ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

COIT20261 Network Routing and Switching Assignment-1

Verified

Added on  2023/06/14

|7
|2108
|350
AI Summary
COIT20261 Network Routing and Switching Assignment-1 requires students to demonstrate their knowledge of basic routing concepts by completing a number of exercise questions. The questions contain numerical as well as descriptive questions covering the material up to Week 6. The assessment is worth 15% and is due by 11:45pm AEST, Friday, Week 6. The questions will be marked on correctness, logic and clarity, and addressing all parts of the question.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COIT20261 Network Routing and Switching (Term 1, 2018)
Assignment item —Written Assessment-1
Due date:
11:45pm AEST, Friday, Week 6
ASSESSMEN
T
Weighting: 15% 1
Objectives
This assessment task requires you to demonstrate your knowledge of basic routing concepts
by completing a number of exercise questions. The questions contain numerical as well as
descriptive questions covering the material up to Week 6.
The questions are designed to help you to achieve the unit learning outcomes as listed in the
unit profile.
Instructions
You must do this assignment on your own – it is not a group assignment.
Type all your answers in the ‘Template for Your Answers’ Section of this document and
upload only that template. You could do that by copying the Template section into a new
Word document for uploading. Answers that are not typed into the “Template for Your
Answers” section may not be marked, or may be returned to you for re-typing and re-
submission – late penalties will apply.
Where instructed, you must show the steps you took to arrive at your answers. Write
your answers in your own words to avoid potential plagiarism and copyright violations.
You must submit the Answer section as a Word file (.doc or .docx). Do not submit PDF’s
or any other type of file without express permission from the Unit Coordinator.
Plagiarism Procedures can be found in the CQUniversity Policies section of the Unit Profile.
Assessment Requirements and Marking Criteria
There are 3 main questions with some sub-questions and the requirements are stated for each
one. You must answer all questions and their sub-questions. Marks are indicated in the
Answer Template.
The questions will be marked on correctness, logic and clarity, and addressing all parts of the
question.
The Assignment Questions begin on the next page.
USE THE PROVIDED TEMPLATE ON P.4 FOR ALL YOUR ANSWERS.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
COIT20261 Network Routing and Switching (Term 1, 2018)
Assignment item —Written Assessment-1
Question 1 – Address usage (3 marks)
Consider the following classless address block:
154.78.177.3/27
List the addresses from this block that would be used as:
a) the network address,
b) the direct broadcast address, and
c) the range available for hosts to use
Show the steps you took to arrive at your answers.
Question 2– Allocating subnets from a block (8 marks)
A company has been granted a block of addresses which includes the address
138.77.216.5/24. Answer the following questions, showing your calculations.
a) Calculate the network address of this block and how many host addresses
including special addresses this block can provide (1 mark)
b) Create the following 6 subnets for this company by calculating the subnet
address for each subnet. Answer this question by filling in the table in the
Answer template. Use CIDR format for the mask.
I. 2 subnets with 32 addresses each (2 marks)
II. 4 subnets with 16 addresses each (4 marks)
c) After some time, the company decides that it wants another subnet with 1,024
addresses. Explain whether this can be allocated from the existing block.
(1 mark)
Question 3 – Network Tools (Windows) (4 marks)
Often the best way to gain an initial familiarity with network tools is to simply use them, at a
basic level in exploratory mode as suggested in some of the tutorial exercises. Netstat and
Tracert are included in Windows, while Wireshark is free to download and install. Explore
Wireshark, Netstat and Tracert, then complete this question.
a) A wireshark scan has produced a packet capture, saved to a file named
wireshark_capture01.pcapng and available on the Unit website. Download the file
and open it in Wireshark, then answer these questions about the scan:
i. Very briefly summarise in your own words the content in each of the three
horizontal display windows in Wireshark (.5 mark)
ii. In Frame 3, what brand of computer launched this scan and what was its IP
address? State where this information is found (.5 mark)
iii. Briefly explain the exchange event captured in frames 4 - 6 (.5 mark)
Document Page
COIT20261 Network Routing and Switching (Term 1, 2018)
Assignment item —Written Assessment-1
iv. Describe in your own words two specific network problems that a network
administrator could use Wireshark for as a troubleshooting tool? (.5 mark)
b) A ‘NETSTAT –aon’ command has given the output below (excerpted). Briefly
describe each column heading, and the states LISTENING, ESTABLISHED and
CLOSE_WAIT. (1 mark)
Active Connections
Proto Local Address Foreign Address State PID
TCP 10.0.0.58:139 0.0.0.0:0 LISTENING
TCP 10.0.0.58:5040 0.0.0.0:0 LISTENING 7480
TCP 10.0.0.118:139 0.0.0.0:0 LISTENING 4
TCP 10.0.0.118:52450 52.63.165.133:443 ESTABLISHED 14080
TCP 10.0.0.118:52458 104.116.191.195:443 CLOSE_WAIT 8912
TCP 10.0.0.118:52791 40.100.151.2:443 ESTABLISHED 22400
TCP 10.0.0.118:52811 162.125.34.129:443 ESTABLISHED 4696
TCP 10.0.0.118:52820 34.232.224.128:443 CLOSE_WAIT 4696
TCP 10.0.0.118:52879 162.125.34.129:443 ESTABLISHED 4696
...
c) Do a TRACERT on your computer to www.google.com. Paste the output to your
assignment answer template and discuss the information being displayed (1 mark)
Document Page
COIT20261 Network Routing and Switching (Term 1, 2018)
Assignment item —Written Assessment-1
TEMPLATE FOR YOUR ANSWERS
Type your answers in this section in the spaces provided
First Name:_________________________ Last Name:_________________________
Student ID: __________________________
Question Number Mark
allocated
Mark
earned
Question 1: (3 marks) 3
a)
b)
c)
Given classless address block – 154.78.177.3 /27
Address: 154.78.177.3 10011010.01001110.10110001.000
00011
Netmask: 255.255.255.224 = 27 11111111.11111111.11111111.111
00000
Wildcard: 0.0.0.31 00000000.00000000.00000000.000
11111
=>
Network: 154.78.177.0/27 10011010.01001110.10110001.000
00000 (Class B)
Broadcast: 154.78.177.31 10011010.01001110.10110001.000
11111
HostMin: 154.78.177.1 10011010.01001110.10110001.000
00001
HostMax: 154.78.177.30 10011010.01001110.10110001.000
11110
Hosts/Net: 30
The address from the block that would be used as the network address is
154.78.177.0 /27
The address from the block that would be used as the direct broadcast
address is 154.78.177.31
The address from the block that would be used as the range of available host
to use is HostMin: 154.78.177.1 - HostMax: 154.78.177.30
1 mark
each
item,
total 3
Question 2: (8 marks) 8
a) Given block of address – 138.77.216.5 /24
The network address for the block is 138.77.216.0 /24
The number of host including the special address that can be provided by the
block is 256.
1
b) Subnet No. addresses Subnet address Mask /n
1 32 138.77.216.0 /26
6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
COIT20261 Network Routing and Switching (Term 1, 2018)
Assignment item —Written Assessment-1
2 32 138.77.216.64 /26
3 16 138.77.216.128 /27
4 16 138.77.216.160 /27
5 16 138.77.216.160 /27
6 16 138.77.216.224 /27
c) For the inclusion of additional subnet using the network address 138.77.216.0
having the subnet mask /24 it fails because for the subnet mask
255.255.255.0. There are only 254 number of usable host address that can be
allocated but the 6
1
Question 3: (4 marks) 4
a)
i)
ii)
iii)
iv)
The interface of the wireshark consists of three horizontal panels, the first
panel is names as the “packet list pane”, the second panel is the “packet
details Pane” and the third is the “packet byte pane”. In the packet list pane
the captured packets are demonstrated and on the selection of a packet the
details of the packets is displayed on the packet details pane next to it. The
packet details pane shows the generated fields and the links such as TCP
information, IP address and validation checksum. The packet byte pane
displays a hex dump of the data in a set of 16 hexadecimal bytes and 16 ASCII
bytes.
From analysis of the wire shark packet the brand of computer that
launched the scan can be identified along with the IP address. The
details of the brand and the IP address are given below:
Brand – Hewlett (Found on expanding the Ethernet II)
IP address - 138.77.216.88 (Found on expanding the internet protocol
version 4)
For explaining the details of the packet captured from frame 4 to 6
the .pcap file is analyzed and it is found that in the frame 4, a hello
message is sent to the client from the server for establishing connection
between the client and the server. A packet with a header file containing
the protocol version, compression methodology, certificate request,
session ID and cipher suite is sent. The 5th frame verifies the certificate
sent and in the 6the frame the “hello message done” is forwarded for
establishment of the connection and completion of the verification.
The wireshark helps the network administrator for identification of the
flow of data packets in the network and resolving different issues such
as DDoS and Phishing attacks. The network administrator can monitor
the network and identify any intrusion and handling the data traffic
.5 mark
each
item,
total 2
for 3a.
Document Page
COIT20261 Network Routing and Switching (Term 1, 2018)
Assignment item —Written Assessment-1
efficiently.
b)
Proto Column is the first column found after the execution of the netstat
–a command listing all the IP addresses with the corresponding port
number. The proto column is the short form of protocol and is used for
listing the TCP or the UDP connection for the machine. The local IP
address of the machine is listed in the second column along with the port
number. The third columns shows the state of the connection and the last
column shows the process id of the connections.
States
LISTENING, ESTABLISHED and CLOSE_WAIT demonstrates the
status of the sockets. “LISTENING” demonstrates the open ports for
accepting the inbound connections. “ESTABLISHED” is used if there is
an actual connection between the local machine and the remote IP for
identification of the available port to exchange data traffic in the
network. The “CLOSE_WAIT” is used if a connection has terminated.
1
c)
Discussion
The tracert command is used for getting the IP address of the domain
“www.google.com”, and it also determines the time taken for reaching the
destination router. Here 9 hop address are used to reach the destination
address and its corresponding IP address is 172.217.163.132.
1
Total marks awarded 15 (max)
Less late penalties if applicable
Less plagiarism penalties if applicable
Total marks earned
Document Page
COIT20261 Network Routing and Switching (Term 1, 2018)
Assignment item —Written Assessment-1
Markers comments:
Bibliography
Carthern, C., Wilson, W., Bedwell, R. and Rivera, N., 2015. The Network Layer
with IP. In Cisco Networks (pp. 49-68). Apress, Berkeley, CA.
Chappell, L., 2017. Wireshark 101: Essential Skills for Network Analysis-
Wireshark Solution Series. Laura Chappell University.
Coskun, I.E., Canbaz, M.A. and Gunes, M.H., 2016, November. Efficient as
Network Topology Measurement Based on Ingress to Subnet Reachability.
In Local Computer Networks Workshops (LCN Workshops), 2016 IEEE 41st
Conference on (pp. 87-95). IEEE.
Hirayama, T., Toyoda, K. and Sasase, I., 2015, November. Fast target link
flooding attack detection scheme by analyzing traceroute packets flow.
In Information Forensics and Security (WIFS), 2015 IEEE International
Workshop on (pp. 1-6). IEEE.
Mandal, N. and Jadhav, S., 2016, March. A survey on network security tools for
open source. In Current Trends in Advanced Computing (ICCTAC), IEEE
International Conference on (pp. 1-6). IEEE.
Voggenreiter, O. and Gupta, A., 2017. Determining User Location Using IP
Address and Historical Device Locations.
1 out of 7
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]