MITS4004 IT Networking and Communication Assignment 2
VerifiedAdded on 2025/05/02
|8
|2460
|186
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

ASSIGNMENT_2 MITS4004 - IT
NETWORKING AND
COMMUNICATION
NETWORKING AND
COMMUNICATION
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1. What are the differences between classful and classless addressing in IPv4?
Classful addressing in IPv4 protocol is an IP address allocating method which is used to
allocate the IP address according to the major classes of the IPv4 protocol. The system and
the methodology used in this addressing are less practical and useful for the system in the
network. The host ID and the network ID in this addressing keep on changing depending
upon the classes used. On the other hand, the classless addressing it is an example of the IPv4
which detects the IP address allocation is designed in such a way that it replaces the classful
addressing to lower down the rapid exhaustion of the IP addresses. This addressing method in
the IPv4 protocol is more practical and useful than that of the classful addressing.
2. Explain why most of the addresses in class A are wasted. Explain why a medium or
large size organization does not want a clock of class C.
IPv4 consists of the five major classes which are A, B, C, D and E. In this classification, only
top three classes, i.e. A, B and C are used for the commercial purposes. A block in the A class
is very large and can store multiple addresses. It is of that quantity that it is not used by most
of the organizations and therefore the addresses stored in class A are not used and wasted. A
block of class C in the network is very small and cannot store high-level information as well
as large information in the network. Therefore the organization doesn't involve the class C
block to store the information in the system network.
3. What is a mask in IPv4 addressing?
In an IP network, each machine on physical layer of the network observes all the packets
which are sent on the network. If this happens, the network will bring down the performance
drastically as the computer network keeps on growing. Therefore, to maintain the
connectivity in the network, the network is divided into the sub networks to reduce traffic
across different subnetworks. The mask in the IPv4 addressing is usually used to divide the
network in the subnetwork and further these subnetworks or sub masks are divided into the
network classes to maintain the interconnectivity between the subnets that are provided by
the routers (IP Addresses And Subnet Masks., 2019).
4. What is the network address in a block of addresses? How can we find the network
address if one of the addresses in the block is known?
Classful addressing in IPv4 protocol is an IP address allocating method which is used to
allocate the IP address according to the major classes of the IPv4 protocol. The system and
the methodology used in this addressing are less practical and useful for the system in the
network. The host ID and the network ID in this addressing keep on changing depending
upon the classes used. On the other hand, the classless addressing it is an example of the IPv4
which detects the IP address allocation is designed in such a way that it replaces the classful
addressing to lower down the rapid exhaustion of the IP addresses. This addressing method in
the IPv4 protocol is more practical and useful than that of the classful addressing.
2. Explain why most of the addresses in class A are wasted. Explain why a medium or
large size organization does not want a clock of class C.
IPv4 consists of the five major classes which are A, B, C, D and E. In this classification, only
top three classes, i.e. A, B and C are used for the commercial purposes. A block in the A class
is very large and can store multiple addresses. It is of that quantity that it is not used by most
of the organizations and therefore the addresses stored in class A are not used and wasted. A
block of class C in the network is very small and cannot store high-level information as well
as large information in the network. Therefore the organization doesn't involve the class C
block to store the information in the system network.
3. What is a mask in IPv4 addressing?
In an IP network, each machine on physical layer of the network observes all the packets
which are sent on the network. If this happens, the network will bring down the performance
drastically as the computer network keeps on growing. Therefore, to maintain the
connectivity in the network, the network is divided into the sub networks to reduce traffic
across different subnetworks. The mask in the IPv4 addressing is usually used to divide the
network in the subnetwork and further these subnetworks or sub masks are divided into the
network classes to maintain the interconnectivity between the subnets that are provided by
the routers (IP Addresses And Subnet Masks., 2019).
4. What is the network address in a block of addresses? How can we find the network
address if one of the addresses in the block is known?

The network address in IPv4 protocol network is defined as the first address if the block. In
other words, network in IPv4 block addresses is the first block address between the numbers.
These block addresses define the network blocks of the given system. It also provides with
the information of the information that is or will be stored in the blocks that would be
accessible through the protocols. Also, to detect network address through the given address of
the blocks, the mask of the subnetworks are to be ended with an address of the block to
determine the final network address or to find the address of the given block.
