What is the subnet mask of the subblocks

Assignment Help Computer Networking
Reference no: EM131426632

TCP/IP Principles and Protocols Written Assessment

Question 1: You are given a block of IPv4 address with its CIDR notation as 132.34.12.0/23. Your organization needs to have three (3) sub-blocks of addresses to use in its three subnets as shown below:

  • First subblock of 120 usable host IP addresses.
  • Second subblock of 100 usable host IP addresses.
  • Third subblock of 60 usable host IP addresses.

Calculate the subnetworks and answer the following questions for all three of the subblocks. Make sure you show detailed calculations to get full marks in this question.

a) What is the subnet mask of the subblocks? 

b) What is first and last address of the subblocks? 

Question 2: Download and open 'Assignment one.pkt' using Packet Tracer. It is a working network with a number of network components. Answer the following questions in the context of the given network.

a. List all the network devices (except PCs) present in this network and their associated OSI layers.

b. Identify number of available networking ports and default bandwidth each of the routers support.

c. In the given network there are two types of Ethernet cable used to connect networking peripherals. Identify those two types of networking cables and explain their differences in terms of uses in the given network.

Question 3: Consider 20 pairs of hexadecimal values of an IP datagram below and answer the following questions. Make sure you do necessary conversions to represent the specific value asked for in the questions.

45 00 00 ED FB D1 40 00 FA 06 B6 FC 8A 4D 04 2F 8A 4D B4 72

a) What hexadecimal value/s represents the IP version used in the datagram?  What version of IP is used in this datagram?

b) What hexadecimal value/s represents the size of the IP header of the datagram?  What is the total length of the IP header in bytes (8 bits) in the given datagram?

c) What hexadecimal value/s represents the total length of this datagram in bytes?  What is the total length of the given datagram in bytes (8 bits)?

Question 4: a) Find the topology of the network if Table below is the routing table for R1.

Mask

Network Address

Next-Hop Address

Interface

/27

202.14.18.224

----

m1

/18

145.23.195.0

----

m0

Default (0.0.0.0)

default

150.56.12.10

m3

b) What is the size of an Ethernet frame carrying an ARP packet?

Attachment:- Assignment Files.rar

Reference no: EM131426632

Questions Cloud

Research one of the four companies : Research one of the four companies and see how or if that company has since changed (yet more) since the time of the book's publication. How did that recent change fit with or not fit in with the "lessons" that the textbook mentions the company "l..
Prepare only the front pages of form 1065 : The partnership use the land as a parking lot for the business. The partnership purchased the land four years ago on March 17 for $30,000 and sold it on August 15 of the current year for $35,050 - Prepare Short-term investment
Enhance the number of millennial leaders : Examine the best practices that your team can cultivate to enhance the number of millennial leaders. Explain how you would present this information to senior managers in your organization.
Probability that exactly one will not meet itf diameter : Suppose six tennis balls will be used in a tournament game. What is the probability that exactly one will not meet ITF diameter specifications? Assume independence.
What is the subnet mask of the subblocks : COIT12206 TCP/IP Principles and Protocols Written Assessment. Calculate the subnetworks and answer the following questions for all three of the subblocks. Make sure you show detailed calculations to get full marks in this question. What is the subn..
What are the measures of center and why are they important : Describe the level of measurement for each variable included in your data set.Discuss the importance of the Measures of Center and the Measures of Variation.What are the measures of center and why are they important?What are the measures of variation..
Probability that 60 of given shots take less than 45 seconds : Suppose a golfer takes 72 strokes to complete the round. What is the probability that at least 60 of these shots take less than 45 seconds?
What would be a reasonable sampling plan for the component : The company accept a 5% risk of rejecting good batches, and a 10% risk of accepting bad batches. What would be a reasonable sampling plan for the component?
Explain the type of structure the organization has : Then, briefly describe the type of structure the organization has and explain how it is effective in accomplishing the organization's goals. Discuss the advantages and disadvantages of the structure.

Reviews

len1426632

3/14/2017 3:57:14 AM

Please write your answers to all questions in the ‘ANSWERS_TEMPLATE_ASSIGNMENT_ONE.docx’ document and upload only the template with answers. It is better that you show all your working and steps in your calculations for all questions. Although, you may provide only the final answer in computational questions unless otherwise stated in your question’s instruction. However, if the answer incorrect (even a typo error), you will receive zero marks. Hence, it is better that you show all your working and steps in your calculations.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd