IT Networking and Communication: Homework Assignment

Verified

Added on  2025/05/02

|9
|522
|162
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
IT Networking and Communication
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Q1...............................................................................................................................................3
Q2...............................................................................................................................................3
Q3...............................................................................................................................................4
Q4...............................................................................................................................................4
Q5...............................................................................................................................................4
Q6...............................................................................................................................................5
Q7...............................................................................................................................................5
Q8...............................................................................................................................................5
Q9...............................................................................................................................................6
Q10.............................................................................................................................................6
Q11.............................................................................................................................................6
Q12.............................................................................................................................................7
Q13.............................................................................................................................................7
Q14.............................................................................................................................................7
Q15.............................................................................................................................................8
Q16.............................................................................................................................................8
Q17.............................................................................................................................................8
Reference list:.............................................................................................................................9
Document Page
Q1.
As talking about the simple classful and classless addressing: classless addressing is a type of
addressing in which a router has the predefined or a particular path through which the data is
transmitted from one place to another place or can say classless has a one specific default
path to transmit the data from one server to another server. Whereas talking about the classful
addressing, it is the addressing in which the router restricts to the route of the data to be
transmit and as a result the router will discard the data packet to be transmit and make a new
path or route to transmit the data from one place to another place. Both these protocols are
used for the different routing protocols and here we only talking about the IPv4 addressing
protocol. Classless addressing is a type of addressing which allows the allocation of the IP
address more precisely and compact than classful. Every device is connected to network and
the network has the IP address which helps to identify the device present in the network. In
the classful addressing the addresses are defined in five categories and they are separated
according to the size and network whereas, the classless addressing is easy and efficient than
this because it makes the address at the dynamic time and assign a block of address which
consist of certain rules. (Sandeep, 2013)
Q2.
As we have noted and clearly stated in the above module that classful addressing defined and
separated as five classes and these classes are used to give the IP address to the device
present in the network. Five classes used in the classful addressing are class A, class B, class
C, class D and class E. From all these five classes class A, B and C are used for the
commercial purposes and rest are not used or they are rarely used in any scenario. Class A
address are used for the large or big organisations because they have large numbers of hosts
and routers attached to it. Class A has four octets and the first one is used to identify the
network and rest of the three are used to identify the hosts present in the network. Certain
rules are made for the allocation of the address to the device that are the first bit is always 0
and the remaining 7 bits are used to identify network access. The next three uses 24 bits. As
there are 7 bits in network address so the blocks are defined as 128 blocks (27). So, from this
notice that a block in this class is very big and with respect to any organisation also the
blocks are very big so the addresses in class A are wasted.
While talking about the class C, the medium or large size organisation does not use class C
because the number of hosts and routers and very limited and they are few with respect to any
Document Page
big organisation. This will also consist of four octets, first three will used to identify the
network and last is used to identify the hosts because there are a few hosts available in this
class because of this big and medium organisation does not use class C structure. (Thakur,
2019)
Q3.
The basic meaning of subnet mask is to separate the subcomponents from the main
component. Every IP address has two components network and host address. So, the subnet
mask divides the subcomponents into two different components. The masking in IPv4
denotes that it, separate network and host from the IP address. If further subnetting is done on
the host part then it will divide subnet and host address differently. A subnet mask is
basically a 32- bit number which divides the host and network from IP address. The process
to make a subnet mask is make all the network bits 1’s and make all the host bit 0’s.
Subnetting an IP usually denotes that to divide a big network or huge network into multiple
small networks for making the security better.
Q4.
When the device is transferring some data from one place to another place then it must be
connected to a network and requires a host to whom which that device is sending the data.
So, the network address is the address which stores all the information of the device related to
the configurable items. It stores the IP address and the port address of the device. If one has
to find the network address if one of the address in the block is given then one will have to
AND the mask and the any other address given and then easily the network address is taken
out.
Q5.
Subnetting is defined as to separate the subcomponents from the major given component of
the network address. For example, every IP address has two components network part and
host part so the work of subnetting is to divide the main component (IP address) into the
subcomponents (Network address and host address).
The major difference between the subnet mask and the default mask is that, subnet mask is
changed as per the host or subnet given in the network or say it can be dynamic but the
default mask is static and it can be changed by any means, its value is fixed and set to the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
default. Subnet mask divides or separate the network part and host part but default mask is a
mask for the class of network. (Steve, 2019)
Q6.
NAT stands for network address translation and it defined as the process in which the
mapping of IP address is done again into another by made changes or by modifying network
address. This technique will create a shortcut path to transmit the data from one place to
another place from which the readdressing of every host is avoided. (Loshin, 2001)
The main feature of NAT is to allow multiple devices to use the single set of private address
present on the internet when the public IP is sharing. The NAT always keeps tracks of the
connection and will reroute data packet automatically to the host assigned to it.
Q7.
Connection Oriented Connection less
In this the establishment of connection is
necessary between two hosts.
The connection or end to end connection is
not necessary.
The connection is necessary to send the data
packets so that sender will know that the
receiver is ready or not.
Does not require any connection the sender
frequently starts sending the data packet to
the destination port.
The best example is phone call in which the
connection is established between two hosts.
The best example is message in which the
sender does not need that the receiver is
ready to take the data at the exact time.
It sets a virtual links between end to end
networks.
It does not use any end to end connection to
maintain or to send the data from one place
to another place.
(Sheldon, 2019)
Q8.
As fragmentation refers to splitting or dividing any big component or any big material into
smaller once. As per the networking, fragmentation is the method in which the data packet is
divided into sub parts so that the subparts are get in the form of smaller pieces so that the
smaller pieces will directly move through a link smaller than the original packet size.
Document Page
The fragmentation is useful because if there is a big data packet and the intensity of the given
link is low and the data packet is not supposed to transmit from one place to another place
(sender to receiver) then the fragmentation is useful, so that, the big data packet is transmit in
form of small data packets and transmit successfully. (Huston, 2016)
Q9.
First discuss about IPv4 and IPv6. IPv4 is a protocol in which, when the host change network
from one network to another network then a method called handoff is used. There are two
main components of IPv4 that are home agent and foreign agent which are responsible to
execute this process. While talking about IPv6, this is the updated version of IPv4 and does
not contain any home and foreign agent. This will execute the process without this only.
Now, there are three methods to move from IPv4 to IPv6 which are given below:
1. Dual stack: This must be a simplest method to move from IPv4 to IPv6. In this all the
devices which are working on IPv4 will switch to IPv6. If in case many of the system
which supports IPv4 but does not support IPv6 then, they can switch to other
methods.
2. Tunnelling: Tunnelling is a process in which a given packet is encapsulated and then
transmit from source to destination where it is decapsulated and then the data packet
will acquire in the original form. (Wilkins, 2012)
Q10.
Some of the common addresses mapping protocols are described below:
1. Address resolution protocol: It is a communication protocol which is used for
creating physical address which was associated with the given network.
2. Reverse address resolution protocol: It is the network protocol which is used by the
client in LAN for requesting IPv4 (Internet protocol address) from its ARP table.
3. Inverse address resolution protocol: This will use the MAC address to find the IP
address.
Q11.
ICMP stands for Internet Control Message Protocol is a supporting protocol which is used by
the network to send error messages and operational information to the client. The main
difference between ICMP and TCP or UDP is that it is not exchange data between the
devices. The need of Internet control message protocol is that it is used to declare the error
Document Page
and submit that error to the client. For example, id someone is sending one datagram to
destination and before reaching the destination the datagram is crashed or destroyed, so one
will need to find the error that why the datagram is lost, so for this ICMP is used because it
tells the error due to which from that condition the datagram will not be crashed again.
Q12.
Autonomous system is a type of system in which either a single network or multiple networks
which are forming a group can be controlled by a single or Common Network Administrative
(CNA). An autonomous system will globally assign a unique number to each and every
network so they are identified and the numbers are called Autonomous System Numbers
(ASN). When the ASN is assigned to the networks then multiple autonomous systems are
created then that autonomous system shares their routing information from each other.
(Writer, 2017)
Q13.
RIP here stands for Routing information protocol. This will tell the route from which the data
is transmitted from one place to another place and is the oldest vector routing information
protocol which was used earlier. The main advantage of this protocol is that it will prevents
the data from destroyed and this will not make the multiple paths and will prevent from
making the routing loops so that the data will transmit thoroughly.
Q14.
As we have discussed routing Information Protocol thoroughly so, now talking about the
functions of RIP:
The update in the network are exchanged periodically.
When any update will be happens then it will only happen through the broadcast
message.
A complete and full routing table is sent to the client and in the updated format.
When something is sent then it must have a routing information and that information
is always trusted by the router whether it is right or wrong.
It is also a classful routing protocol.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Q15.
OSPF stands for Open Shortest Path First and RIP stands for Routing Information Protocol.
Routing Information protocol consist of only 15 hops and OSPF does not have any limitation
of the hops. It will use as much as it can number of hops due to this condition the OSPF will
propagate message faster. OSPF also allows the router to calculate the routing requests
coming to it for transmit the data from one place to another place. But there is a drawback of
OSPF is that if there are more numbers of routers then the lack in scalability reaches.
Q16.
BGP stands for border gateway protocol which defines the route of the data packets that
through which route the data is to be transmitted in the internet. BGP will directly gave the
data packet to the autonomous systems and then those systems will manage the traffic within
the network. BGP is used for adapting the network stability which guarantees that the
network will send the data packet via a different network when the current network is going
down. (Marquis, 2017)
Q17.
Distance Vector Routing Link State Routing
The requirement of bandwidth is less. The bandwidth required is high.
It is work on local knowledge and update
the table by taking the information from the
neighbours.
It is work on the global knowledge as it has
the information of the whole network.
Uses Bell-man ford algorithm Uses Dijkastra’s algorithm
The network has less traffic The network has high traffic.
A major problem arrives know as count-to-
infinity.
No problem like count-to-infinity arrives.
Document Page
Reference list:
FS (2019). RIP vs OSPF Routing Protocol: What Is the Difference? [online] Blog. Available
at: https://community.fs.com/blog/rip-vs-ospf-what-is-the-difference.html
Huston, G. (2016). Evaluating IPv4 and IPv6 packet fragmentation | APNIC Blog. [online]
APNIC Blog. Available at: https://blog.apnic.net/2016/01/28/evaluating-ipv4-and-ipv6-
packet-frangmentation/
Loshin, P. (2001). Network Address Translation. [online] Computerworld. Available at:
https://www.computerworld.com/article/2591804/network-address-translation.html
Marquis, K. (2017). Border Gateway Protocol (BGP) – Keeran’s Blog. [online] Marquis.co.
Available at: https://blog.marquis.co/border-gateway-protocol-bgp/
Sandeep (2013). Classful and Classless Routing. [online] Tutorial. Available at:
https://www.vskills.in/certification/tutorial/router-support/classful-and-classless-routing/
Sheldon, T. (2019). Connection-Oriented and Connectionless Services (Linktionary term).
[online] Linktionary.com. Available at: https://www.linktionary.com/c/connections.html
Steve (2019). Subnetting and Subnet Masks Explained. [online] Steves-internet-guide.com.
Available at: http://www.steves-internet-guide.com/subnetting-subnet-masks-explained/
Thakur, D. (2019). IP Address Classes or Classful addressing. [online] Ecomputernotes.com.
Available at: http://ecomputernotes.com/computernetworkingnotes/naming-and-addressing/
ip-address-classes
Wilkins, S. (2012). Transition to IPv6 - Moving from IPv4 to IPv6. [online] Petri. Available
at: https://www.petri.com/ipv6-transition
Writer, A. (2017). Why Network Should Use Own Autonomous System Number (ASN) |
Mumbai IX Blogs. [online] Mumbai-ix.net. Available at:
https://www.mumbai-ix.net/blog/why-network-should-use-own-autonomous-system-number-
asn/
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]