COIT20261 Network Routing And Switching03 : Solution Essays

Question:

After reading both articles, answer the following questions:
1.Write a brief summary of the congestion controls currently available in TCP as covered in this Unit
2.Identify and explain two problems with current congestion controls in TCP that are pointed out in the articles  
3.Summarize in your own words the difference(s) between the current TCP congestion controls and Google’s new BBR protocol
 
Answer:

If the company wants another subnet consisting of 1024 number of host addresses the existing block cannot be used this is because it uses a subnet of /24 and only 254 number of addresses can be allocated in the subnets. There are already 6 subnets which needs the 128 addresses and 244 addresses are allocated to the subnets.

The wireshark interface is divided into three horizontal columns and each of the windowpanes have different functionality. The first pane demonstrates the details of the packets captured on the network and the second pane shows the details of the captured packet that is selected in the first pane. The third pane consists of the packet byte and it shows the raw data of the packet content.

The frame 3 helwet brand of computer launched the scan and its IP address was 138.77.216.88

The information was found on the Ethernet II section of the packet details pane in wireshark. The details of the IP address was found by expanding the section.

For the packet bytes captured in the frame 4 to 6 a hello message is sent from the server for connecting with the client which is requesting to connect. The version of the protocol, cipher suite, method of compression, certificate request and the session ID is sent to the client. The next frame the certificate is verified and in the frame 6 the “hello message done” is sent for completing the verification process.

 

The network administrator can utilize wireshark for troubleshooting the following problems such as:

  • Monitoring the data flow in the network for the prevention of the distributed denial of service attacks
  • Resolving the name resolution problems in the network and adjust the network settings for handling large queries. .5 mark each item, total 2 for 3a.

Proto Column – It is used for showing the list of the TCP or UDP sockets and the network protocols used for data communication in the network. Proto stands for protocol and the next column local address which shows the connection between the hosts and the sockets. The physical address of the Pc is used for the netstat. The foreign IP address shows the address of the foreign PC connected remotely in the network. The, ”State Column” shows the state of the socket in list and the PID shows the owner of the process and the user using the program.

LISTENING – It implies that the PC is waiting for outer PC and for establishing a connection between them.

ESTABLISHED – it shows that the Pc is ready for sending and receiving data packets in the network

CLOSED_WAIT – It implies that the external PC and the remote client has closed the connection and the address table of the router and the other PC’s is not updated. 1

The command “tracert www.google.com” is used for traceroute the path used by the local host connected in the network to reach the host address google.com. From the above screenshot it can be demonstrated that 9 network devices are used and it includes the router with IP address 10.10.30.1 and the other devices to reach the target “google.com” having the public IP address 172.217.163.132. 1

 

References

Bhatia, R., Hao, F., Kodialam, M. and Lakshman, T.V., 2015, April. Optimized network traffic engineering using segment routing. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 657-665). IEEE.

Carpa, R., Glück, O. and Lefevre, L., 2014, December. Segment routing based traffic engineering for energy efficient backbone networks. In Advanced Networks and Telecommuncations Systems (ANTS), 2014 IEEE International Conference on (pp. 1-6). IEEE.

Davoli, L., Veltri, L., Ventre, P.L., Siracusano, G. and Salsano, S., 2015, September. Traffic engineering with segment routing: SDN-based architectural design and open source implementation. In Software Defined Networks (EWSDN), 2015 Fourth European Workshop on (pp. 111-112). IEEE.

Lazzeri, F., Bruno, G., Nijhof, J., Giorgetti, A. and Castoldi, P., 2015, May. Efficient label encoding in segment-routing enabled optical networks. In Optical Network Design and Modeling (ONDM), 2015 International Conference on (pp. 34-38). IEEE

Medhi, D. and Ramasamy, K., 2017. Network routing: algorithms, protocols, and architectures. Morgan Kaufmann.

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?