Assigment Solution
Assigment Solution
Submitted To:-------------------------------
Prepared By:
Student Name:----------------------------------
Student ID:----------------------------------
Table of Contents
Question No 01..................................................................................................................................................2
a) DoD model:................................................................................................................................................2
b) OSI Model:.................................................................................................................................................3
c) RINA Model:...............................................................................................................................................4
Question No 02..................................................................................................................................................5
Question No 03..................................................................................................................................................6
a) MPLS Diagram............................................................................................................................................6
b) Explanation of MPLS Operations................................................................................................................6
Question No 04..................................................................................................................................................7
Question No 05..................................................................................................................................................7
Question No 06..................................................................................................................................................8
a) Replace The X.............................................................................................................................................8
b) Explanation of the figure for BGP operations............................................................................................8
Question No 07..................................................................................................................................................9
Question No 08................................................................................................................................................10
Question No 09................................................................................................................................................11
Question No 10................................................................................................................................................12
Question No 11................................................................................................................................................12
References...........................................................................................................................................................13
Question No 01
a) DoD model:
It is created by the department of defense. It is a simple TCP/IP Protocol with four layers to flow the data on
the network and save its integrity.
Host-to-Host Layer
Internet Layer
This layer is responsible to make the protocols for end-to-end application communication and it is responsible
for the user interface specifications. FTP, DHCP, SMTP, Telnet, NFS, and DNS are examples of protocols run on
this layer.
It provides node to node connection between two devices and makes the communication process between
two devices by establishing the link and also do sequencing, acknowledgments, and flow controls. TCP and
UDP are the protocols of this layer.
Internet Layer:
Routing and single network interface are provided to upper layers by this layer. It contains the IP and ICMP
protocol. Network addressing and related information is kept here. Fragmentation and reassembling of data
packets are also done here.
On this layer mac addressing is done and also protocols are set for physical data transmission. It also monitors
data exchange between host and network [1].
b) OSI Model:
The open system interconnection (OSI) is a reference model with a complete set of protocols and standards to
be maintained in software and hardware. It was published in 1984. This model contains seven layers.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application Layer:
The last and upper layer of the OSI model is responsible for providing the interface between the user and the
internet. It is used to remote the systems. SSH, FTP, and TFTP are the protocols that run on this layer.
Presentation Layer:
it is working as a translator for the OSI model. The encryption of data is performed here. Also, decrypt the
data for the application layer when it is received from the source.
Session Layer:
The start of the session and end of the session with other devices. it is responsible for the start and end of
communication between two computers. RCPs and NFS are examples of this layer.
Transport Layer:
The data is divided into segments and then send to further processing. Segmentation is done on the transport
layer and also this layer chose the transportation of data between two computers by choosing TCP or UDP
protocols.
Network Layer:
Network addresses are assigned here. It also finds the best path from source to destination. Routing is also
performed here. IP, IPX, and Apple talk are examples. Router work on this layer
Physical addresses are defined here. Switching is performed here. Mac addressing is done here. PPP, HDLC are
examples of this layer
Physical Layer:
It provides the standers to move data on the physical medium. 10 base T, 10 base 100, DCE are a few examples
of protocols runs on this layer [2].
c) RINA Model:
RINA is a built-in Internet infrastructure built on a basic foundation, but it works on single layer of Inter-
Process Communication (IPC) that repeats itself over and over again, the same functions/methods but policies
are configured to operate at various working space levels (e.g., power, delay, loss) Specifically, the scope refers
to the Distributed IPC Facility (DIF) which has a set of IPC processes, which operate on a variety of equipment,
providing coordinated set of flow services [3].
Question No 02
Answer:
In this diagram it is shown that there are 2 source nodes. Which will send the request or data to receiver. The
Source node 1 is connected with the network by connecting with router A. the Source 2 Node is connected
with the Network by Router B. Both these routers are connected to a central switch A. The Receiver 1 is
connected with the network by connecting with router C. The receiver 2 is connected with the network by
connecting with router D.
When Source A send the data it will first go to the Router A and Router A will pass this request/data to Switch
A. Switch A checks the Destination and Send it to the concern receiver Router. If the Reciever1 is going to
receive the data than switch will send this data to router C and if Receiver 2 is going to receive the data than it
will send this to Router D and from where it will reach to the destination node. The IP addresses are assign
manually so the router and switches have source and source and destination addresses in there routing and
switching tables.
Question No 03
a) MPLS Diagram
Question No 04
Answer:
The IP is 192.168.59.70
This means that 28 bits are occupied by the network and we have 4 bits for submitting.
Question No 05
Answer:
Question No 06
a) Replace The X
BGP stands for Broader Gateway Protocol. It is a protocol which is used for sharing of routing information
between network domains. BGP sends only unicast messages. It is path vector protocol as it only choose the
path from source to destination.
In the given figure The Router R101 wants to communicate with the router R103. For some reasons the R101 is
not connected with the R103. If he wants to communicate with R103 another router R102 is connected with
the R104 which belongs to same domain of R103 and they both are connected with each other.
Now BGP create the Path for communication from R101 to R103 and that is
R101 sends packet to R102 that will send this unicast packet to R104 and this router will send this packet to
R103. So the communication will take place by the BGP.
Question No 07
Answer:
MST Calculation
A to B =7
A to c = 1
B to E= 4
C to D = 8
MST = 7+1+4+8 = 20
For ABE
7+4 = 11
Question No 08
Answer:
A={A} =0
A={B} =1
A={BC} =2
A={BCD} =3
A={FE} =4
A={F} =3
Question No 09
Answer:
A B C D E F G H
P C P C P C P C P C P C P C P C
First 0 0 ∞ 2 ∞ ∞ ∞ 3 ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞
Cycle
Secon 0 0 2 2 ∞ 4 3 2 ∞ 4 ∞ 4 ∞ ∞ ∞ ∞
d Cycle
Third 0 0 2 2 4 4 3 3 4 4 4 4 5 5 5 5
Cycle
Question No 10
Answer:
SD_WAN:
Software define wide area network is a virtual network that allows enterprises to perform any combination of
transport services and securely connect the users. It uses centrally control function to direct the traffic. Unlike
traditional router-centric WAN architecture, the SD-WAN model is designed to fully support applications
hosted on specific data areas, public or private cloud and SaaS services such as Salesforce.com, Workday,
Office 365 and Dropbox, while delivering standards high performance app performance.
Unlike traditional router-centric WAN architecture, the SD-WAN model is designed to fully support applications
hosted on specific data areas, cloud or private cloud and SaaS services such as Salesforce.com, Workday, Office
365 and Dropbox, while bringing performance standards high app performance.
Another suggestion of the SD-WAN value is to use ALL available bandwidth, not just the choice between
method A and method B. However, the choice of method should also prioritize critical business applications
over less important applications. Silver Peak's unique tunnel integration creates visual WAN overlap from
multiple visible WAN links. Traffic is transmitted using all available bandwidth available on most links. But if the
link fails, the remaining options keep the system running and your business moving on [4].
Question No 11
Answer:
IoT
Smart meters have been used by many resources around the world, and with the technology available to smart
meter manufacturers and rapidly evolving services over the past few years, there is always the opportunity to
innovate or add new technologies that work better in production.
Bluetooth:
In a given network the person wants to use its watch and other Bluetooth devices to be attached with the
internet.
Fog Computing:
Fog control is the concept of a distributed network that connects these two areas. "Fog provides a lost link to
what data needs to be embedded in the cloud, and what can be analyzed locally, on the margins," explains
Mung Chiang, dean of Purdue University's Engineering College and one of the nation's leading researchers on
fog and edge computing.
Resilient and measures of resilience:
Reliability of a network is very important in these days. Resilience means how a network can maintain and
provide the services to the end user with in a malicious attack. How it may have the ability to solve the
problem and if any fault occur than how it may survive in these worse conditions. The network services should
give in a proper way and it will not be stopped under worse conditions. Faults may be occur due to human like
bad configuration. Some are due to large natural disaster, some faults may occur due to physical hardware
failure.
Contrary to popular belief, problem-solving is not always available with your tools; it is usually about your
mind. Many maintenance workers are quick to begin making some adjustments in the machine, such as quickly
replacing things, before they get the first clue as to what is causing the problem. This mindset also introduces
additional problems to the mix, which can lead to problem solving
References
[ netcert, "Department of Defense Model of TCP/IP," [Online]. Available:
1 https://netcert.tripod.com/ccna/internetworking/dod.html#:~:text=The%20DoD%20model%20is%20a,and
] %20only%20has%20four%20layers.&text=This%20layer%20shields%20the%20upper,%2C%20checksums
%2C%20and%20flow%20control.. [Accessed 08 02 2021].