Solution: Internetworking with TCP/IP Assignment, Fall 2024
VerifiedAdded on 2022/09/12
|6
|1279
|22
Homework Assignment
AI Summary
This document presents a detailed solution to an Internetworking with TCP/IP assignment. The solution addresses three key functionalities of the internet layer in TCP/IP, including selecting the next-hop, capturing packets, and providing error detection and diagnostic capabilities using protocols like ARP and ICMP. It also explains the header length field in IPv4 addresses and classifies example IP addresses into Class A and Class D. Furthermore, the solution includes a network numbering diagram and provides a comprehensive bibliography of relevant sources. The assignment covers core concepts of network layers, protocols, and addressing, offering a valuable resource for students studying computer networking.

Running head: INTERNETWORKING WITH TCP/IP
Internetworking with TCP/IP
Name of the Student:
Name of the University:
Author Note
Internetworking with TCP/IP
Name of the Student:
Name of the University:
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
INTERNETWORKING WITH TCP/IP
Answer to question number 1
The three primary functionality performed by the internet layer in TCP/IP are:
Selecting the next-hop: The internet layer is helpful in providing the gateway to the next hop or
node the packets must pass into. The link layer implementation is done here in this layer. This
layers makes sure that the packets arrive at the required destination irrespective of the routes
adopted by them (Shang, Dorms & Zhang, 2016). In addition to this, the logical host addresses
are implemented by the internet layer which is known as the IP Address. It is used to provide the
internetworking route among the devices which connected within the network (Shang, Dorms &
Zhang, 2016). The path of data transmission is suggested by this layer. In case of the same local
network the IP datagram is sent over the LAN, MAN and WAN and is known as the direct
delivery. In a distant network the datagram is sent indirectly. This can be done easily by help of
the routers.
Capturing packets: The transport layer protocol are fed the packets which are incoming and the
captured packets and pass packet payloads are passed on to these layers appropriately (Goralski,
2017). It made sure the data which is sent and received over the network are generally done
securely and the data is encapsulated as messages in the IP datagram.
Provide error detection and diagnostic capability: The ARP Protocol and the ICMP Protocol are
internet layer protocols. The Address Resolution Protocol is required to find the physical address
from the IP addresses. The ARP request and he ARP reply functions are performed by the ARP
protocol in the internet layer (Martinez, Cataldo & Heredia, 2016). When a sender would like to
know the physical address of a particular device, it would broadcast the request from the ARP to
the network (Shang, Dorms & Zhang, 2016). All the devices which are attached to the network
INTERNETWORKING WITH TCP/IP
Answer to question number 1
The three primary functionality performed by the internet layer in TCP/IP are:
Selecting the next-hop: The internet layer is helpful in providing the gateway to the next hop or
node the packets must pass into. The link layer implementation is done here in this layer. This
layers makes sure that the packets arrive at the required destination irrespective of the routes
adopted by them (Shang, Dorms & Zhang, 2016). In addition to this, the logical host addresses
are implemented by the internet layer which is known as the IP Address. It is used to provide the
internetworking route among the devices which connected within the network (Shang, Dorms &
Zhang, 2016). The path of data transmission is suggested by this layer. In case of the same local
network the IP datagram is sent over the LAN, MAN and WAN and is known as the direct
delivery. In a distant network the datagram is sent indirectly. This can be done easily by help of
the routers.
Capturing packets: The transport layer protocol are fed the packets which are incoming and the
captured packets and pass packet payloads are passed on to these layers appropriately (Goralski,
2017). It made sure the data which is sent and received over the network are generally done
securely and the data is encapsulated as messages in the IP datagram.
Provide error detection and diagnostic capability: The ARP Protocol and the ICMP Protocol are
internet layer protocols. The Address Resolution Protocol is required to find the physical address
from the IP addresses. The ARP request and he ARP reply functions are performed by the ARP
protocol in the internet layer (Martinez, Cataldo & Heredia, 2016). When a sender would like to
know the physical address of a particular device, it would broadcast the request from the ARP to
the network (Shang, Dorms & Zhang, 2016). All the devices which are attached to the network

2
INTERNETWORKING WITH TCP/IP
would be able to accept the requests from the ARP and process the request received by them.
The IP addresses are identified only by the recipient and the physical address is sent back in the
form of an ARP reply. The physical addresses are added to both the cache memory and the
datagram of the header (Baccarelli et al., 2017). In addition to this, the Internet Control Message
Protocol is the mechanism which is used by the hosts and the routers connected in the network to
notify the senders about the problems occurring in the network.
A datagram is routed using a number of routers throughout the network before finally
reaching to the aforesaid destination. In case there are some unusual situation like the links
which are disabled, in the network. In case a datagram remains undelivered then the notification
is sent to the ICMP Test and ICMP Reply are part of the ICMP protocol (Samain et al., 2017).
The major responsibility of these functions are to test whether the packet is able to reach the
destination or not. In addition to this, the ICMP Reply has been use the check the response of the
recipient. The responsibility of the ICMP protocol is that the protocol sends the report only and
does not correct them (Patil, Padole & Student, 2016). In addition to this, the correction would
not be done by the protocol however, the notifications would be sent.
Answer to question number 2
The header length field in the IPv4 addresses is 4-bit field. It provides the length of the
header field of the address. It is also helpful in identifying the area from where the data begins
actually.
INTERNETWORKING WITH TCP/IP
would be able to accept the requests from the ARP and process the request received by them.
The IP addresses are identified only by the recipient and the physical address is sent back in the
form of an ARP reply. The physical addresses are added to both the cache memory and the
datagram of the header (Baccarelli et al., 2017). In addition to this, the Internet Control Message
Protocol is the mechanism which is used by the hosts and the routers connected in the network to
notify the senders about the problems occurring in the network.
A datagram is routed using a number of routers throughout the network before finally
reaching to the aforesaid destination. In case there are some unusual situation like the links
which are disabled, in the network. In case a datagram remains undelivered then the notification
is sent to the ICMP Test and ICMP Reply are part of the ICMP protocol (Samain et al., 2017).
The major responsibility of these functions are to test whether the packet is able to reach the
destination or not. In addition to this, the ICMP Reply has been use the check the response of the
recipient. The responsibility of the ICMP protocol is that the protocol sends the report only and
does not correct them (Patil, Padole & Student, 2016). In addition to this, the correction would
not be done by the protocol however, the notifications would be sent.
Answer to question number 2
The header length field in the IPv4 addresses is 4-bit field. It provides the length of the
header field of the address. It is also helpful in identifying the area from where the data begins
actually.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
R4
N7
N1 R2
N2
R1
R3
N4
N3
R5
R6
R7
R8
INTERNETWORKING WITH TCP/IP
Answer to question number 3
227.12.14.87- Class D as there are 11100011 bit in the first byte of the address. Hence,
the address is a class D address. Class D addresses are generally reserved for the
multicasting.
14.23.120.8- Class A as there 00001110 bit in the first byte of the address. Hence, the
address is in class A. This type of addresses is generally used for the large networks.
Answer to question number 4
As per the diagram provided for the question, the network numbering has been done as
per the Instruction derived in the diagram.
N8
N5
R4
N7
N1 R2
N2
R1
R3
N4
N3
R5
R6
R7
R8
INTERNETWORKING WITH TCP/IP
Answer to question number 3
227.12.14.87- Class D as there are 11100011 bit in the first byte of the address. Hence,
the address is a class D address. Class D addresses are generally reserved for the
multicasting.
14.23.120.8- Class A as there 00001110 bit in the first byte of the address. Hence, the
address is in class A. This type of addresses is generally used for the large networks.
Answer to question number 4
As per the diagram provided for the question, the network numbering has been done as
per the Instruction derived in the diagram.
N8
N5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
INTERNETWORKING WITH TCP/IP
Bibliography
Abed, A. E. (2017). Hiding Text in Sequence Number Field of TCP/IP (Doctoral dissertation,
Ministry of Higher Education).
Acharya, S., & Tiwari, N. (2016). Survey of DDoS attacks based on TCP/IP protocol
vulnerabilities. IOSR Journal of Computer Engineering, 18(3), 68-76.
Alexander, G., & Crandall, J. R. (2015, April). Off-path round trip time measurement via TCP/IP
side channels. In 2015 IEEE Conference on Computer Communications (INFOCOM)
(pp. 1589-1597). IEEE.
Baccarelli, E., Naranjo, P. G. V., Shojafar, M., & Scarpiniti, M. (2017). Q*: Energy and delay-
efficient dynamic queue management in TCP/IP virtualized data centers. Computer
Communications, 102, 89-106.
Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan
Kaufmann.
Hariyanto, D., Pauzi, G. A., & Supriyanto, A. (2017). Deteksi Letak Kebocoran Pipa
Berdasarkan Analisis Debit Air Menggunakan Teknologi Sensor Flowmeter Berbasis
TCP/IP. Jurnal Teori dan Aplikasi Fisika, 5(1), 25-30.
Kak, A. (2019). Lecture 16: TCP/IP Vulnerabilities and DoS Attacks: IP Spoofing, SYN
Flooding, and The Shrew DoS Attack.
Martinez, D. A., Cataldo, A., & Heredia, R. R. (2016). TCP/IP Communication for a De-
Manufacturing Transport Line. In Memorias de Congresos UTP (pp. 56-59).
INTERNETWORKING WITH TCP/IP
Bibliography
Abed, A. E. (2017). Hiding Text in Sequence Number Field of TCP/IP (Doctoral dissertation,
Ministry of Higher Education).
Acharya, S., & Tiwari, N. (2016). Survey of DDoS attacks based on TCP/IP protocol
vulnerabilities. IOSR Journal of Computer Engineering, 18(3), 68-76.
Alexander, G., & Crandall, J. R. (2015, April). Off-path round trip time measurement via TCP/IP
side channels. In 2015 IEEE Conference on Computer Communications (INFOCOM)
(pp. 1589-1597). IEEE.
Baccarelli, E., Naranjo, P. G. V., Shojafar, M., & Scarpiniti, M. (2017). Q*: Energy and delay-
efficient dynamic queue management in TCP/IP virtualized data centers. Computer
Communications, 102, 89-106.
Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan
Kaufmann.
Hariyanto, D., Pauzi, G. A., & Supriyanto, A. (2017). Deteksi Letak Kebocoran Pipa
Berdasarkan Analisis Debit Air Menggunakan Teknologi Sensor Flowmeter Berbasis
TCP/IP. Jurnal Teori dan Aplikasi Fisika, 5(1), 25-30.
Kak, A. (2019). Lecture 16: TCP/IP Vulnerabilities and DoS Attacks: IP Spoofing, SYN
Flooding, and The Shrew DoS Attack.
Martinez, D. A., Cataldo, A., & Heredia, R. R. (2016). TCP/IP Communication for a De-
Manufacturing Transport Line. In Memorias de Congresos UTP (pp. 56-59).

5
INTERNETWORKING WITH TCP/IP
Patil, S., Padole, D. V., & Student, P. (2016). TCP/IP remote communication for Arduino based
motion control using virtual instrumentation. International Journal of Engineering
Science, 4648.
Ramesh, C. D. M. K. K., Havaldar, M. I. T. R. M., & Dilip, A. (2016). Embedded Web server
using TCP/IP protocol.
Samain, J., Carofiglio, G., Muscariello, L., Papalini, M., Sardara, M., Tortelli, M., & Rossi, D.
(2017). Dynamic adaptive video streaming: Towards a systematic comparison of icn and
tcp/ip. IEEE Transactions on Multimedia, 19(10), 2166-2181.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP
architecture. Technical Report NDN-0038. NDN Project.
INTERNETWORKING WITH TCP/IP
Patil, S., Padole, D. V., & Student, P. (2016). TCP/IP remote communication for Arduino based
motion control using virtual instrumentation. International Journal of Engineering
Science, 4648.
Ramesh, C. D. M. K. K., Havaldar, M. I. T. R. M., & Dilip, A. (2016). Embedded Web server
using TCP/IP protocol.
Samain, J., Carofiglio, G., Muscariello, L., Papalini, M., Sardara, M., Tortelli, M., & Rossi, D.
(2017). Dynamic adaptive video streaming: Towards a systematic comparison of icn and
tcp/ip. IEEE Transactions on Multimedia, 19(10), 2166-2181.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP
architecture. Technical Report NDN-0038. NDN Project.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.