Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Answer the following questions and requirements to write your paper of 3-5 pages

ID: 3859072 • Letter: A

Question

Answer the following questions and requirements to write your paper of 3-5 pages. As you answer each question, you must provide support or evidence that will enhance and empirically prove your answers. Academic information technology (IT) articles or real-life IT findings that are not found in journals or other academic sources must be used in supporting your answers. Please use APA style for all cited sources, including your reference page.

The following is a case study about a design company.

You are a senior network administrator for a networking solutions firm. Years ago, you installed a small local area network (LAN) at a design company. It is growing fast and needs your networking solutions firm to upgrade its network. You assigned Liz to the job. That afternoon, while preparing to work on a lab assignment from her class in routing, Liz mentions that she would use a router to increase the performance of the design company's network because routers are better than bridges. Explain to Liz when and where a router would be the best choice. Under what circumstances would a router not be the best choice? Provide examples to clarify your points.

Another technician, Janis, overhears the discussion as she sits down to examine the lab materials on Liz's desk. Janis thinks the design company should use a bridge to solve the problem. She reminds you that the design company has a relatively small network and that a router would be more equipment than necessary. The design company's network is using nonroutable protocols. What do you tell Janis? Provide examples in your explanation and recommendations.

Luke also takes classes in Cisco routing, and he enjoys the hands-on exercises in his class. As he reviews his notes for that night's class, he is unsure of the concept of routing tables. Explain to Luke what kind of information is kept in a router's routing table and what it is used for. What 2 methods can be used to build these tables? Provide examples in your explanation to clarify and accentuate your explanation.

As you chat with Janis and Luke, they inquire how best to monitor the routed environment. Discuss your recommendations as to monitoring and managing this type of environment.

Be sure to cite all references using APA style.

Explanation / Answer

Bridge device is similar to a router, but it does not analyze the data being forwarded. Because of this, bridges are typically fast at transferring data, but not as versatile as a router. For example, a bridge cannot be used as a firewall like most routers can. A bridge can transfer data between different protocols (i.e. a Token Ring and Ethernet network). A router on the other hand are like traffic police, they examine each packet of data, get the destination address and forwards it thru the network to the correct address.

The operational mode of the wireless device should be selected according to the requirements and applications. The table below gives a brief outline of the pros and cons of each operational mode.

Bridge Mode

Router Mode

Bridge mode

Router mode

A routing table uses the same idea that one does when using a map in package delivery. Whenever a node needs to send data to another node on a network, it must first know where to send it. If the node cannot directly connect to the destination node, it has to send it via other nodes along a proper route to the destination node. Most nodes do not try to figure out which route(s) might work; instead, a node will send an IP packet to a gateway in the LAN, which then decides how to route the "package" of data to the correct destination. Each gateway will need to keep track of which way to deliver various packages of data, and for this it uses a Routing Table. A routing table is a database which keeps track of paths, like a map, and allows the gateway to provide this information to the node requesting the information.

With hop-by-hop routing, each routing table lists, for all reachable destinations, the address of the next device along the path to that destination: the next hop. Assuming that the routing tables are consistent, the simple algorithm of relaying packets to their destination's next hop thus suffices to deliver data anywhere in a network. Hop-by-hop is the fundamental characteristic of the IP Internetwork Layer[1] and the OSI Network Layer.

The primary function of a router is to forward a packet toward its destination network, which is the destination IP address of the packet. To do this, a router needs to search the routing information stored in its routing table.

A routing table is a data file in RAM that is used to store route information about directly connected and remote networks. The routing table contains network/next hop associations. These associations tell a router that a particular destination can be optimally reached by sending the packet to a specific router that represents the "next hop" on the way to the final destination. The next hop association can also be the outgoing or exit interface to the final destination.

The network/exit-interface association can also represent the destination network address of the IP packet. This association occurs on the router's directly connected networks.

A directly connected network is a network that is directly attached to one of the router interfaces. When a router interface is configured with an IP address and subnet mask, the interface becomes a host on that attached network. The network address and subnet mask of the interface, along with the interface type and number, are entered into the routing table as a directly connected network. When a router forwards a packet to a host, such as a web server, that host is on the same network as a router's directly connected network.

A remote network is a network that is not directly connected to the router. In other words, a remote network is a network that can only be reached by sending the packet to another router. Remote networks are added to the routing table using either a dynamic routing protocol or by configuring static routes. Dynamic routes are routes to remote networks that were learned automatically by the router, using a dynamic routing protocol. Static routes are routes to networks that a network administrator manually configured.

Difficulties with routing table

The need to record routes to large numbers of devices using limited storage space represents a major challenge in routing table construction. In the Internet, the currently dominant address aggregation technology is a bitwise prefix matching scheme called Classless Inter-Domain Routing (CIDR).

Since in a network each node presumably possesses a valid routing table, routing tables must be consistent among the various nodes or routing loops can develop. This is particularly problematic in the hop-by-hop routing model in which the net effect of inconsistent tables in several different routers could be to forward packets in an endless loop. Routing loops have historically plagued routing, and their avoidance is a major design goal of routing protocols.

Contents of routing tables

The routing table consists of at least three information fields:

Depending on the application and implementation, it can also contain additional values that refine path selection:

Routing tables are also a key aspect of certain security operations, such as unicast reverse path forwarding (uRPF). In this technique, which has several variants, the router also looks up, in the routing table, the source address of the packet. If there exists no route back to the source address, the packet is assumed to be malformed or involved in a network attack, and is dropped.

Shown below is an example of what the table above could look like on an average computer connected to the internet via a home router:

Bridge Mode

Router Mode

  • Does not block any broadcast or multicast
  • Blocks and provide protection against broadcast storms
  • Transparent bridge and can pass Non-IP protocols
  • Only IP protocol is supported
  • PPPOE protocol Pass-through
  • No PPPOE protocol pass-through
  • Able to transport VLAN tagging
  • Doesn't supports VLAN
  • No network segmentation. One broadcast domain
  • Network segmentation (Clients can be on different IP subnet)
  • Can only relay the DHCP client's request to the external DHCP server
  • Can Act as DHCP server & relay which Prevents IP conflict & DHCP Injection
  • Bridges maintains bridging table (Mac) & STP can be used to avoid loops
  • No STP feature; maintains routing table
  • External bandwidth Controller can be used to control the speed of the clients by Mac or IP address
  • External bandwidth Controller can be used to control the speed of the clients by IP only
  • In client device, it uses MAC address to associate which requires WDS compatible AP
  • Use SSID to associate, work with any 802.11a/b/g AP
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote