Describe what physical, logical and port addresses

Assignment Help Basic Computer Science
Reference no: EM13936620

With respect to TCP/IP; a) Describe what physical, logical and port addresses are and why they are required. b) Provide a real example of a physical, logical and port address - this should be from your own computer on your own network, or a lab computer or a work computer - include details of how you obtained each of the addresses and include a screen shot displaying each address

- for the port address identify the application or program that is using it. Question 2 (1+1=2 marks) An organisation has been granted a block of addresses starting with the address 172.154.68.0/22.

a) Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses. for each correct answer)

b) How many addresses are left? Question 3 (1+1+1=3 marks) a) Provide two reasons why you think dynamically assigning IP addresses are useful?

b) Is the IP address 192.168.12.254 a valid address for use by a computer connected directly to the Internet? Explain your answer.

c) Is it possible to divide a class C network into 14 subnets with 15 computers connected to each sub network? Explain your answer.

Question 4: (1+1+1+1=4 marks) A sending application has sent 1240 bytes to a receiving application using TCP. The congestion window (cwnd) is set at 200 bytes (assume it does not change for the duration).

The receiving application has sent an acknowledgement number of 1180 with a receiver window (rwnd) of 120 bytes.

a) Draw a diagram showing the sliding window and next byte pointer similar to the example provided below based on the details given above.

b) The sending application then receives a further acknowledgment of byte 1220 with an rwnd of 100 bytes. Draw a diagram representing the new sliding window and next byte pointer.

c) The sending application then sends a further 80 bytes to the receiving application, which responds soon after with an acknowledgement of byte 1300 with an rwnd of 80 bytes. Draw a diagram representing the new sliding window and next byte pointer. d) What is the maximum amount of data the sending application can send at this time? An example of the layout required, showing sliding window and next byte pointer (the light blue section represents the sliding window): Following table is an example only to complete your answers. 1161-1180 1181-1200 1201-1220 1221-1240 1241-1260 1261-1280 1281-1300 1301-1320 1321-1340 1341-1360 Question 5 (1/2 x 6 = 3 Marks) a) Change the following IP addresses from dotted-decimal notation to binary notation: 216.27.61.137 195.24.53.107 b) Change the following IP addresses from dotted-decimal notation to hexadecimal notation: 224.24.53.107 194.66.82.11 c) Change the following IP addresses from hexadecimal notation to dotted-decimal notation: 0xC1A86E47 0x41EE3AB9 d) Change the following IP addresses from binary notation to dotted-decimal notation: 00101110 01100101 01010111 10101010 10000010 00111010 10101010 01001101 e) Find the class of the following IP addresses: 22.231.113.64 189.139.4.211 f) Find the netid and hostid of the following classful IP addresses: 195.245.31.142 145.134.35.121 Question 6 (1+1=2 Marks) Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation.

(a) What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF

(b) What is the type of block of the abbreviated IPv6 address 2001:A100:FC1::A4B8:AE12:3217:FCBA

Question7 Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet. It is advisable that you have attempted the packet capture exercises using Wireshark that are scheduled for Weeks 7-9. This task cannot be completed in any CQUniversity lab.

a) Submit the captured pcap file. You should filter the file so that only TCP traffic is included. (1 mark) b) What is the server IP address?

c) What is the application layer protocol involved?

d) What is the client port number for data download?

e) What is the server port number for data download?

f) How many data bytes have been downloaded?

g) What is the size of the downloaded Lecture 1 file? 

h) Discuss the difference in your answers to parts

f) and

g). You need to consider the packets formats in your discussion.

Question 8  From the following network topology diagram, develop the router table for each of the routers (R1, R2 and R3). Note that R2 is actually a Firewall/Gateway, but still acts as a router and requires a routing table.

Question 9 To answer this question you are asked to take on the role of a newly employed Systems Administrator for a medium sized business. One of your duties is to administer all of the Local Area Networks (LANs). Upon initial investigation you discover that the network is using fixed IP addresses for all of the connected hardware. A considerable amount of your time is taken up with assigning and configuring IP addresses for visiting staff and staff that tend to move around the company frequently. This is obviously a poor use of your time. You decide that by implementing DHCP across all of the LANs you can save yourself considerable work which in turn can save the company money over a period of time. Upon suggesting this to the manager you have been asked to make your case in writing. This should be in the form of a report which includes the following:

• a description of IP addressing in general,

• what DHCP is,

• how DHCP works,

• why DHCP would be beneficial to the organisation, and

• Highlight the monetary and organisational benefits by comparing the two addressing methods (static and dynamic). The manager is not an IT expert so the report should be written in such a way that the details can be easily understood by a person with minimal IT background. The report should be approximately 1,500 words (minimum 1,000, maximum 3,000); you can include diagrams if you find it helps describe how DHCP works. The report will be marked on the basis of correctness, completeness, relevance, and level, i.e. aimed at someone with minimal IT background. With respect to TCP/IP;

a) Describe what physical, logical and port addresses are and why they are required.

b) Provide a real example of a physical, logical and port address - this should be from your own computer on your own network, or a lab computer or a work computer - include details of how you obtained each of the addresses and include a screen shot displaying each address - for the port address identify the application or program that is using it.

Question 2 (1+1=2 marks) An organisation has been granted a block of addresses starting with the address 172.154.68.0/22.

a) Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses. for each correct answer)

b) How many addresses are left? Question 3 (1+1+1=3 marks) a) Provide two reasons why you think dynamically assigning IP addresses are useful? b) Is the IP address 192.168.12.254 a valid address for use by a computer connected directly to the Internet?

Explain your answer. c) Is it possible to divide a class C network into 14 subnets with 15 computers connected to each sub network? Explain your answer. (1 mark) Question 4: (1+1+1+1=4 marks) A sending application has sent 1240 bytes to a receiving application using TCP. The congestion window (cwnd) is set at 200 bytes (assume it does not change for the duration). The receiving application has sent an acknowledgement number of 1180 with a receiver window (rwnd) of 120 bytes.

a) Draw a diagram showing the sliding window and next byte pointer similar to the example provided below based on the details given above.

b) The sending application then receives a further acknowledgment of byte 1220 with an rwnd of 100 bytes. Draw a diagram representing the new sliding window and next byte pointer. c) The sending application then sends a further 80 bytes to the receiving application, which responds soon after with an acknowledgement of byte 1300 with an rwnd of 80 bytes. Draw a diagram representing the new sliding window and next byte pointer. d) What is the maximum amount of data the sending application can send at this time? An example of the layout required, showing sliding window and next byte pointer (the light blue section represents the sliding window): Following table is an example only to complete your answers. 1161-1180 1181-1200 1201-1220 1221-1240 1241-1260 1261-1280 1281-1300 1301-1320 1321-1340 1341-1360 Question 5 (1/2 x 6 = 3 Marks) a) Change the following IP addresses from dotted-decimal notation to binary notation: 216.27.61.137 195.24.53.107 b) Change the following IP addresses from dotted-decimal notation to hexadecimal notation: 224.24.53.107 194.66.82.11 c) Change the following IP addresses from hexadecimal notation to dotted-decimal notation: 0xC1A86E47 0x41EE3AB9 d) Change the following IP addresses from binary notation to dotted-decimal notation: 00101110 01100101 01010111 10101010 10000010 00111010 10101010 01001101 e) Find the class of the following IP addresses: 22.231.113.64 189.139.4.211 f) Find the netid and hostid of the following classful IP addresses: 195.245.31.142 145.134.35.121 yuse da Question 6 lesson(1+1=2 Marks) Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation. (a) What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF (1 mark) (b) What is the type of block of the abbreviated IPv6 address 2001:A100:FC1::A4B8:AE12:3217:FCBA (1 mark) Question 7 (6 marks) Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet. It is advisable that you have attempted the packet capture exercises using Wireshark that are scheduled for Weeks 7-9. This task cannot be completed in any CQUniversity lab. a) Submit the captured pcap file. You should filter the file so that only TCP traffic is included. (1 mark) b) What is the server IP address? (0.5 marks) c) What is the application layer protocol involved? (0.5 marks) d) What is the client port number for data download? (0.5 marks) e) What is the server port number for data download? (0.5 marks) f) How many data bytes have been downloaded? (0.5 marks) g) What is the size of the downloaded Lecture 1 file? (0.5marks) h) Discuss the difference in your answers to parts f) and g). You need to consider the packets formats in your discussion. (2 marks) Question 8 (2+2+2=6 marks) From the following network topology diagram, develop the router table for each of the routers (R1, R2 and R3). Note that R2 is actually a Firewall/Gateway, but still acts as a router and requires a routing table.   Question 9 (11 marks) To answer this question you are asked to take on the role of a newly employed Systems Administrator for a medium sized business. One of your duties is to administer all of the Local Area Networks (LANs). Upon initial investigation you discover that the network is using fixed IP addresses for all of the connected hardware. A considerable amount of your time is taken up with assigning and configuring IP addresses for visiting staff and staff that tend to move around the company frequently. This is obviously a poor use of your time. You decide that by implementing DHCP across all of the LANs you can save yourself considerable work which in turn can save the company money over a period of time. Upon suggesting this to the manager you have been asked to make your case in writing.

