Role icmp plays in extending the ip protocol architecture

Assignment Help Computer Networking
Reference no: EM131016431

Task

This assessment item is to produce a short report by investigating and addressing some key topics for this subject. Note answering these questions will help you build some understanding for the next assessment item as well as for the entire subject material. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the Resource section of Interact site.

Answers MUST be written in your own words. If an answer contains more than 20% direct quote (referenced or unreferenced) 0 marks will be awarded for this question.

One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated.

For mathematical and subnetting questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

Question 2

(Show your working and give a short explanation for each answer.)

Designing IP Addressing schemes and configuring IP Addressing is a common activity undertaken by network engineers. Consider an ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP needs to distribute these blocks to 2600 customers as follows:

a. The first group has 200 medium-size businesses; each needs approximately 128 addresses.
b. The second group has 400 small-size businesses; each needs approximately 16 addresses.
c. The third group has 2000 households; each needs 4 addresses.

Design the sub blocks and give the slash notation for each sub block. Find out how many addresses are still available after these allocations.

Question 3

Consider the diagram below. Which of the two central routers (R1 and R2) is more critical for network operations and why?

1442_Network.jpg

Question 4

Contrast and compare distance vector routing with link state routing.

Question 5

Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?

I need top quality with 100% origniality and with no plagarism

Reference no: EM131016431

Questions Cloud

Discuss the claim that social institutions are related : Discuss the claim that social institutions are related
Explain how your journal entry on the settlement date : Prepare dated journal entries for Fleming to reflect the above transactions using the current method. Do not use hedge accounting.
Describe an example of a television program : Describe an example of a television program that you believe clearly displays social deviance, and explain why you specifically selected it
Draw a decision tree for the decision that buyu faces : Determine the range of values of the probability that SAEL will exercise its option, making the decision found in part c as optimal, and determine the expected value of perfect information about whether SAEL will exercise its option.
Role icmp plays in extending the ip protocol architecture : Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?
Describe the meaning of multiculturalism in your own words : Describe the meaning of multiculturalism in your own words. Is the United States of America a multicultural country? Why or why not
What are the functions of the components of mental status : What are the functions of the components of mental status and an interview in determining the competence of clients? Explain with examples and rationales
Both companies use a perpetual inventory system : Both companies use a perpetual inventory system, have a September 30 year-end, and a 30% tax rate. Madison uses the entity theory method for consolidation.
Explain the pathophysiologic processes : Explain the pathophysiologic processes of select health conditions. Predict clinical manifestations and complications of select disease processes

Reviews

Write a Review

Computer Networking Questions & Answers

  1 research the types of media that were covered in this

1. research the types of media that were covered in this weeks lectures utp stp fiber optic and wireless and create a

  Research paper should be on ethernet networking related to

it should be in api format.research paper should be on ethernet networking related to my specific subject which is

  Define the key terms related to the osi model

Define the key terms related to the OSI Model. Describe the functions of any hardware connectivity devices and tools listed.

  List five nonproprietary internet applications

List five nonproprietary Internet applications and the application-layer protocols that they use. What information is used by a process running on one host to identify a process running on another host

  Assignment on subnetting

The calculations on how you get to the answers (50%). This is very important. If you don't provide the calculations or the way you get the answer, you will lose 50%.

  Question security infrastructure and protocols a pki and

question security infrastructure and protocols a. pki and pgp are two methods for generating and managing public keys

  Paper on ethernet networking

Research paper should be on Ethernet Networking related to my specific subject which is Telecommunications and networking

  How security testing differs fromordinary functionality test

how security testing differs from ordinary functionality testing

  Homework 555 to guide you in your research you will be

to guide you in your research you will be answering various questions on can. you should answer each question fully.

  Decision of what type of wan or man architecture to use

The Internet is easily the mostly widely used and accessible network in the world. But how is it constructed? Many say the Internet is simply many separate networks connected together.

  Service oriented architecture soa is an architectural

1nbspservice oriented architecture soa is an architectural style for building software applications that use services

  1 your experiences with the social networking sites like

1. your experiences with the social networking sites like craig list etc etc?2. include how long you have been using

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd