Assessment Item 2: Network Configuration and Troubleshooting in TCP/IP
VerifiedAdded on 2025/04/27
|20
|2198
|498
AI Summary
Desklib provides past papers and solved assignments for students. This solved assignment covers TCP/IP networking concepts.

ITC542 - INTERNETWORKING WITH TCP/IP
ASSESSMENT ITEM 2
ASSESSMENT ITEM 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Q1....................................................................................................................................................2
Q2....................................................................................................................................................4
Hands On Project 2-3...................................................................................................................4
Hands-On Project 3.2...................................................................................................................4
Q3..................................................................................................................................................13
Q4..................................................................................................................................................14
References......................................................................................................................................19
Table of Figure
Figure 1: Finding subnet..................................................................................................................4
Figure 2: opening Wireshark...........................................................................................................5
Figure 3: project step 2....................................................................................................................5
Figure 4: project step 3....................................................................................................................6
Figure 5: project step 4....................................................................................................................7
Figure 6: project step 5....................................................................................................................7
Figure 7: project step 6....................................................................................................................8
Figure 8: project step 7....................................................................................................................8
Figure 9: project step 8....................................................................................................................9
Figure 10: project step 9................................................................................................................10
Figure 11: project step10...............................................................................................................10
Figure 12: project step 11..............................................................................................................11
Figure 13: project step 12..............................................................................................................12
Figure 14: Network Design..........................................................................................................17
1
Q1....................................................................................................................................................2
Q2....................................................................................................................................................4
Hands On Project 2-3...................................................................................................................4
Hands-On Project 3.2...................................................................................................................4
Q3..................................................................................................................................................13
Q4..................................................................................................................................................14
References......................................................................................................................................19
Table of Figure
Figure 1: Finding subnet..................................................................................................................4
Figure 2: opening Wireshark...........................................................................................................5
Figure 3: project step 2....................................................................................................................5
Figure 4: project step 3....................................................................................................................6
Figure 5: project step 4....................................................................................................................7
Figure 6: project step 5....................................................................................................................7
Figure 7: project step 6....................................................................................................................8
Figure 8: project step 7....................................................................................................................8
Figure 9: project step 8....................................................................................................................9
Figure 10: project step 9................................................................................................................10
Figure 11: project step10...............................................................................................................10
Figure 12: project step 11..............................................................................................................11
Figure 13: project step 12..............................................................................................................12
Figure 14: Network Design..........................................................................................................17
1

Q1.
OSI model is referred to the most commonly recommended network framework model this
model comprises of 7 different layers that deals with various task over the data packet sent or
received to a device in a network. These layers play a most important role in transmitting any
data packet from one host to another in a network. Down below are the functionalities of every
layer of the OSI model.
L1 – This layer is commonly known as the physical layer of the model. This layer deals with the
physical appearance of network devices such as network interfaces and more. This layer is also
known as the physical mode of transmission of the data packet in a communicated network
(Zimmermann, 2013).
L2 – This layer is commonly known as the data link layer. the task of this is a layer in the
network is that this layer has all the responsibility to produce all the frames of data packets that
are required to store various information at various different layers. This layer deals with the
physical address of the device from which the data packet is sent.
L3 – This layer is commonly known as the network layer. this layer deals with the formation of
packets that can be transmitted to the network. This layer requires the logical address of the
device from which the data packet is sent to the network. This layer encapsulates the source and
destination host address in the header of the packet that will further be used to identify the owner
of the packet.
L4 – This layer is commonly known as the Transport layer. In this layer, the data packet is
transmitted to its destination using a certain and appropriate method, these methods in a network
identified as protocols. Such as TCP and UDP. This layer deals either the ports value of the data
packet to identify the mode of transmission of the packet.
L5 – This layer is commonly known as the session layer. this layer performs the tasks to handle
all the active sessions in the network between 2 or more host in a network. This layer manages
synchronization between all the activity performed in the network to prevent disputes between
hosts.
2
OSI model is referred to the most commonly recommended network framework model this
model comprises of 7 different layers that deals with various task over the data packet sent or
received to a device in a network. These layers play a most important role in transmitting any
data packet from one host to another in a network. Down below are the functionalities of every
layer of the OSI model.
L1 – This layer is commonly known as the physical layer of the model. This layer deals with the
physical appearance of network devices such as network interfaces and more. This layer is also
known as the physical mode of transmission of the data packet in a communicated network
(Zimmermann, 2013).
L2 – This layer is commonly known as the data link layer. the task of this is a layer in the
network is that this layer has all the responsibility to produce all the frames of data packets that
are required to store various information at various different layers. This layer deals with the
physical address of the device from which the data packet is sent.
L3 – This layer is commonly known as the network layer. this layer deals with the formation of
packets that can be transmitted to the network. This layer requires the logical address of the
device from which the data packet is sent to the network. This layer encapsulates the source and
destination host address in the header of the packet that will further be used to identify the owner
of the packet.
L4 – This layer is commonly known as the Transport layer. In this layer, the data packet is
transmitted to its destination using a certain and appropriate method, these methods in a network
identified as protocols. Such as TCP and UDP. This layer deals either the ports value of the data
packet to identify the mode of transmission of the packet.
L5 – This layer is commonly known as the session layer. this layer performs the tasks to handle
all the active sessions in the network between 2 or more host in a network. This layer manages
synchronization between all the activity performed in the network to prevent disputes between
hosts.
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

L6 – This layer is commonly known as the presentation layer of the network. The task performed
by this layer is that it converts all the communicated information from application layer to a
network understandable format. This layer presents all the data in a packet in such a manner that
it can be easily transmitted to its destination.
L7 – This layer is commonly known as the Application Layer. this layer is responsible for
providing an interface to the users to interact with the network. This layer provides a platform
from where the user can communicate to other hosts.
These layers are mainly divided into two basic sub-category such as:
1. Software layer: this layer deals with the data communicated through software like,
encrypted text, secret message, letter and more. This layer comprises of a combination of
Application layer, Session layer and presentation layer.
2. Network layer: This layer deals with the transmission of data communicated through
network devices such as RIP, OSPF, data transport and more. This layer is a combination
of Network layer, physical layer, the data link layer (Briscoe, 2009).
The network layer of the subdivision of the layer is also known as the layer of internet This is
because this layer uses IP address as its mode of communication to other services and devices.
This layer is responsible to perform manage the IP address using any of the routing protocols and
more.
3
by this layer is that it converts all the communicated information from application layer to a
network understandable format. This layer presents all the data in a packet in such a manner that
it can be easily transmitted to its destination.
L7 – This layer is commonly known as the Application Layer. this layer is responsible for
providing an interface to the users to interact with the network. This layer provides a platform
from where the user can communicate to other hosts.
These layers are mainly divided into two basic sub-category such as:
1. Software layer: this layer deals with the data communicated through software like,
encrypted text, secret message, letter and more. This layer comprises of a combination of
Application layer, Session layer and presentation layer.
2. Network layer: This layer deals with the transmission of data communicated through
network devices such as RIP, OSPF, data transport and more. This layer is a combination
of Network layer, physical layer, the data link layer (Briscoe, 2009).
The network layer of the subdivision of the layer is also known as the layer of internet This is
because this layer uses IP address as its mode of communication to other services and devices.
This layer is responsible to perform manage the IP address using any of the routing protocols and
more.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Q2
Hands-on Project 2-3
Figure 1: Finding subnet
In this project, the subnet of an IP address is computed using an online tool named as GestioIP.
Here the input is made by entering an IP address as 192.166.0.2. and the result appeared is
shown in the image.
Hands-On Project 3.2
This project is completed by following the following commands:
1. Executing Program – Wireshark in windows.
4
Hands-on Project 2-3
Figure 1: Finding subnet
In this project, the subnet of an IP address is computed using an online tool named as GestioIP.
Here the input is made by entering an IP address as 192.166.0.2. and the result appeared is
shown in the image.
Hands-On Project 3.2
This project is completed by following the following commands:
1. Executing Program – Wireshark in windows.
4

Figure 2: opening Wireshark
2. Click over capture option and click ‘option’.
Figure 3: project step 2
5
2. Click over capture option and click ‘option’.
Figure 3: project step 2
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3. Identifying and selection active network connection.
Figure 4: project step 3
4. Clicking on the search box in windows and searching run to open cmd.
6
Figure 4: project step 3
4. Clicking on the search box in windows and searching run to open cmd.
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 5: project step 4
5. Entering CMD in a run.
Figure 6: project step 5
6. Once the cmd is executed. Ping IPv6 of one of the hosts in your network.
7
5. Entering CMD in a run.
Figure 6: project step 5
6. Once the cmd is executed. Ping IPv6 of one of the hosts in your network.
7

Figure 7: project step 6
7. Then click on the capture option and select stop to stop the packet capture process.
Figure 8: project step 7
8
7. Then click on the capture option and select stop to stop the packet capture process.
Figure 8: project step 7
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

8. Changing the filter option to find IPv6, Icmpv6, Dhcpv6 packet.
Figure 9: project step 8
9. Verifying the version of the packet.
9
Figure 9: project step 8
9. Verifying the version of the packet.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 10: project step 9
10. Viewing traffic class of the packet.
Figure 11: project step10
10
10. Viewing traffic class of the packet.
Figure 11: project step10
10

11. Viewing another necessary information form the ipv6 ping packet.
Figure 12: project step 11
12. Saving the file with an appropriate name.
11
Figure 12: project step 11
12. Saving the file with an appropriate name.
11
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.


