This document provides information on networking technologies including APIPA, IP addressing, switches, routers, and VLANs. It discusses the features and functions of each technology and provides examples and explanations. The document also includes a reflection exercise and a list of references.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2NETWORKING TECHNOLOGIES Question 1 Automatic Private IP Addressing also known as APIPA is a feature of old windows operating systems (Windows 98, ME, 2000 and XP) which automatically enables a computer to allocate itself an IP address when the Dynamic Host Configuration Protocol or DHCP is absent or missingfrom the device. APIPA acts as the backup in case of missing DHCP function and helps in configuring and supporting Local Area Networks or LANS. LAN networks require a specific local IP addresses to work properly. The APIPA by default can allocate IP addresses between 169.254.0.0 and 169.254.255.255 (Comer, 2018). Each of these addresses are guaranteed to not conflict with other routable addresses. This enables APIPA to allot IP addresses to multiple computers connected locally to the same LAN network. This makes APIPA capable of handling a broadcast of a LAN domain without any help in the absence of a manual configuration or DHCP. Question 2 Given IP address: 172.16.100.0/22Division: Class BCIDR = 22 22 Network bits 10 Host bits. Maximum number of assignable IP addresses: 2^10= 1024 Total number of networks possible: 2^6= 64 The IP address sub netting is given below: 1. Two networks each having 32 IP addresses
3NETWORKING TECHNOLOGIES Subnet Name Needed Size Allocate d SizeAddressMaskDec MaskAssignable RangeBroadcast A3262172.16.100.0/26255.255.255.19 2 172.16.100.1 - 172.16.100.62172.16.100.63 B3262172.16.100.6 4/26255.255.255.19 2 172.16.100.65 - 172.16.100.12 6 172.16.100.12 7 2. Five networks each having 64 IP addresses Subnet Name Neede d Size Allocate d SizeAddressMaskDec MaskAssignable RangeBroadcast A64126172.16.101.0/25255.255.255.12 8 172.16.101.1 - 172.16.101.12 6 172.16.101.12 7 B64126172.16.101.12 8/25255.255.255.12 8 172.16.101.12 9 - 172.16.101.25 4 172.16.101.25 5 C64126172.16.102.0/25255.255.255.12 8 172.16.102.1 - 172.16.102.12 6 172.16.102.12 7 D64126172.16.102.12 8/25255.255.255.12 8 172.16.102.12 9 - 172.16.102.25 4 172.16.102.25 5 E64126172.16.103.0/25255.255.255.12 8 172.16.103.1 - 172.16.103.12 6 172.16.103.12 7 3. Three networks each having 128 IP addresses Subnet Name Needed Size Allocated SizeAddressMaskDec MaskAssignable RangeBroadcast A128254172.16.103.0/24255.255.255.0172.16.103.1 - 172.16.103.254172.16.103.255 B128254172.16.104.0/24255.255.255.0172.16.104.1 - 172.16.104.254172.16.104.255
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4NETWORKING TECHNOLOGIES C128254172.16.105.0/24255.255.255.0172.16.105.1 - 172.16.105.254172.16.105.255 4. One network each having 256 IP addresses Subnet Name Needed Size Allocated SizeAddressMaskDec MaskAssignable RangeBroadcast A256510172.16.106.0/23255.255.254.0172.16.106.1 - 172.16.107.254172.16.107.255 Question 3 Switches are designed to use Media Access Control addresses to identify the receiver of the information packets (Tanenbaumet al., 2019). The switch is able to keep a record of the addresses of the unknown devices and add it to the information table, whenever an unknown source sends it a signal. Hence, as soon as it receives a destination MAC address, it starts to tally it with the address book and sends the packet to it if the address is found or else it floods all the devices attached to the switch. Routers use router protocols to exchange the routing tables values to all routers connected to that network. The two main protocols used are Distance-vector protocols and Link state protocols (Hanes et al., 2017). This feature allows a router to share information over multiple routers. Thus all routers are connected to the internetwork. Also one router can connect to multiple networks due to multiple ports. Hence sharing of information to multiple routers is easier in routers. Due to the absence of this feature, a switch only shares information in a single
5NETWORKING TECHNOLOGIES network and has only one switching table and cannot share information like routers to populate switching tables in other switches. Question 4 Every Virtual LAN or VLAN have their own broadcast domain. They also use their own MAC address table to refer to when sending information packets. The VLANS also have their individual ports that only they have access to. Due to this a problem arises for the switch during sending a information packet from one device to another. This problem happens because the VLAN of both the different devices have different MAC addresses. This problem can be solved by configuring the route of the VLANs by routing them to the concerned devices using a router (Vidal et al., 2019). A router can connect to multiple VLANs and act as a medium of communication between them which is not possible over a single network. Therefore, it becomes essential to use a router for communicating between two VLANS of two different devices. Reflection Exercise a) The last two modules have taught me about the concept of MAC address, Routers, Switches and VLANS. Switches are mainly used to transfer information to separate devices whose MAC addresses are kept recorded in the switch’s data storage table. MAC address is the physical address of a device which is separate for each and every device. These networking technologies are very useful as they form the core of this subject. b) The switches and its different configuration is also very hard for me to understand. The setup formation of switch along with the details of the switching tables and information exchanges is quite a complex mechanism. The function of switches in VLAN is also quite complex for me to comprehend. In VLANs, each individual VLAN has its own set of addresses and rules to
6NETWORKING TECHNOLOGIES communicate. This results in the more complex situations when connecting multiple VLANs together. This makes the matter more confusing.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7NETWORKING TECHNOLOGIES References Comer, D. E. (2018).The Internetbook: everythingyou need to know about computer networking and how the Internet works. Chapman and Hall/CRC. Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., & Henry, J. (2017).IoT fundamentals: Networking technologies, protocols, and use cases for the internet of things. Cisco Press. Tanenbaum, A., Wetherall, D., Kurose, J., & Ross, K. (2019). Computer Networks Title: Computer Networking: A Top-Down Approach.Instructor,201901. Vidal,I.,Soto,I.,Banchs,A.,Garcia-Reinoso,J.,Lozano,I.,&Camarillo,G.(2019). Multimedia Networking Technologies, Protocols, and Architectures. Artech House.