Role icmp plays in extending the ip protocol architecture

Assignment Help Computer Networking
Reference no: EM131016431

Task

This assessment item is to produce a short report by investigating and addressing some key topics for this subject. Note answering these questions will help you build some understanding for the next assessment item as well as for the entire subject material. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the Resource section of Interact site.

Answers MUST be written in your own words. If an answer contains more than 20% direct quote (referenced or unreferenced) 0 marks will be awarded for this question.

One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated.

For mathematical and subnetting questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

Question 2

(Show your working and give a short explanation for each answer.)

Designing IP Addressing schemes and configuring IP Addressing is a common activity undertaken by network engineers. Consider an ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP needs to distribute these blocks to 2600 customers as follows:

a. The first group has 200 medium-size businesses; each needs approximately 128 addresses.
b. The second group has 400 small-size businesses; each needs approximately 16 addresses.
c. The third group has 2000 households; each needs 4 addresses.

Design the sub blocks and give the slash notation for each sub block. Find out how many addresses are still available after these allocations.

Question 3

Consider the diagram below. Which of the two central routers (R1 and R2) is more critical for network operations and why?

1442_Network.jpg

Question 4

Contrast and compare distance vector routing with link state routing.

Question 5

Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?

I need top quality with 100% origniality and with no plagarism

Reference no: EM131016431

Questions Cloud

Discuss the claim that social institutions are related : Discuss the claim that social institutions are related
Explain how your journal entry on the settlement date : Prepare dated journal entries for Fleming to reflect the above transactions using the current method. Do not use hedge accounting.
Describe an example of a television program : Describe an example of a television program that you believe clearly displays social deviance, and explain why you specifically selected it
Draw a decision tree for the decision that buyu faces : Determine the range of values of the probability that SAEL will exercise its option, making the decision found in part c as optimal, and determine the expected value of perfect information about whether SAEL will exercise its option.
Role icmp plays in extending the ip protocol architecture : Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?
Describe the meaning of multiculturalism in your own words : Describe the meaning of multiculturalism in your own words. Is the United States of America a multicultural country? Why or why not
What are the functions of the components of mental status : What are the functions of the components of mental status and an interview in determining the competence of clients? Explain with examples and rationales
Both companies use a perpetual inventory system : Both companies use a perpetual inventory system, have a September 30 year-end, and a 30% tax rate. Madison uses the entity theory method for consolidation.
Explain the pathophysiologic processes : Explain the pathophysiologic processes of select health conditions. Predict clinical manifestations and complications of select disease processes

Reviews

Write a Review

Computer Networking Questions & Answers

  Question 1aregister the owasp top 10 web application

question 1aregister the owasp top 10 web application security risks for 2010.bwhy does software have to be intensively

  Building a payroll program for a large organization

Application Architecture. You have been tasked with building a payroll program for a large organization with offices spread across the United States.

  Write down changes does ftp make to ascii file

Write down changes does FTP make to ASCII file when you download it in ASCII mode to Windows machine from Linux server.

  Lan security in a network environment

Discuss today's Local Area Networks security issues related to peer-to-peer network, client /server network and virtualisation environment.

  A number of drivers of change have transformed the roles

a number of drivers of change have transformed the roles functions and responsibilities of an operations manager over

  How instructions are represented and handled by the cpu

What aspects of physics and mathematics are important in the design of VLSI circuits

  Explain standard analog-to-digital sampling rate

What is the bandwidth required (in bps) if synchronous time division multiplexing is used, along with the standard analog-to-digital sampling rate, and each sample is converted into an 8-bit value?

  Protect intellectual property that umuc has on the servers

Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.

  Many phone companies are replacing the wire in their phone

many phone companies are replacing the wire in their phone systems with fiber optic cable. what do they expect to gain

  Investigate methods by which user gain access to network

Investigate the methods by which users could gain access to the network. Pay particular attention to: The problems of having open access for all users.

  Create a file manager in linux

Create a file manager in Linux using shell script. It may coverfollowing features:

  Kind of networking equipment organization need to buy

Let's figure out what kind of networking equipment an organization would need to buy. You can make assumptions on size and budget. What do we need to purchase?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd