Differences between classful and classless addressing in IPv4, Subnetting, NAT, ICMP, Autonomous System, RIP, BGP, Distance Vector Routing and Link State Routing
VerifiedAdded on  2023/04/23
|11
|2291
|70
AI Summary
This document discusses the differences between classful and classless addressing in IPv4, subnetting, NAT, ICMP, autonomous system, RIP, BGP, distance vector routing and link state routing. It also covers various transition strategies from IPv4 to IPv6, address mapping protocols, and fragmentation.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ASSIGNMENT 2
ASSIGNMENT 2
Name of Student
Name of University
Author’s Note
ASSIGNMENT 2
Name of Student
Name of University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ASSIGNMENT 2
1. The differences between classful and classless addressing in IPv4 is mentioned below
Sr. number Classful addressing Classless addressing
1 It divides an IP address into
two parts host ID and
network ID.
This allows the users to
utilize the variable length
of subnet masking.
2 In this classes A, B and C
are used but class D is
utilized for the purpose of
multitasking.
In the same network it uses
a different subnet mask.
3 Limits the number of
networks that a host can be
provided with
No boundary is put for
network ID or host ID.
Table 1: differences between classful and classless addressing
(Source: Shang, Zhang& Wan, 2014, p. 165)
2. Subnet of an A class usually has around 24 bits that can be used for addressing. This
amount of memory is more than enough for around 16 million devices. Most of the
entities have a minimum fraction of devices; hence most of the addresses get wasted or is
not used. Unlike class A, class C is comparatively small for most organizations,
especially large ones, hence medium or large sized organization does not a clock of class
C.
1. The differences between classful and classless addressing in IPv4 is mentioned below
Sr. number Classful addressing Classless addressing
1 It divides an IP address into
two parts host ID and
network ID.
This allows the users to
utilize the variable length
of subnet masking.
2 In this classes A, B and C
are used but class D is
utilized for the purpose of
multitasking.
In the same network it uses
a different subnet mask.
3 Limits the number of
networks that a host can be
provided with
No boundary is put for
network ID or host ID.
Table 1: differences between classful and classless addressing
(Source: Shang, Zhang& Wan, 2014, p. 165)
2. Subnet of an A class usually has around 24 bits that can be used for addressing. This
amount of memory is more than enough for around 16 million devices. Most of the
entities have a minimum fraction of devices; hence most of the addresses get wasted or is
not used. Unlike class A, class C is comparatively small for most organizations,
especially large ones, hence medium or large sized organization does not a clock of class
C.
2ASSIGNMENT 2
3. A subnet mask in IPv4 defines the IP addresses that can be included in the subnet. The
mask hides the network part of the IPv4. The value present in the mask describes the
number of hosts that can be included in the subnet. In this, the value of an octet would be
higher than the octet at its right (Shang, Droms & Zhang, 2016). The smaller values in
octet translated to the one having a more number of hosts which can connect to the
subnet.
4. In a specific block of addresses, the network address is a physical or logical address,
which uniquely distinguishes the network node over a specific compute. It is the
numerical network part of IP address. Suppose an IP address is provided like 194.176.1.0,
the network address would be 194.176.1.
In a provided block of address, the network address can be found. Suppose
the provided block of address is 199.199.17.85, in this the network has to be found out.
The default mask is provided as 277.277.0.0, this means that only 2 bytes are preserved
and rest of the two bytes have value 0. Hence the network address is 199.199.0.0.
5. Subneeting can be defined as a process that allows an administrator to divide specific
classes like class A, class B and class C network into small parts (Shojafar,
Cordeschi&Abawajy, 2015). These subnets caN again be subnetted into sub-nets.
Subnetting can be utilized in order to divide a specific address into various
smaller parts. In classful addressing, a subnet mask can be changed depending on the
requirements of hosts’ or subnets. Default address cannot be changed based on
requirements, they remain the same for a specific address class (Sllame, 2014). Subnet
masks help in distinguishing network and host parts in a classful address. Whereas
default mask is a subnet mask for a particular class of network.
3. A subnet mask in IPv4 defines the IP addresses that can be included in the subnet. The
mask hides the network part of the IPv4. The value present in the mask describes the
number of hosts that can be included in the subnet. In this, the value of an octet would be
higher than the octet at its right (Shang, Droms & Zhang, 2016). The smaller values in
octet translated to the one having a more number of hosts which can connect to the
subnet.
4. In a specific block of addresses, the network address is a physical or logical address,
which uniquely distinguishes the network node over a specific compute. It is the
numerical network part of IP address. Suppose an IP address is provided like 194.176.1.0,
the network address would be 194.176.1.
In a provided block of address, the network address can be found. Suppose
the provided block of address is 199.199.17.85, in this the network has to be found out.
The default mask is provided as 277.277.0.0, this means that only 2 bytes are preserved
and rest of the two bytes have value 0. Hence the network address is 199.199.0.0.
5. Subneeting can be defined as a process that allows an administrator to divide specific
classes like class A, class B and class C network into small parts (Shojafar,
Cordeschi&Abawajy, 2015). These subnets caN again be subnetted into sub-nets.
Subnetting can be utilized in order to divide a specific address into various
smaller parts. In classful addressing, a subnet mask can be changed depending on the
requirements of hosts’ or subnets. Default address cannot be changed based on
requirements, they remain the same for a specific address class (Sllame, 2014). Subnet
masks help in distinguishing network and host parts in a classful address. Whereas
default mask is a subnet mask for a particular class of network.
3ASSIGNMENT 2
6. Network Address Translation (NAT) can be described as a process in which a specific
network device generally a firewall provides a public address to a computer into a private
network (Shang, Zhang& Wan, 2014). It helps in limiting the number of public IP
addresses which can be used by a company for any purpose.
It utilizes the method of remapping a particular IP address space into a
different one, this is done by modifying the information of network address in the IP
header.
7. Differences between connection oriented and connection fewer services are as follows
Connection oriented Connection less
Here the virtual connection is formed
before a packet is sent through the
internet.
Packets are sent without any virtual
connection over the internet.
Requires authentication of the
destination node.
No authentication destination is
required.
It is more reliable because of the
network created.
It does not secure any reliability
Table 2: the difference between connection oriented and connection fewer services
(Source: Welter, White&Hunt, 2015, p. 165)
8. Fragmentation is an activity that happens when the contents of a particular file are stored
in a specific space that is non-contiguous in nature.
6. Network Address Translation (NAT) can be described as a process in which a specific
network device generally a firewall provides a public address to a computer into a private
network (Shang, Zhang& Wan, 2014). It helps in limiting the number of public IP
addresses which can be used by a company for any purpose.
It utilizes the method of remapping a particular IP address space into a
different one, this is done by modifying the information of network address in the IP
header.
7. Differences between connection oriented and connection fewer services are as follows
Connection oriented Connection less
Here the virtual connection is formed
before a packet is sent through the
internet.
Packets are sent without any virtual
connection over the internet.
Requires authentication of the
destination node.
No authentication destination is
required.
It is more reliable because of the
network created.
It does not secure any reliability
Table 2: the difference between connection oriented and connection fewer services
(Source: Welter, White&Hunt, 2015, p. 165)
8. Fragmentation is an activity that happens when the contents of a particular file are stored
in a specific space that is non-contiguous in nature.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4ASSIGNMENT 2
Fragmentation is needed because with the help of this, data is stored close to
the place where it is mostly used. The data that is not required is not stored. Data is
secured if fragmentation is done; there is no chance that the data would be available to
unauthorized users.
9. The list of various transition strategies that can be used in order to move from IPv4 to
IPv6 is dual stack routers, tunneling and NAT protocol translation.
ď‚· Dual stack routers: a particular router might be installed with the
IPv4 as well as IPv6 addresses that are configured on the interfaces
and points to the network of a relevant scheme of IP. The router helps
in speaking with all the hosts on Ipv4 as well as IPv6. This provides a
medium to hosts for accessing a server with no change in the IP
versions.
Figure 2: dual stack routers
(Source: Zhang, Ren&Tang, 2015, p. 143)
ď‚· Tunneling: tunneling provides a good solution where the data of the
user can pass through an IP version which is not generally supported.
Transit network can be on IPv4 or IPv6.
