How many hosts can there be in each subnet

Assignment Help Computer Networking
Reference no: EM13326441

Question 1:

1. Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the above description. State clearly in your submission the choices you have made for these addresses.!Do not give the addresses in binary but in the X.X.X.X decimal format for the IP addresses, the hexadecimal format for MAC addresses and decimal numbers for the port numbers.!

2. For the delivery of the message from Computer A to Computer B, for each step along the way show the source and destination!
a. MAC addresses!
b. IP addresses!
c. Port addresses!

Making it clear which is the source and which is the destination, in what packet or frame these addresses appear (IP, TCP, Ethernet) and what the order of encapsulation is.!

3. The same as number 2, but for the reply from computer B to computer A!

4. These messages are sensitive. What security vulnerabilities and threats can you see?

What measures would you put in place to remove or minimize the vulnerabilities?!

Question 2  - Subnetting

Consider the following scenarios -!

A) You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.!

B) You are a medium-sized company assigned a class B network 156.26.0.0. You have seven divisions and want to assign each of them their own subnet.!

C) You are a small company, of around 100 employees, assigned a class C network. You need to provide three LANs to each of the administration, marketing, and development departments.!

For each of these cases answer the following questions:!

How would you divide up your network to satisfy the requirements? Up to how many hosts can there be in each subnet? Show the slash notation for the subnets and the subnet mask. Is the subnet mask the same for each subnet? For a few of the subnets, show the network address and the broadcast address for the subnet. Are these resulting subnets class C networks?!

Question 3 - Message forwarding

A computer in the Computing Department has just been turned on. The user starts up their web browser and requests to see the Macquarie University home page. The home page www.mq.edu.au resides on a server on the administration subnet.!

Describe what happens in getting this request message to the server and how the server gets the response message back to the client.!
You should assume (for now, because the MQ network is a bit more complex as will be explained in later lectures) there is one router that connects the Computing network to the Administration network. Each of these networks is a switched LAN.!

You should tell the story of the messages, starting from how the browser formats the request, how it progresses through the stack layers. What happens when we get to the Internet layer (since this machine has not contacted the network before)? What happens in the Data Link layer? What does the switch do? What does the router do? What layers are involved at the switch and the router. How does the server stack deliver the packet to the HTTP server software?!

Reference no: EM13326441

Questions Cloud

Choose all the necessary and suitable mac address : Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the above description. State clearly in your submission the choices you have made for these addresses.
What might account for the errors in the estimation : A projectile is fired into a block of wood that is hanging on the end of a light rigid rod. How you would estimate the speed of the projectile. What might account for the errors in your estimation.
What are some of the parameters that would be taken : A jet on an aircraft carrier is launched by a catapult. What are some of the parameters that would be taken into account to make sure the aircraft achives a specified speed at the end of the ship
Discuss how relative motion is critical issue in the midair : Discuss how relative motion is a critical issue in the midair refueling of aircraft. Would control of this process be with the pilot of the tanker or the aircraft being refueled
How many hosts can there be in each subnet : Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the above description.
Does stitching on ball have any influence on the trajectory : A baseball is hit from home plate and travels over the center field fence. What would the trajectory of the baseball look like if air-resistance was not factored in
Determine the net power delivered to the generator : Air enters the compressor at 98 kPa and 295 K at a rate of 10 kg/s and exits at 1 MPa and 620 K. Determine the net power delivered to the generator by the turbine.
Determine the velocity and the volume flow rate of the steam : Steam enters a nozzle at 400oC and 800 kPa with a velocity of 10 m/s, and leaves at 300oC and 200 kPa while losing heat at a rate of 25 kW. For an inlet area 0f 800 cm2, determine the velocity and the volume flow rate of the steam at the nozzle ex..
Calculate the rate enhancement caused by the enzyme : An uncatalyzed reaction has a rate of 4.2 x 10-7 sec-1. When an enzyme is added the rate is 3.2 x 104 sec-1. Calculate the rate enhancement caused by the enzyme.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Select the hardware and software components to build the lan

Select the hardware and software components to build the LAN. Make sure you do not select two different components to perform the same function.

  Determine about the crash if rip and ospf is used

Large wide area network covers United States and has multiple nodes in evey state. Node in Denver crashes completely. How do other nodes in the country determine about the crash if RIP is used? If OSPF is used?

  Explain physical locations distributed across county

Corporation is expanding from single physical location to three physical locations distributed across county to better serve the requirements of their customers.

  What is ntp and what are clock strata

Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the le on the  ash drive containing the encrypted le system. Also explain how she would use the lesystem in her day-to-day ..

  Social effect of online social networks

What is the social effect of online social networks? 200 words Describe an experience in facebook. at least 100 words.

  Determine average streaming media data rate

Assume we can accurately forecast set of WAPs that the taxi will visit. Determine average streaming media data rate that we can sustain by downloading prefetched data from WAPs?

  Ciphertext which was encoded with a shift cipher

the following ciphertext which was encoded with a shift cipher: xultpaajcxitltlxaarpjhtiwtgxktghidhipxciwtvgtpilpitghlxiwiwtxgqadds.1. Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify th..

  Implementing wireless technologies

it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

  Determine the correct subnet mask for network

Router on one of the subnets will connect network to Internet. All computers on network will require access to the Internet. Determine the correct subnet mask for network?

  Authentication factor utilized by authentication server

which authentication factor is being utilized by authentication server which respond to login request by creating a random number or code.

  Explain the service in technical terms

Describe the service in technical terms. Make sure to include pricing information. Note: You may need to contact the provider to obtain this information

  Locate two disaster recovery services used by small business

Use the Web to locate two disaster recovery services that could be used by a small business such as Dirt Bikes. Compare them in terms of the services they offer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd