Networking with tcp/ip

Assignment Help Computer Networking
Reference no: EM13721255

Question 1 

Router X running RIP has the following routing table:

Destination

Cost

Next Router

Net1

5

A

Net2

3

B

Net3

4

C

Net4

2

D

 

a)      Assuming no other route update message has been received, show the updated routing table after router X has received the RIP message shown below from router C after 200s:

(Net1, 2), (Net2, 2), (Net3, 2), (Net4, 1). (0.5 marks for each correct row entry)

b)      Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X? (0.5 marks for each correct answer)

Question 2 

An organisation has been granted a block of addresses starting with the address 172.154.60.0/22.

a)      Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 10 addresses. (0.5 marks for each correct answer)

b)      How many addresses are left? 

Question 3 

Consider the following TCP header dump:

04210019 000007D0 00000641 50020800 00000000

a)      What is the source port number? (0.5 mark)

b)      What is the destination port number? (0.5 marks)

c)      What is the sequence number? (0.5 mark)

d)     What is the acknowledgement number? (0.5 marks)

e)      What is the length of the header? (0.5 marks)

f)       What is the type of the segment? (0.5 marks)

g)      What is the window size? 

Question 4 (5 marks)

Using Wireshark tool capture the packets at the same time that you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet. It is recommended that you undertake the packet capture exercises using Wireshark that are scheduled for Weeks 8-9 before you attempt this question. You may not be able to complete this task in any CQUniversity lab.

a)      Submit the captured pcap file.  You should filter the file so that only TCP traffic is included. (1 mark)

b)      What is the server IP address? (0.5 marks)

c)      What is the application layer protocol involved? (0.5 marks)

d)     What is the client port number for data download? (0.5 marks)

e)      What is the server port number for data download? (0.5 marks)

f)       How many data bytes have been downloaded? (0.5 marks)

g)      What is the size of the downloaded Lecture 1 file? (0.5marks)

h)      Discuss the difference in your answers to parts f) and g).  You need to consider the packet formats in your discussion. (1mark)

Question 5 (15 marks)

Investigate the emergingwireless broadband services available in Australia and compile a brief report of around 1400 words.  Your references may come from websites, white papers, government documents or published conference or journal papers. Your report should include brief descriptions of underlying technologies and protocols, bandwidth and QoS issues, recommended usages and the geographical areas covered as well as any other relevant information on such networks. Please ensure that you understand the term wireless broadband first before you undertake your literature research.

Your report should include only the body (about 1200 words), conclusion (about 200 words) and the reference list (Do not include the executive summary, table of contents and introduction). Use the sub-headings given in the template and include in-text references in the body of the report. Use Harvard style of referencing for the list of references and in-text references.

Marks allocation:

Body:

1.      Underlying technologies and protocols. (3 marks)

2.      Bandwidth and QoS. (3 marks)

3.      Usages. (3 marks)

4.      Geographical areas covered. (1.5 marks)

5.      Any other relevant information. (1.5 marks)

Conclusion:

A well written coherent conclusion (2 marks)

References:

Adhered to Harvard reference style (1 mark)

 

Question 6 (5 marks)

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable provide your answers in fully expanded hexadecimal colon notation.

a)      What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF?                                                                                                                       

b)      What is the type of block of the abbreviated IPv6 address

2001:A100:FC1::A4B8:AE12:3217:FCBA?                                                

 

c)      What is the type of address of the abbreviated IPv6 address 0::FFFF:194.42.12.7?                                                                                                                             

Question 7 (6 marks)

Answer the following questionsin relation to Wi-Fi Direct technology. Your answers should include in-text references and a reference list.

a)      Briefly describe its purpose? (1 mark)

b)      What is its transmission distance from radio to radio? (1 mark)

c)      Which standard coversthis technology? (1 mark)

d)     What is the security method used? (1 mark)

e)      Discuss if the creation of a Wi-Fi Direct multi-hop network is possible or not (use approximately 200 words). (2 marks)

Attachment:- 27354_1COIT20229 Networking with TCPIP Assignment 4.docx

Reference no: EM13721255

Questions Cloud

Compute the fractional conversion of the limiting reactant : Calculate the fractional conversion of the limiting reactant and the percentage by which the other reactant is in excess. What is the extent of reaction?
Determine upper and lower control limits for mean and range : Determine upper and lower control limits for mean and range charts, and decide if the process is in control.
Explain intensively managed livestock operations : Explain the difference between intensively managed and extensively managed livestock operations. Give two examples of each kind.
Determine the weight of this person : A person has a mass of 63 kg. The person is standing at sea level on earth. Determine the weight of this person using Fw=mg
Networking with tcp/ip : Using Wireshark tool capture the packets at the same time that you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet
What is the total annual purchasing and transportation cost : What is the probability that all three suppliers will be disrupted using option 1. What is the probability that all three suppliers will be disrupted using option
Describe the quick trip system : How did quick trip system breed accountability and improves management performance and resulted in higher profits for the organization?
Reaserch paper on oil and energy : Reaserch paper on OIL and ENERGY, you need to use some physics knowledge to finish this research paper, how long gas gonna lost
Find probability that one customer receive spoiled food : a sushi has prepared 39 portions of seafood, three of which had been left out too long and spoiled. What is the probability that at least one customer will receive spoiled food?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain conditions for vc or datagram architecture

Assume that routers were subjected to conditions which might cause them to fail fairly often. Would this argue in favor of a VC or datagram architecture? Explain why?

  If you could only use one feature of network performance to

your boss would like a small light installed on his desk to indicate the health of the network. if it is green

  Several network connections in the operation

By using a laptop computer along with a wireless connection into company’s local area network, you download a Web page from Internet. State all several network connections involved within this operation.

  What will be difference between the tcp segments which the

a client pc has two simultaneous connections to the same webserver application program on a webserver. yes. this is

  Assume a dual-railed system

(Multiplexers) Assume a dual-railed system, where you have access to any vari- able and its complement. Implement the following four-input Boolean function as indicated in each of the following subsections.

  Explain network communication simulation using vector

Network Communication Simulation using multidimensional vector. We want to simulate the communication cost between different nodes in a network. How to model the network nodes and communication cost

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  Designing new datacenter for existing complement of servers

You have been hired as independent contractor to support company in designing a new datacenter for its existing complement of 16 Unix servers, 32 Windows servers, and 10 racks of network

  Describe domain name system

Describe Domain Name System. Describe Hierarchical Namespace. Define Fully Qualified Domain Name and Partially Qualified Domain Name. What is transmission impairment?

  Explain how would you perform the batch configuration

you install a proxy server system in a midsize organization with about 100 separate hosts distributed among several

  Show the working of ldcr and mdcr protocol

Find that distance with which the tasks are feasibly scheduled and Show the working of LDCR and MDCR protocol on the given message set

  How is this applied to changing the coding?

when writing a linear cipher using n = 27, if a = ?, b = ? and c = 7, if ac = 1(mod27) how is this applied to changing the coding?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd