Analysis of IPv4/IPv6 Addressing, Protocols, and Transition Methods

Verified

Added on  2023/04/23

|8
|1547
|432
Homework Assignment
AI Summary
This assignment provides detailed answers to questions regarding IPv4 and IPv6 addressing, protocols, and transition strategies. It covers classful versus classless addressing, reasons for address wastage in Class A, the role of subnet masks, and network address identification. The solution further explains subnetting, NAT and its impact on address depletion, differences between connection-oriented and connectionless services, and the necessity of IP fragmentation. Transition strategies from IPv4 to IPv6, including tunneling and dual-stack approaches, are discussed, along with common address mapping protocols like ARP and RARP. The role of ICMP in error reporting, the concept of autonomous systems, and the functionalities of RIP and OSPF routing protocols are also explained. The assignment concludes by highlighting the use of BGP for inter-autonomous system communication, providing a comprehensive overview of IP networking concepts.
Document Page
Running head: NETWORKING
NETWORKING
Name of student
Name of university
Author’s note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
NETWORKING
Answer of question 1:
In any classful addressing system, the division of all the accessible IP addresses is done in
five classes like the A, B, C, D, and E, where the most used classes are the A, B, and C and
the Class D is used for multicast and it is not commonly used. The reason why the addresses
are called classful addresses is because each of the IP addresses have its place to a particular
class.
The classless addressing is the technique for allocating and then specifying all internet
addresses, and the flexibility of using this in the inter-routing is highest. In this method the bit
number that are used for the portion of the network of any IP address becomes variable rather
than fixed (Salehan & Negahban, 2013). For any classless addressing, the relationship among
the bit numbers that are used in any portion of the network and the value of first byte address.
Answer of question 2:
In a network of class A, the first dotted decimal or the primary eight bits is part of network of
the address with the rest part of the address is the host of address. The possibility of the class
A network are 128 (De-Marcos et al., 2014). This ranges from the 0.0.0.0 to 127.0.0.0 and the
early few addresses are not utilised by any of the addresses and therefore they are wasted.
Answer of question 3:
The separation of the IP address in any host address and subnet is done by the subnet mask,
when it is a requirement of any subnetwork. It is referred as the subnet mask because it
identifies the network address of IP address by the performing of any bitwise AND operation
of the netmask (Zhang et al., 2013).
Answer of question 4:
Document Page
2
NETWORKING
The identifier for any host or the node is the network address on a block of network. The
network address designing is done for being unique identifiers all across the network, even
though it is allowed for the local and private addresses on the network or any no unique
administered address that is not unique (Comer, 2018). In some situations, the network
address might not be included in some of the host of the network, which is more than one
along the identification of the network interface might not be exclusive. The method of
finding the network address from a block address by using this formula: CIDR (/28): 2³² ²⁸ =
2⁴ = 16.
Answer of question 5:
This is the strategy of partitioning the single physical network in several minor logical sub-
networks (Bernardos et al., 2014). Subnets is designed with the acceptance of the bits from
the host part of IP address. More consecutive 1s than the corresponding default mask is
included in the subnet mask.
Answer of question 6:
The assigning of the public address to the computer where a network, usually any firewall
that is inside the private network is known as NAT. This is method of remapping an IP
address space into one another by using the changes of the information of the network in
header of the IP of packers while the transmitted is being done across a device of routing.
Answer of question 7:
The requirement of the connection oriented is the establishment of the connection of session
before the data transmission is carried out. It is considered to be reliable network service.
There is no requirement of the session connection among the receiver and the sender in
connection less services are services (Pathak et al., 2015).
Document Page
3
NETWORKING
Answer of question 8:
The IP fragmentation is the procedure of IP, which breakdowns the packets into minor pieces
for the allowing of passage for the pieces using any link with minimum MTU than the
original size of packet. The main requirement of the process is the execution of the fast
transmission of packets in a network.
Answer of question 9:
The strategies for transition are:
NAT protocol translation
Tunnelling
Dual stack routers
In the tunnelling procedure, various IP version exist on intermediate transit or the path
networks (Grigorik, 2013). In the dual stack, the installation of routers is done with
configuration with the addresses of IPv6 and IPv4 on interfaces on network of the connected
scheme of IP.
Answer of question 10:
RARP: This is the method of dynamic mapping when physical address is offered with logical
address.
ARP: When physical address is not provided and the logical address is also given then the
utilisation of the ARP method is done that is the dynamic mapping method.
Answer of question 11:
ICMP: The Internet Control Message Protocol is the protocol for reporting error of the
network devices that is used by the routers for generating the error messages to source IP
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
NETWORKING
address when any problems in network prevents the delivery of the IP packets (Kim &
Feamster, 2013). The ICMP makes and transmits the messages to source IP address that
indicates that any gateway to internet that any service, host or router could not be reached for
the delivery of packet.
Answer of question 12:
The collection of the connected prefixes of the IP routing that consists of one or more than
one operators on the network is autonomous system on behalf of a single entity of the
administrator or domains that represents a clearly, common policy of routing, which is
defined to internet.
Answer of question 13:
The RIP is utilised for the prevention of the loops in routing by implementing limit on the
hop numbers, which is permitted to any path from the source to destination.
The mechanisms of holddown, split horizon, and route poisoning is deployed by RIP for the
prevention of the incorrect information of the routing from being transmitted (Hwang
Ramakrishnan & Wood, 2015).
Answer of question 14:
RIP message functions is used by a router for the requesting and then receiving the routing
information related to the autonomous system for the periodic sharing of the knowledge with
neighbors.
Answer of question 15:
The propagation of the OSPF messages are done immediately as the router that is using the
OSPF would immediately flood the network about any alterations in the vicinity
Document Page
5
NETWORKING
(Johannisson, 2017). The distribution of the RIP messages is done slowly than the OSPF
messages.
Answer of question 17:
An inter autonomous communication is performed by BGP. The use of this protocol is to
manage the routing of packets across internet.
Document Page
6
NETWORKING
References
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., &
Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE
wireless communications, 21(3), 52-61.
Comer, D. E. (2018). The Internet book: everything you need to know about computer
networking and how the Internet works. Chapman and Hall/CRC.
De-Marcos, L., Domínguez, A., Saenz-de-Navarrete, J., & Pagés, C. (2014). An empirical
study comparing gamification and social networking on e-learning. Computers &
Education, 75, 82-91.
Grigorik, I. (2013). High Performance Browser Networking: What every web developer
should know about networking and web performance. " O'Reilly Media, Inc.".
Hwang, J., Ramakrishnan, K.K. & Wood, T. (2015). NetVM: high performance and flexible
networking using virtualization on commodity platforms. IEEE Transactions on
Network and Service Management, 12(1), pp.34-47.
Pathak, P. H., Feng, X., Hu, P., & Mohapatra, P. (2015). Visible light communication,
networking, and sensing: A survey, potential and challenges. IEEE communications
surveys & tutorials, 17(4), 2047-2077.
Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile
phones become addictive. Computers in Human Behavior, 29(6), 2632-2639.
Zhang, G., De Leenheer, M., Morea, A., & Mukherjee, B. (2013). A survey on OFDM-based
elastic core optical networking. IEEE Communications Surveys & Tutorials, 15(1),
65-87.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
NETWORKING
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]