This should be in the form of a report which includes the following:

• a description of IP addressing in general,

• what DHCP is, • how DHCP works,

• why DHCP would be beneficial to the organisation, and

• Highlight the monetary and organisational benefits by comparing the two addressing methods (static and dynamic).

The manager is not an IT expert so the report should be written in such a way that the details can be easily understood by a person with minimal IT background. The report should be approximately 1,500 words (minimum 1,000, maximum 3,000); you can include diagrams if you find it helps describe how DHCP works. The report will be marked on the basis of correctness, completeness, relevance, and level, i.e. aimed at someone with minimal IT background.

Reference no: EM13936620

Questions Cloud

Write the code to test the queue class : Write the code to test the queue class by determining if the following strings are char-by-char palindromes:
Data and command signals from mission control : Need to analysis everything and have to write report by referring the information available on internet. The final project for our EE 413 course this quarter will be as follows.... You are the chief systems engineer for a new project that involve..
Discuss the relevant international laws and policies : Identify a data breach case which was international and discuss the relevant international laws and policies used to address and prosecute those responsible for the breach
Program that prints out any size triangle based on 2 inputs : My goal is to write a program that prints out any size triangle based on either one or two inputs (would prefer 2; e.g. range[a, e]). Each line of the triangle will be centered and looks like the attached output (equilateral triangle).
Describe what physical, logical and port addresses : With respect to TCP/IP; a) Describe what physical, logical and port addresses are and why they are required. b) Provide a real example of a physical, logical and port address - this should be from your own computer on your own network, or a lab co..
What is difference between primary and secondary succession : Describe one positive effect that recycling has on the environment. Describe one human activity hat is thought to be a major contributor to global warming and explain how it may contribute to the problem.
Binary tree routines in c++ that will handle single word : Attached is the input file. The commands should be executed in the order given. Where it says an order type such as inorder, that means to print the tree so far, in that way.
Does the animal have any natural enemies : Explain how the animal is able to defend itself. (How does the animal use its habitat to defend and protect itself and its family?) What special features or behaviors does the animal have to escape from its predator?)
How your journal entry on the settlement date would change : Prepare dated journal entries for Fleming to reflect above transactions using the net method. Do not use hedge accounting. Explain how your journal entry on the settlement date would change if the receivable was hedged.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that implements a simple spell checker

The program will be tested with two .txt files. One will be random sentences (to be spell checked) and the other will be the dictionary.

  Write a function called parkingcharge

Write a function called parkingCharge that, given the type of vehilce (c = car, b = bus, t = truck) and the hours a vehicle spent in the parking lot, retruns the parking charge based on the rates shown below.

  Describe the meaning of security in depth

Describe the meaning of security in depth

  Write a simplified version of sort called my-sort-1

Write a simplified version of sort called my-sort-1 that reads from standard input, sorts lexicographically, and writes the output to standard output.

  Describe what each of the two-dimensional characters

Describe what each of the two-dimensional characters might represent and the data that would be held in the array. Also, provide an example array declaration.

  Design a modular progama

A retail company must file a monthly sales tax report listing the total sales for the month and the amount of state and county sales tax collected. Design a modular progama that asks the user to enter the total sales for the month

  The risk assessment for the health body wellness center

The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.

  Needs to manage its telecommunications costs more effective

The retail store knows that it needs to manage its telecommunications costs more effectively. Based on the owner's goals to maximize the Internet for this purpose, provide a solution that will support the telecommunications (phone and fax) nee..

  Design and implement a java program

Design and implement a Java program that will read a file containing numbers and compute the following statistics: the range (low, high), the average and the median (middle number).

  How much laser be tipped before light no longer continues

If a laser is to be pointed into the end of the fibre, but is "tipped" to one side by θ degrees, how much can the laser be "tipped" before the light no longer continues down the fibre?

  Explaining actionscript developer

What do you believe the following comment means for ActionScript developer: "you are used to having to define object methods and properties in class structure before using them in instance.

  What is wrong with the following declaration?

What is wrong with the following declaration?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd