Networking Assignment: IPv4 Addressing and Routing Protocols

Verified

Added on  2025/05/02

|8
|2147
|383
AI Summary
Desklib provides solved assignments and past papers to help students understand complex networking concepts.
Document Page
Assignment 2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1. What are the differences between classful and classless addressing in IPv4?
Its full name is Internet protocol version 4. The classful addressing segregated in five major
parts class A, B, C, D, and E which are for providing first 8 bit, provide first 16 bit
network, provide 24 first bit for network, it do not have any host Id or network ID, also it
don't have network id and host id respectively. The major difference between classful and
classless is more efficient rather than classful addressing to provide the new IP address for
any system or computer.
Classless have another name also classless inter-domain router (CIDR). It is more efficient
to allocate an IP address. It always helps in whenever the user needs a new IP address
number this method assigns a complete a block of IP address by following certain rules and
the allocated block is known as CIDR block.
In classful network ID allocation, it changes every time because it depends on network ID
and host ID. But the classless is boundary-less it does not depend over network ID and host
ID. Along with the classless addressing is used for quick IP address allocation.
2. Explain why most of the addresses in classAarewasted.Explain why a medium or large size
organization does not want a clock of class C.
The size of block A is too large for any organization. Hence it implies that most of the
address in class A wasted and are not going to be used. Along with class A have 24-bit
subnet for addressing which is very enough for almost 17, million devices. Most of the
devices have very small fractions of the number of the devices so sometimes most of the
addresses of devices are not used. Thus the block in class C is too small for any
organization.
3. What is a mask in IPv4 addressing?
Document Page
Over any internet protocol, all the machines are fetched same data packets which are sent
over the network. The traffic over the network is directly connected to the number of
computers. When the number of computers wills increases the traffic over the network will
automatically get increased. Thus it is the cause of decrement in performance of network
dramatically. To deal such situation the network engineers segregates the network into two
or more sub-networks to reduce the traffic over the single individual network. The network
segregation can be done by the help of routers which will transmit data to specific, not to
every network. While dividing the network into two or more parts the subnet mask will be
used. The subnet default mask ID’s for class A, B, C is 255.0.0.0, 255.255.0.0
255.255.255.0 respectively.
4. What is network address in block address? How can we find the network address if one of
the blocks is known?
The internet protocol hierarchy is divided into a lot of different classes to deal with various
situations as per the host network; it is segregated in five octal parts separations
Class A address: the very initial bust if the IP’s octal is always zero hence the first octal
range is 1-127. Hence address will look like as 1.x.x.x to 126.x.x.x.
Class B: it belongs to a very initial bit of octal set which is from and its range is 128-191
Thus the address will be like this 128.0.x.x to 191.255.x.x.
Class C: it is 3 bit set of 110 characters and its range is 192-223. Hence the IP address
range is like 192.0.0.x to 223.255.255.x
Class D: the first-bit octal ion class D set of 1110 and its range is 224-239.
Thus the IP address range looks as 224.0.0.0 to 239.255.255.255.
Class E: this section is only for experiments and study.
5. Briefly define subnetting. How does the subnet mask differ from a default mask in classful
addressing?
Document Page
It is a type of method to separate a single network in more than two separated network. It
divided into two parts host segments and network segments. Subnets are introduced to
solve the issue of shortage of IP address over the internet.
The default subnet mask is a type of anachronism. But nowadays it is not going to use
more. The default subnets mask used in IPV4 networks such as class A, class b, class c, so
there is a very small number of classful space when the internet took off.
6. What is NAT? How can NAT help in address depletion?
Its full name is network address translation which is introduced to conserve the IP
addresses. It used to connect unregistered and private IP networks to the internet. NAT is
used to operate and connect the minimum of two networks by the help of router. Now due
to the explosion of technology the available IPV4 addresses are not so enough. Hence NAT
is designed to deal with such issue by providing temp addresses.
7. what is the difference between connection-oriented and connection fewer services
in connection-oriented service there will be the connection will be established first to make
communications and then a message will be sent by one end to check the connection and
then the connection will be released.
Connectionless oriented services are very similar to the postal services because it also
needs the address of sender and receiver.
In connection-oriented service, every time authentication must be needed but in
connectionless service, there is no need for authentication.
Connection-oriented services are well founded rather than connectionless
Connection-oriented is stream based and connectionless services are message based.
8. Define fragmentation and why it is needed?
The fragmentation is a situation in which the information of one file is stored in the different
sections due to its insufficient space. The fragmentation occurs in three forms which are as
follows: internal fragmentation, external fragmentation, data fragmentation. Due to useless
allocated space, the performance of the system is affected and internal fragmentation occurs due to
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
the presence of bytes in each file. External fragmentation happens when a lot of files are created.
Data fragmentation occurs if a huge volume of a file is differentiating in various sections. The
fragmentation is necessary because it helps to transfer the data or files easily. The fragmentation
includes a header on all packets and when these packets go into other networks networking device
need the file in fragments and the small files are fit into the maximum transmission unit.
9. List transition strategies to move from IPv4 to IPv6. Explain the differences between
tunneling and dual stack strategies during the transition period.
There are various strategies or methods which are used to move the network from IPv4 to IPv6
such as Dual stack, tunneling, and translation. The dual-stack strategy is used to make the
transition from the core to edge whereas; tunneling strategy is used to carry the protocols. Dual-
stack is the simple method which is used to run IPv6 in all the devices which are running in IPv4 at
present time however, tunneling transporting IPv6 traffic with the help of IPv4 network. The dual
stack includes two IP protocols for the transition while the tunneling includes IPv6 packets and
summarize in IPv4 packets for sending one protocol to inside other. It is easy to run the networks
in dual-stack as compare to tunneling. Dual-stack is the first node which receives the external
traffics from outside networks and tunneling further transfer the received traffic.
10. What are some common address mapping protocols and in which scenario would you use
each
It is a type of mapping of internet protocol addresses in the form of a physical address in
the for a form of IPs, for example, internet protocol version 4 is one of the most common
protocols in today. Along with also provide the physical address of any device which is
also known as media access control (MAC address). While sending or receiving any file or
message very firstly it arrives at the gateway, gateway takes permission from the ARP
program and then the physical address (MAC) will be or receiver to deploy the data.
11. What is ICMP and why do we need it?
ICMP (Internal Control Message Protocol) is an error-reporting protocol network which is used by
routers to produce the error message when the networks are failed in the delivery of the internet
protocol packets. It generates message due to network problems but it is not a transfer protocol
Document Page
which forward information between systems. The internal control message protocol is very
necessary to transfer the error information and router updates. ICMP is used by network
administrators to identify the cause of troubleshooting internet connections. It is used to send
source quench message, identify problems of parameters, redirection verification of message.
12. What is an autonomous system?
An autonomous system is a bunch of IP (Internet protocol) which are used to manage the network
operators. It is the system that gives information about the scopes and functions of internet
protocols. The autonomous system connects the different networks like interior gateway protocols
(IGPs) and exterior gateway protocols (EGPs) with the help of intermediary devices within an
organization and it is managed by a single authority. The interior gateway protocols are used to
exchange the information by routers inside an autonomous system and exterior gateway protocols
help in the summary discussion of that information. The autonomous system also connects the
different public and private networks within an organization.
Q. 13. The purpose of RIP message is to provide a router for requesting and receiving the
information of routing regarding an autonomous system or for sharing the data periodically with
the neighbors. It also used for HOP count for calculating the distance to the destination. The hop
count to a network that is directly connected is 0 from a router. This routing information protocol
(RIP) is a distance-vector routing protocol that is oldest and employs the hop count as a routing
metric. Routing information protocol also prevents the loops of routing by applying a limit on the
hop's number that is allowed in a source path to the destination. This protocol uses an improved
hop count like a path for determining the network distance. Improvement proves the fact that
network engineers can create a high cost of paths.
14. What are the functions of a RIP message?
Its full name is routing information protocols. It is a dynamic type of protocols which counts the
hops to find the best path to send any message to the source and destination of the network. It
chooses a very small path between the sender and the receiver. It works over distance vector
routing protocols.
Document Page
It updates the networks after a certain period and updates the routing information to make the
broadcast.
Q. 15. The open shortest path first (OSPF) messages are faster than the routing information
protocol messages because RIP messages are slowly distributed as the used network is depended
on the periodic updates that come in every 30 seconds for receiving the news from one router to
another to another. RIP protocol only has 15 hops maximum but the open shortest path first
(OSPF) has unlimited hop count. So it converges faster than routing information protocol and it
also has better balancing of the load. The open shortest path first (OSPF) is the intradomain routing
protocol that is depended on link state routing. It also has an autonomous system as the domain.
For making the route efficient there is divided an autonomous system into areas in OSPF that
includes hosts, routers, and network.
Q.16. The purpose of Border Gateway Protocol (BGP) is to manage how packets are routed by the
route exchange across the internet and reachability information between the edge routers. It also
directs packets between the autonomous systems. In this networks are managed through a service
provider and single enterprise. It also gives more control over the advertisements that are accepted
and routes that are advertised from the neighbors. It also helps in selecting the route and selecting
the neighbor’s route also. Because of this Border Gateway Protocol (BGP) is the routing protocol
for the internet. It is also used as a routing protocol between ISPs that are known as external
Border Gateway Protocol. It is the core routing protocol including ISP networks that is internal
Border Gateway Protocol.
Q.17. Distance vector protocols use maximum bandwidth because they send routing table
completely whereas link state protocols send particular updates only at the time when the changes
in topology occur. The examples of Distance vector protocols are routing information
protocol(RIP) and EIGRP. While the examples of links state protocols are open shortest path first
(OSPF) and IS-IS. Distance vector protocols use the Bellman-Ford algorithm for information of
topology form the point of view of neighbor and link state protocols use Dijsktra algorithm for
getting full information on the network topology. In Distance vector protocols, best path
calculation is based on minimum hop number and in links state protocols, it is based on the cost.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]