business applications
over less important applications. Silver Peak's unique tunnel integration creates visual WAN overlap from
multiple visible WAN links. Traffic is transmitted using all available bandwidth available on most links. But if the
link fails, the remaining options keep the system running and your business moving on [4].

Question No 11
Answer:

IoT

Smart meters have been used by many resources around the world, and with the technology available to smart
meter manufacturers and rapidly evolving services over the past few years, there is always the opportunity to
innovate or add new technologies that work better in production.

Bluetooth:

In a given network the person wants to use its watch and other Bluetooth devices to be attached with the
internet.

Fog Computing:

Fog control is the concept of a distributed network that connects these two areas. "Fog provides a lost link to
what data needs to be embedded in the cloud, and what can be analyzed locally, on the margins," explains
Mung Chiang, dean of Purdue University's Engineering College and one of the nation's leading researchers on
fog and edge computing.
Resilient and measures of resilience:

Reliability of a network is very important in these days. Resilience means how a network can maintain and
provide the services to the end user with in a malicious attack. How it may have the ability to solve the
problem and if any fault occur than how it may survive in these worse conditions. The network services should
give in a proper way and it will not be stopped under worse conditions. Faults may be occur due to human like
bad configuration. Some are due to large natural disaster, some faults may occur due to physical hardware
failure.

Troubleshooting with half split and move method

Contrary to popular belief, problem-solving is not always available with your tools; it is usually about your
mind. Many maintenance workers are quick to begin making some adjustments in the machine, such as quickly
replacing things, before they get the first clue as to what is causing the problem. This mindset also introduces
additional problems to the mix, which can lead to problem solving

References
[ netcert, "Department of Defense Model of TCP/IP," [Online]. Available:
1 https://netcert.tripod.com/ccna/internetworking/dod.html#:~:text=The%20DoD%20model%20is%20a,and
] %20only%20has%20four%20layers.&text=This%20layer%20shields%20the%20upper,%2C%20checksums
%2C%20and%20flow%20control.. [Accessed 08 02 2021].

[ ComputerNetworkingNotes, "OSI Seven Layers Model Explained with Examples," computernetworkingnotes,


2 [Online]. Available: https://www.computernetworkingnotes.com/ccna-study-guide/osi-seven-layers-model-
] explained-with-examples.html. [Accessed 08 02 2021].

[ CSR, "What Is RINA?," [Online]. Available: http://csr.bu.edu/rina/about.html. [Accessed 09 02 2021].


3
]

[ SilverPeak, "SD-WAN Explained," [Online]. Available: https://www.silver-peak.com/sd-wan/sd-wan-


4 explained. [Accessed 09 02 2021].
]

You might also like