Fragmentation is needed because with the help of this, data is stored close to
the place where it is mostly used. The data that is not required is not stored. Data is
secured if fragmentation is done; there is no chance that the data would be available to
unauthorized users.
9. The list of various transition strategies that can be used in order to move from IPv4 to
IPv6 is dual stack routers, tunneling and NAT protocol translation.
ď‚· Dual stack routers: a particular router might be installed with the
IPv4 as well as IPv6 addresses that are configured on the interfaces
and points to the network of a relevant scheme of IP. The router helps
in speaking with all the hosts on Ipv4 as well as IPv6. This provides a
medium to hosts for accessing a server with no change in the IP
versions.
Figure 2: dual stack routers
(Source: Zhang, Ren&Tang, 2015, p. 143)
ď‚· Tunneling: tunneling provides a good solution where the data of the
user can pass through an IP version which is not generally supported.
Transit network can be on IPv4 or IPv6.
5ASSIGNMENT 2
Diagram 3: tunneling
(Source: Sllame, 2014, p.45)
10. Some commonly used address mapping protocols are Address Resolution Protocol
(ARP), Reverse Address Resolution Protocol (RARP), the Bootstrapping Protocol (BP)
and Dynamic Host Configuration Protocol (DHCP).
Suppose a user has two routers and they are connected through Ethernet,
ARP can be used. RARP can be used in mapping any type of network layer protocol
address to any type of hardware MAC address. Using BP informs Consul of the expected
number of nodes and it automatically bootstraps when the number of servers is already
available. BP can be used in scenarios where inconsistencies as well as split- brain
situations are needed to be avoided. Suppose in a particular case, there has been
conflicting among the IP addresses, in this case, DHCP can be utilized to reduce the
conflicts among the IP addresses.
11. Internet Control Message Protocol (ICMP) can be defined as a protocol that reports errors
(Shang, Zhang& Wan, 2014). This protocol is generally used by routers in order to show
an error message to the source when various problems in the network do not deliver IP
packets.
ICMP helps in gathering data regarding the network, along with detecting
errors, hence it is important to use.
12. An autonomous system is a unit of the router policy that is usually controlled with the
help of a common network administrator who acts on behalf of a single administrator
Diagram 3: tunneling
(Source: Sllame, 2014, p.45)
10. Some commonly used address mapping protocols are Address Resolution Protocol
(ARP), Reverse Address Resolution Protocol (RARP), the Bootstrapping Protocol (BP)
and Dynamic Host Configuration Protocol (DHCP).
Suppose a user has two routers and they are connected through Ethernet,
ARP can be used. RARP can be used in mapping any type of network layer protocol
address to any type of hardware MAC address. Using BP informs Consul of the expected
number of nodes and it automatically bootstraps when the number of servers is already
available. BP can be used in scenarios where inconsistencies as well as split- brain
situations are needed to be avoided. Suppose in a particular case, there has been
conflicting among the IP addresses, in this case, DHCP can be utilized to reduce the
conflicts among the IP addresses.
11. Internet Control Message Protocol (ICMP) can be defined as a protocol that reports errors
(Shang, Zhang& Wan, 2014). This protocol is generally used by routers in order to show
an error message to the source when various problems in the network do not deliver IP
packets.
ICMP helps in gathering data regarding the network, along with detecting
errors, hence it is important to use.
12. An autonomous system is a unit of the router policy that is usually controlled with the
help of a common network administrator who acts on behalf of a single administrator
6ASSIGNMENT 2
entity. This system can also be defined as the one that can be referred to a routing
domain.
13. RIP is an administrator routing protocol which enables routes for updating their tables
used in routing within an autonomous system.
14. RIP message is usually used by a router in order to request ads well as receive routing
data regarding an autonomous system or to share knowledge from time to time with its
surroundings (Erez & Wool, 2015). It utilizes hop count in order to measure the distance
between the source and destination.
15. In RIP, the message packer is first received, it is processed and then an update is sent, in
the case of OSPF the LSA is flooded first and then the message is processed. In OSPF the
convergence is very fast, hence the messages travel much faster than in RIP.
16. Border Gateway Protocol can be defined as a routing protocol that is used in transferring
information and data between a huge number of host gateways, autonomous systems.
Border Gateway Protocol is also a path vector protocol that maintains paths for different
hosts; it avoids collisions among data transferred to different hosts. The routing decisions
are based on the paths decided (Ensafi, Knockel & Alexander, 2014). It does not make
use of Interior Gateway Protocol in order to take routing decisions; it decides the routes
based on the paths, rule sets and network policies. The purpose of Border Gateway
Protocol (BGP) is providing reach ability as well as routing data among numerous
systems that are autonomous in nature and are present on internet. The Border Gateway
Protocol supports a huge number of policies, these policies include allowing the Internet
Service Providers the activity of manipulating the routing, and this is done in order to get
inter-domain traffic control that is useful in nature.
entity. This system can also be defined as the one that can be referred to a routing
domain.
13. RIP is an administrator routing protocol which enables routes for updating their tables
used in routing within an autonomous system.
14. RIP message is usually used by a router in order to request ads well as receive routing
data regarding an autonomous system or to share knowledge from time to time with its
surroundings (Erez & Wool, 2015). It utilizes hop count in order to measure the distance
between the source and destination.
15. In RIP, the message packer is first received, it is processed and then an update is sent, in
the case of OSPF the LSA is flooded first and then the message is processed. In OSPF the
convergence is very fast, hence the messages travel much faster than in RIP.
16. Border Gateway Protocol can be defined as a routing protocol that is used in transferring
information and data between a huge number of host gateways, autonomous systems.
Border Gateway Protocol is also a path vector protocol that maintains paths for different
hosts; it avoids collisions among data transferred to different hosts. The routing decisions
are based on the paths decided (Ensafi, Knockel & Alexander, 2014). It does not make
use of Interior Gateway Protocol in order to take routing decisions; it decides the routes
based on the paths, rule sets and network policies. The purpose of Border Gateway
Protocol (BGP) is providing reach ability as well as routing data among numerous
systems that are autonomous in nature and are present on internet. The Border Gateway
Protocol supports a huge number of policies, these policies include allowing the Internet
Service Providers the activity of manipulating the routing, and this is done in order to get
inter-domain traffic control that is useful in nature.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7ASSIGNMENT 2
17. The differences between Distance Vector Routing and Link State Routing are mentioned
below
Field of comparison Distance Vector Routing Link State Routing
Algorithm Bellman ford Dijsktra
Best path calculation It is calculated on the basis
of the least number of hops
occurred
It takes place on the basis of
the cost.
Updates The entire table of routing
is updated
This provides only updates
of link state
Frequent updates This provides updates very
frequently
This provides triggered
updates
Memory and CPU This utilizes low memory
while updates are taking
place
This utilizes intensive
memory when updates are
carried out
Simplicity This uses simple methods This needs a very trained
administrator of the
network
Convergence time The convergence time is
moderate
The convergence time in
this case is very fast.
Network view The topology information is
from the point of view of a
Complete data on the
concept of network
17. The differences between Distance Vector Routing and Link State Routing are mentioned
below
Field of comparison Distance Vector Routing Link State Routing
Algorithm Bellman ford Dijsktra
Best path calculation It is calculated on the basis
of the least number of hops
occurred
It takes place on the basis of
the cost.
Updates The entire table of routing
is updated
This provides only updates
of link state
Frequent updates This provides updates very
frequently
This provides triggered
updates
Memory and CPU This utilizes low memory
while updates are taking
place
This utilizes intensive
memory when updates are
carried out
Simplicity This uses simple methods This needs a very trained
administrator of the
network
Convergence time The convergence time is
moderate
The convergence time in
this case is very fast.
Network view The topology information is
from the point of view of a
Complete data on the
concept of network
8ASSIGNMENT 2
neighbor. topology is required
Hierarchical structure This does not contain any
hierarchical structure
This contains a hierarchical
structure
Table 3: the difference between Distance Vector Routing and Link State Routing
(Source: Sllame, 2014, p. 345)
neighbor. topology is required
Hierarchical structure This does not contain any
hierarchical structure
This contains a hierarchical
structure
Table 3: the difference between Distance Vector Routing and Link State Routing
(Source: Sllame, 2014, p. 345)
9ASSIGNMENT 2
References
Ensafi, R., Knockel, J., Alexander, G., & Crandall, J. R. (2014, March). Detecting intentional
packet drops on the Internet via TCP/IP side channels. In International Conference on
Passive and Active Network Measurement (pp. 109-118). Springer, Cham.
Erez, N., & Wool, A. (2015). Control variable classification, modeling and anomaly detection in
Modbus/TCP SCADA systems. International Journal of Critical Infrastructure
Protection, 10, 59-70.
Shang, W. L., Zhang, S. S., & Wan, M. (2014). Modbus/TCP communication anomaly detection
based on PSO-SVM. In Applied Mechanics and Materials (Vol. 490, pp. 1745-1753).
Trans Tech Publications.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP
architecture. Technical Report NDN-0038. NDN Project.
Shojafar, M., Cordeschi, N., Abawajy, J. H., &Baccarelli, E. (2015, December). Adaptive
energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. In Globecom
Workshops (GC Wkshps), 2015 IEEE (pp. 1-6). IEEE.
Sllame, A. M. (2014, June). Modeling and simulating MPLS networks. In Networks, Computers
and Communications, The 2014 International Symposium on (pp. 1-6). IEEE.
Twycross, M., & Carpenter, S. (2017). Masks and masking in medieval and early Tudor
England. Routledge.
Welter, D. E., White, J. T., Hunt, R. J., & Doherty, J. E. (2015). Approaches in highly
parameterized inversion—PEST++ Version 3, a Parameter ESTimation and uncertainty
References
Ensafi, R., Knockel, J., Alexander, G., & Crandall, J. R. (2014, March). Detecting intentional
packet drops on the Internet via TCP/IP side channels. In International Conference on
Passive and Active Network Measurement (pp. 109-118). Springer, Cham.
Erez, N., & Wool, A. (2015). Control variable classification, modeling and anomaly detection in
Modbus/TCP SCADA systems. International Journal of Critical Infrastructure
Protection, 10, 59-70.
Shang, W. L., Zhang, S. S., & Wan, M. (2014). Modbus/TCP communication anomaly detection
based on PSO-SVM. In Applied Mechanics and Materials (Vol. 490, pp. 1745-1753).
Trans Tech Publications.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP
architecture. Technical Report NDN-0038. NDN Project.
Shojafar, M., Cordeschi, N., Abawajy, J. H., &Baccarelli, E. (2015, December). Adaptive
energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. In Globecom
Workshops (GC Wkshps), 2015 IEEE (pp. 1-6). IEEE.
Sllame, A. M. (2014, June). Modeling and simulating MPLS networks. In Networks, Computers
and Communications, The 2014 International Symposium on (pp. 1-6). IEEE.
Twycross, M., & Carpenter, S. (2017). Masks and masking in medieval and early Tudor
England. Routledge.
Welter, D. E., White, J. T., Hunt, R. J., & Doherty, J. E. (2015). Approaches in highly
parameterized inversion—PEST++ Version 3, a Parameter ESTimation and uncertainty
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10ASSIGNMENT 2
analysis software suite optimized for large environmental models (No. 7-C12). US
Geological Survey.
Williamson, D. S., Wang, Y., & Wang, D. (2016). Complex ratio masking for monaural speech
separation. IEEE/ACM Transactions on Audio, Speech and Language Processing
(TASLP), 24(3), 483-492.
Zhang, J., Ren, F., Tang, L., & Lin, C. (2015). Modeling and solving TCP incast problem in data
center networks. IEEE Transactions on Parallel and Distributed Systems, 26(2), 478-491.
analysis software suite optimized for large environmental models (No. 7-C12). US
Geological Survey.
Williamson, D. S., Wang, Y., & Wang, D. (2016). Complex ratio masking for monaural speech
separation. IEEE/ACM Transactions on Audio, Speech and Language Processing
(TASLP), 24(3), 483-492.
Zhang, J., Ren, F., Tang, L., & Lin, C. (2015). Modeling and solving TCP incast problem in data
center networks. IEEE Transactions on Parallel and Distributed Systems, 26(2), 478-491.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.