What is the subnet mask of the subblocks

Assignment Help Computer Networking
Reference no: EM131426632

TCP/IP Principles and Protocols Written Assessment

Question 1: You are given a block of IPv4 address with its CIDR notation as 132.34.12.0/23. Your organization needs to have three (3) sub-blocks of addresses to use in its three subnets as shown below:

  • First subblock of 120 usable host IP addresses.
  • Second subblock of 100 usable host IP addresses.
  • Third subblock of 60 usable host IP addresses.

Calculate the subnetworks and answer the following questions for all three of the subblocks. Make sure you show detailed calculations to get full marks in this question.

a) What is the subnet mask of the subblocks? 

b) What is first and last address of the subblocks? 

Question 2: Download and open 'Assignment one.pkt' using Packet Tracer. It is a working network with a number of network components. Answer the following questions in the context of the given network.

a. List all the network devices (except PCs) present in this network and their associated OSI layers.

b. Identify number of available networking ports and default bandwidth each of the routers support.

c. In the given network there are two types of Ethernet cable used to connect networking peripherals. Identify those two types of networking cables and explain their differences in terms of uses in the given network.

Question 3: Consider 20 pairs of hexadecimal values of an IP datagram below and answer the following questions. Make sure you do necessary conversions to represent the specific value asked for in the questions.

45 00 00 ED FB D1 40 00 FA 06 B6 FC 8A 4D 04 2F 8A 4D B4 72

a) What hexadecimal value/s represents the IP version used in the datagram?  What version of IP is used in this datagram?

b) What hexadecimal value/s represents the size of the IP header of the datagram?  What is the total length of the IP header in bytes (8 bits) in the given datagram?

c) What hexadecimal value/s represents the total length of this datagram in bytes?  What is the total length of the given datagram in bytes (8 bits)?

Question 4: a) Find the topology of the network if Table below is the routing table for R1.

Mask

Network Address

Next-Hop Address

Interface

/27

202.14.18.224

----

m1

/18

145.23.195.0

----

m0

Default (0.0.0.0)

default

150.56.12.10

m3

b) What is the size of an Ethernet frame carrying an ARP packet?

Attachment:- Assignment Files.rar

Reference no: EM131426632

Questions Cloud

Research one of the four companies : Research one of the four companies and see how or if that company has since changed (yet more) since the time of the book's publication. How did that recent change fit with or not fit in with the "lessons" that the textbook mentions the company "l..
Prepare only the front pages of form 1065 : The partnership use the land as a parking lot for the business. The partnership purchased the land four years ago on March 17 for $30,000 and sold it on August 15 of the current year for $35,050 - Prepare Short-term investment
Enhance the number of millennial leaders : Examine the best practices that your team can cultivate to enhance the number of millennial leaders. Explain how you would present this information to senior managers in your organization.
Probability that exactly one will not meet itf diameter : Suppose six tennis balls will be used in a tournament game. What is the probability that exactly one will not meet ITF diameter specifications? Assume independence.
What is the subnet mask of the subblocks : COIT12206 TCP/IP Principles and Protocols Written Assessment. Calculate the subnetworks and answer the following questions for all three of the subblocks. Make sure you show detailed calculations to get full marks in this question. What is the subn..
What are the measures of center and why are they important : Describe the level of measurement for each variable included in your data set.Discuss the importance of the Measures of Center and the Measures of Variation.What are the measures of center and why are they important?What are the measures of variation..
Probability that 60 of given shots take less than 45 seconds : Suppose a golfer takes 72 strokes to complete the round. What is the probability that at least 60 of these shots take less than 45 seconds?
What would be a reasonable sampling plan for the component : The company accept a 5% risk of rejecting good batches, and a 10% risk of accepting bad batches. What would be a reasonable sampling plan for the component?
Explain the type of structure the organization has : Then, briefly describe the type of structure the organization has and explain how it is effective in accomplishing the organization's goals. Discuss the advantages and disadvantages of the structure.

Reviews

len1426632

3/14/2017 3:57:14 AM

Please write your answers to all questions in the ‘ANSWERS_TEMPLATE_ASSIGNMENT_ONE.docx’ document and upload only the template with answers. It is better that you show all your working and steps in your calculations for all questions. Although, you may provide only the final answer in computational questions unless otherwise stated in your question’s instruction. However, if the answer incorrect (even a typo error), you will receive zero marks. Hence, it is better that you show all your working and steps in your calculations.

Write a Review

Computer Networking Questions & Answers

  Selection of a dynamic routing protocol

Budget section including appropriate number of devices and/or interface modules, any costings for WAN connections (public or private if available), software, licenses, and soon;

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]

  The relationship between client/server model

the relationship between each terminal and the corresponding data center as either client/server or peer-to-pee.What transport protocols are used in the following applications? two data centers used for retail credit authorization are located in two ..

  Cross-functional challenges in the mobile division

Cross-Functional Challenges in the Mobile Division

  Explain standard can versus extended can

What is CAN protocol and where is it used, what is LIN and where is it used and explain "Standard CAN" versus "Extended CAN".

  Search a number of antivirus companies eg symantec mcafee

search a number of antivirus companies e.g. symantec mcafee kaspersky f secure avg bitdefender webroot eset gdata avira

  Write three tcp and udp connections from netstat

Write three TCP and three UDP connections from netstat -a output, and corresponding translated port numbers from netstat -an output.

  What network hardware needed for networking project

You are to network a ten story building capable of supporting 100 computers on each floor. What network hardware will be needed to accomplish the networking project?

  Generally the receiver in the tcp flow control scheme sends

normally the receiver in the tcp flow control scheme sends back ack packets with the sequence number that it is

  Determine about the crash if rip and ospf is used

Large wide area network covers United States and has multiple nodes in evey state. Node in Denver crashes completely. How do other nodes in the country determine about the crash if RIP is used? If OSPF is used?

  Research paper should be on ethernet networking related to

it should be in api format.research paper should be on ethernet networking related to my specific subject which is

  Write a term paper on the internet

Write a term paper on the internet - How does technology affect ethics?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd