Question

Routing Protocols. Are routed protocol and routing protocol the same? Give examples of both. What routing...

Routing Protocols. Are routed protocol and routing protocol the same? Give examples of both. What routing protocol(s) are you planning to use in your enterprise network? Justify your selection. As the enterprise network uses private ip addresses, what routing feature does need to be configured to access the WAN with public ip address? What device does have the feature?

Homework Answers

Answer #1

Hi, I would love to answer you with this question. I hope you will get a clear idea of the questions. So not wasting much time let's get started.

The answer would be in parts as in the question.

1. Are routed protocol and routing protocol the same?

  • No, both the routed protocol and the routing protocols are not the same. The routed protocol is the protocols which are been used to route the data over the network whereas the routing protocol are been used over the routers for the connection and maintaining the routing tables.
  • Routed protocols - IP, IPX, AppleTalk
  • Routing protocols - RIP, EIGRP, IGRP, OSPF

2. What routing protocol(s) are you planning to use in your enterprise network? Justify your selection.

  • RIP or EIGRP The two routing protocols are written as if the enterprise network is small then the RIP must be configured and if the network is large enough then the EIGRP would be preferred as the RIP is more secure and difficult to configure and EIGRP is less secure and easy to configure.

3. As the enterprise network uses private IP addresses, what routing feature does need to be configured to access the WAN with a public IP address?

  • This was the question I was waiting for :) the enterprise uses the private addresses for its network but it needs to be connected to the WAN through the internet and the private addresses cannot directly access to the internet so as to make this happen the routing feature used is NAT (Network Address Translation).
  • This NAT service converts the private IP to the public IP used by the enterprise and when the message is received back it resolves it to the private address.

4. What device does have the feature?

  • The device having the NAT feature is none other than the router this is on the network or the enterprise level. But if you use the virtual machine and want to have an internet access to it you computer should also have NAT enabled during the connection so as to access the internet.

I hope the answers make your doubts clear and you got something good to learn.

Please give the thums up to an answer and do comment for any queries

Thanks and Happy to help :)

HAPPY LEARNING

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
What happens when you use Amazon Virtual Private Cloud (Amazon VPC) to create a new VPC?...
What happens when you use Amazon Virtual Private Cloud (Amazon VPC) to create a new VPC? Three subnets are created by default: one for each Availability Zone. An internet gateway is created by default. Three subnets are created by default in one Availability Zone. A main route table is created by default. Question 2 Which component of AWS Global Infrastructure does Amazon CloudFront use to ensure low-latency delivery? AWS edge locations Amazon Virtual Private Cloud (Amazon VPC) AWS Regions AWS...
Why use APA standard for documenting? What is plagiarizing? When formulating a security report, what 6...
Why use APA standard for documenting? What is plagiarizing? When formulating a security report, what 6 questions should be asked? What is meant by the term “chain of custody”? When can it be said that something is in “your custody”? What are the three steps for chain of custody procedures when dealing with data? When should you prepare for an incident? What are the 5 steps for quick incident handling? When is a good time to test an incident plan?...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from...
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from outside of the office. Employees and employers both benefit from the flexibility and efficiency that arises when workers can perform their duties from coffee shops, airports, their homes, and more. As such, providing employees with the ability to work remotely is an excellent way to attract and retain a talented, productive team. The devices and security measures used throughout an organization play a significant...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of the separation is that they are not displayed by the default version of the ls command)                         a. the prefix "rc" (rc.filename)               c. the extension .cfig                         b. a dot (.) at the beginning                    d. by having the SUID bit set 2. The IP address which is reserved for local loopback (equivalent to "localhost") is:                         a. 255.255.255.0                                   c. 192.168.70.1...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the customer buying the end product Direct billing by the firm for IS resources or services to the department that uses them Direct billing by the manager of a function for IS resources or services to an employee that uses them An accounting process that reduces tax liability for capital investments All of the following are attributes of considering IS costs as Overhead except the...
a. In the following news report about a survey for collecting public views on land use...
a. In the following news report about a survey for collecting public views on land use of Hong Kong, is Dr Victor Zheng Wan-tai a “relevant knower” of the issue? Explain your answer. b. The headline of the news uses the word “useless” to describe public’s views towards the land use survey. Suggest TWO OTHER VIEWS of the public also found in the report. c. Examine the news article to look for TWO areas where Framing might have been applied....
About John Daniels Chemicals Inc. This business case is about John Daniels Chemicals Inc., which is...
About John Daniels Chemicals Inc. This business case is about John Daniels Chemicals Inc., which is one the most respected and elite chemical research organization in the industry, operating since 1991, with the headquarters in Tanzania, Africa. Organizational Structure and Culture at John Daniels Chemicals Inc. Organizational culture in John Daniels Chemicals Inc. is an open and less rigid one, unlike the other usual corporations in the market. The scientists selected to work in John Daniels Chemicals Inc. are top...
With reference reference to our Session 2 Case Study (Facebook and Google) respond to the following...
With reference reference to our Session 2 Case Study (Facebook and Google) respond to the following question: 1. Do people who use Facebook have a legitimate claim to privacy when they themselves are posting information about themselves? Explain your position. 2. What ethical, social, and political issues exist? Briefly explain your response. CASE In a 2010 interview, Mark Zuckerberg, the founder of Facebook, proclaimed that the “age of privacy” had to come to an end. According to Zuckerberg, social norms...