5. Briefly define subnetting. How does the subnet mask differ from a default mask in
classful addressing?
The subnetting of the network is defined as a large block that could be divided into various
groups and every group is being assigned to the smaller networks which are known as the
subnets of the network. This process steps are concluded to form several small address blocks
within the network that can be combined and used to create a larger range of addresses for the
network. A subnet mask in the network has more 1s than that of the corresponding default
mask in the network. A mask has less consecutive 1s than that of the corresponding default
mask. The subnet masks identify the IP addresses and network parts and the host parts of the
in the system network using IP subnet mask tool and techniques.
6. What is NAT? How can NAT help in address depletion?
A Network Address Translation or translator (NAT) is to be considered as the virtualization
protocol of the IP addresses. NAT improves security parameters and decreases the IP
addresses to meet need of organization. NAT provides a temporary solution to come over the
problem of the availability of the ipV4 addresses in the network. When the host with private
IP address wants to connect with the outer serve, it uses the NAT to do it so. A NAT device
uses with a PAT or port address translation methods to remember the IP addresses of the
private host and it also remembers the port address of the private host. By gaining these
addresses, it is easy for the network in depletion of the addresses provided in the network.
7. What is the difference between connection-oriented and connectionless services?
The connection-oriented services in the networks have a sequence of operations that needs to
be performed to fulfill the requirement of the network. This process includes methods which
are used for establishing the connection between the host and the server. After that, the
information is transmitted through a proper authentication channel in the network. It makes a
other words, network in IPv4 block addresses is the first block address between the numbers.
These block addresses define the network blocks of the given system. It also provides with
the information of the information that is or will be stored in the blocks that would be
accessible through the protocols. Also, to detect network address through the given address of
the blocks, the mask of the subnetworks are to be ended with an address of the block to
determine the final network address or to find the address of the given block.
5. Briefly define subnetting. How does the subnet mask differ from a default mask in
classful addressing?
The subnetting of the network is defined as a large block that could be divided into various
groups and every group is being assigned to the smaller networks which are known as the
subnets of the network. This process steps are concluded to form several small address blocks
within the network that can be combined and used to create a larger range of addresses for the
network. A subnet mask in the network has more 1s than that of the corresponding default
mask in the network. A mask has less consecutive 1s than that of the corresponding default
mask. The subnet masks identify the IP addresses and network parts and the host parts of the
in the system network using IP subnet mask tool and techniques.
6. What is NAT? How can NAT help in address depletion?
A Network Address Translation or translator (NAT) is to be considered as the virtualization
protocol of the IP addresses. NAT improves security parameters and decreases the IP
addresses to meet need of organization. NAT provides a temporary solution to come over the
problem of the availability of the ipV4 addresses in the network. When the host with private
IP address wants to connect with the outer serve, it uses the NAT to do it so. A NAT device
uses with a PAT or port address translation methods to remember the IP addresses of the
private host and it also remembers the port address of the private host. By gaining these
addresses, it is easy for the network in depletion of the addresses provided in the network.
7. What is the difference between connection-oriented and connectionless services?
The connection-oriented services in the networks have a sequence of operations that needs to
be performed to fulfill the requirement of the network. This process includes methods which
are used for establishing the connection between the host and the server. After that, the
information is transmitted through a proper authentication channel in the network. It makes a
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

connection throughout the process that means when the connection is established,
information is sent and the connection is disabled. On the other hand, connectionless services
don't have or need any type of authentication while establishing a connection. And also, a
connectionless service protocol doesn't confirm that the message is delivered or not. The
connection-oriented services are more dependent than that of the connectionless services. The
connection-oriented services contain a stream-based interface and connectionless services
contain a message based interface (Studytonight., 2019).
8. Define fragmentation and why it is needed?
Fragmentation in context of networking depicts the condition of the disk where the files are
segmented into the pieces which spread around disk. Fragmentation can occur naturally
inside a disk when the disk is being frequently used to perform operations on the files inside
the disk. This process is important as the operating systems of the network need to store and
save parts of the file which are non-contiguous clusters in the disk network. The
fragmentation process is completely invisible to the user, but it slow down speed by which
data is transmitted and accessed. This is due to the high disk usage by the operating systems
in the network. One of the main reason of slow working of the disk is that the disk has to go
through every different part to put together a single file which will be displayed to the user
(Techopedia., 2019).
9. List transition strategies to move from IPv4 to IPv6. Explain the differences between
tunneling and dual stack strategies during the transition period.
A number of IPv4 addresses are completely depleted therefore, it is important to implement
the IPv6 protocols in the network. It is not feasible to shift everything from IPv4 to IPv6
therefore, some type of transitions are developed to secure the data while transferring from
IPv4 to IPv6 protocols. There are three main strategies to switch from IPv4 to IPv6 which
includes:
Dual stack: This is capable to run IPv4 and IPv6 on similar devices in network.
Tunnelling: It transports the traffic of IPv6 by the use of IPv4 with the help of transparency
Translation: It makes the system able to convert traffic of IPv6 to IPv4 traffic that used to
transport and vice versa.
information is sent and the connection is disabled. On the other hand, connectionless services
don't have or need any type of authentication while establishing a connection. And also, a
connectionless service protocol doesn't confirm that the message is delivered or not. The
connection-oriented services are more dependent than that of the connectionless services. The
connection-oriented services contain a stream-based interface and connectionless services
contain a message based interface (Studytonight., 2019).
8. Define fragmentation and why it is needed?
Fragmentation in context of networking depicts the condition of the disk where the files are
segmented into the pieces which spread around disk. Fragmentation can occur naturally
inside a disk when the disk is being frequently used to perform operations on the files inside
the disk. This process is important as the operating systems of the network need to store and
save parts of the file which are non-contiguous clusters in the disk network. The
fragmentation process is completely invisible to the user, but it slow down speed by which
data is transmitted and accessed. This is due to the high disk usage by the operating systems
in the network. One of the main reason of slow working of the disk is that the disk has to go
through every different part to put together a single file which will be displayed to the user
(Techopedia., 2019).
9. List transition strategies to move from IPv4 to IPv6. Explain the differences between
tunneling and dual stack strategies during the transition period.
A number of IPv4 addresses are completely depleted therefore, it is important to implement
the IPv6 protocols in the network. It is not feasible to shift everything from IPv4 to IPv6
therefore, some type of transitions are developed to secure the data while transferring from
IPv4 to IPv6 protocols. There are three main strategies to switch from IPv4 to IPv6 which
includes:
Dual stack: This is capable to run IPv4 and IPv6 on similar devices in network.
Tunnelling: It transports the traffic of IPv6 by the use of IPv4 with the help of transparency
Translation: It makes the system able to convert traffic of IPv6 to IPv4 traffic that used to
transport and vice versa.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The major difference between dual-stack and tunneling is that the process called dual-stack
includes the running of IPv4 and IPv6 at same time in same devices. As on the other hand,
the tunneling is used to divert the IPv6 traffic in an existing IPv4 based routing infrastructure
model (Transition to IPv6 - Moving from IPv4 to IPv6., 2012).
10. What are some common address mapping protocols and in which scenario would
you use each?
The address mapping protocols are used to create a combination of the physical networks
connected and transmitting the data through internetworking devices like routers. It uses the
following address mapping protocols to make the system more efficient:
Address Resolution Protocol: This protocol helps to communicate between the discovered
physical address which is associated with network address. ARP is used in the network to get
the MAC to address for the destination machine.
Reverse Address Resolution Protocol: It is the protocol which is used by the client machine
in the Local Area network for requesting the IP address from the router's gateway ARP table.
Inverse Address Resolution Protocol: Inverse ARP helps the MAC address of the system to
detect IP address. This protocol is being used to inverse the applications of the ARP protocols
(GeeksforGeeks., 2017).
11. What is ICMP and why do we need it?
ICMP that is stated as Internet Control Message protocol is considered to be a device which
acts as the error-reporting protocol like the routers which generates the error messages to a
source IP address when a problem occurs in delivering the IP packets. Its work is to generate
and send the messages to source IP using a gateway via internet like a router. ICMP is not the
transport protocol which can be used to transmit the data between the systems. It is not in use
regularly in applications as it is occupied by the network administrators to troubleshoot the
internet connection including the ping and trace route (SearchNetworking., 2019).
12. What is an autonomous system?
An autonomous system is an assortment of IP routing prefixes, which is under the authority
of a single entity. With the help of this clear routing policy for the internet is provided. ASN
(Autonomous system number) is present in ISP. Each network over the internet is identified
includes the running of IPv4 and IPv6 at same time in same devices. As on the other hand,
the tunneling is used to divert the IPv6 traffic in an existing IPv4 based routing infrastructure
model (Transition to IPv6 - Moving from IPv4 to IPv6., 2012).
10. What are some common address mapping protocols and in which scenario would
you use each?
The address mapping protocols are used to create a combination of the physical networks
connected and transmitting the data through internetworking devices like routers. It uses the
following address mapping protocols to make the system more efficient:
Address Resolution Protocol: This protocol helps to communicate between the discovered
physical address which is associated with network address. ARP is used in the network to get
the MAC to address for the destination machine.
Reverse Address Resolution Protocol: It is the protocol which is used by the client machine
in the Local Area network for requesting the IP address from the router's gateway ARP table.
Inverse Address Resolution Protocol: Inverse ARP helps the MAC address of the system to
detect IP address. This protocol is being used to inverse the applications of the ARP protocols
(GeeksforGeeks., 2017).
11. What is ICMP and why do we need it?
ICMP that is stated as Internet Control Message protocol is considered to be a device which
acts as the error-reporting protocol like the routers which generates the error messages to a
source IP address when a problem occurs in delivering the IP packets. Its work is to generate
and send the messages to source IP using a gateway via internet like a router. ICMP is not the
transport protocol which can be used to transmit the data between the systems. It is not in use
regularly in applications as it is occupied by the network administrators to troubleshoot the
internet connection including the ping and trace route (SearchNetworking., 2019).
12. What is an autonomous system?
An autonomous system is an assortment of IP routing prefixes, which is under the authority
of a single entity. With the help of this clear routing policy for the internet is provided. ASN
(Autonomous system number) is present in ISP. Each network over the internet is identified

with the help of AS. Private ASN is used for achieving BGN. Irrespective of the presence of
multiple AS by ISP, only the routing policy of ISP is seen by the internet.
13. What is the purpose of RIP?
Routing Information Protocol is also called as a distance protocol or dynamic protocol.
Locating or identifying the best path for the transmission of packets from source place to the
destination place is done through this protocol. Its main purpose is to find that path which is
the shortest and has a minimum number of routers through which the data needs to be
transferred, so as to achieve the highest speed possible. An algorithm is used by the RIP for
finding the shortest path; the best path is selected on which the packet is put on. More the
number of hop/router counts more is the path length.
14. What are the functions of a RIP message?
RIP message functions are:
RIP message can be used to share the information about the shortest path for
delivering the packets with its neighbors.
In AS, the RIP message is used to request and receive important data about the
routing in the autonomous system.
Also, its functions include broadcasting, which is very essential in the RIPv1 protocol.
This implies that RIP messages can only identify routing information of class A, B, C
which is natural networks.
15. Why do OSPF messages propagate faster than RIP messages?
Open of the shortest path first is the routing protocol which is based on the state routing. It is
seen, that in OSPF, routing is more competent than RIP messages. Autonomous systems are
present in the OSPF routing protocol. As an autonomous system is split into an area, which
consists of the host, network, and routers, OSPF messages propagate immediately. As in
OSPF, the router will instantly stream the network with useful data regarding any changes in
its neighborhood. But in the case of RIP messages, circulation of information or news is very
slow. AS in this periodic updates are needed by the networks which use RIP messages. 30
seconds are required to forward any kind of information from one host or router to another
host or router.
16. What is the purpose of BGP?
multiple AS by ISP, only the routing policy of ISP is seen by the internet.
13. What is the purpose of RIP?
Routing Information Protocol is also called as a distance protocol or dynamic protocol.
Locating or identifying the best path for the transmission of packets from source place to the
destination place is done through this protocol. Its main purpose is to find that path which is
the shortest and has a minimum number of routers through which the data needs to be
transferred, so as to achieve the highest speed possible. An algorithm is used by the RIP for
finding the shortest path; the best path is selected on which the packet is put on. More the
number of hop/router counts more is the path length.
14. What are the functions of a RIP message?
RIP message functions are:
RIP message can be used to share the information about the shortest path for
delivering the packets with its neighbors.
In AS, the RIP message is used to request and receive important data about the
routing in the autonomous system.
Also, its functions include broadcasting, which is very essential in the RIPv1 protocol.
This implies that RIP messages can only identify routing information of class A, B, C
which is natural networks.
15. Why do OSPF messages propagate faster than RIP messages?
Open of the shortest path first is the routing protocol which is based on the state routing. It is
seen, that in OSPF, routing is more competent than RIP messages. Autonomous systems are
present in the OSPF routing protocol. As an autonomous system is split into an area, which
consists of the host, network, and routers, OSPF messages propagate immediately. As in
OSPF, the router will instantly stream the network with useful data regarding any changes in
its neighborhood. But in the case of RIP messages, circulation of information or news is very
slow. AS in this periodic updates are needed by the networks which use RIP messages. 30
seconds are required to forward any kind of information from one host or router to another
host or router.
16. What is the purpose of BGP?
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Border Gateway Protocol is a protocol which governs the transmission of packets across the
internet. This is achieved with the help of routing information and reachability information in
edge routers. Packets are always directed in an autonomous system. Two types of BGP are
present:
internal
external
The main purpose of BGP is network stability. This allows the routers to accommodate
immediately during sending the packets when one path of the internet is not working. It helps
in making best routing decisions for the transmission of data, which are usually based on
rules, paths and networks policies.
17. Compare and contrast distance vector routing method against link state routing
method.
Two factors are seen in distance vector routing method. Distance or the path is the first factor
and direction of the path which is the vector is the second factor. Examples of distance vector
routing are RIP and IGRP. These are used for finding the path which is the shortest to
transmit the packets. A number of routers are counted to calculate the distance. The best route
is founded by the Bellman-Ford algorithm. Distance vector method is more easy and simpler
to use than link state method.
Also, in distance vector method, neighbors who are connected directly are granted to share
routing information. It is seen, that router is not capable of the knowledge about the route
from where information about the route is learned by the neighbor. This is the major
comparison between distance vector routing and link state routing as in link-state, all the
information regarding routers is present in the network which is accessible.
internet. This is achieved with the help of routing information and reachability information in
edge routers. Packets are always directed in an autonomous system. Two types of BGP are
present:
internal
external
The main purpose of BGP is network stability. This allows the routers to accommodate
immediately during sending the packets when one path of the internet is not working. It helps
in making best routing decisions for the transmission of data, which are usually based on
rules, paths and networks policies.
17. Compare and contrast distance vector routing method against link state routing
method.
Two factors are seen in distance vector routing method. Distance or the path is the first factor
and direction of the path which is the vector is the second factor. Examples of distance vector
routing are RIP and IGRP. These are used for finding the path which is the shortest to
transmit the packets. A number of routers are counted to calculate the distance. The best route
is founded by the Bellman-Ford algorithm. Distance vector method is more easy and simpler
to use than link state method.
Also, in distance vector method, neighbors who are connected directly are granted to share
routing information. It is seen, that router is not capable of the knowledge about the route
from where information about the route is learned by the neighbor. This is the major
comparison between distance vector routing and link state routing as in link-state, all the
information regarding routers is present in the network which is accessible.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

References
What is ICMP (Internet Control Message Protocol)? - Definition from WhatIs.com
What is ICMP (Internet Control Message Protocol)? - Definition from WhatIs.com.
(2019). SearchNetworking. Retrieved 13 May 2019, from
https://searchnetworking.techtarget.com/d
What is Fragmentation? - Definition from Techopedia
What is Fragmentation? - Definition from Techopedia. (2019). Techopedia.com. Retrieved 13
May 2019, from https://www.techopedia.com/definition/14383/fragmentation-hard-disks
Computer Network | ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP
and Gratuitous ARP - GeeksforGeeks
Computer Network | ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP and
Gratuitous ARP - GeeksforGeeks. (2017). GeeksforGeeks. Retrieved 13 May 2019, from
https://www.geeksforgeeks.org/computer-network-arp-reverse-arprarp-inverse-arpinarp-
proxy-arp-gratuitous-arp/
Transition to IPv6 - Moving from IPv4 to IPv6
Transition to IPv6 - Moving from IPv4 to IPv6. (2012). Petri. Retrieved 13 May 2019, from
https://www.petri.com/ipv6-transition#dual-stack
Connection-Oriented and Connectionless Services | Study tonight
Connection-Oriented and Connectionless Services | Studytonight. (2019). Studytonight.com.
Retrieved 13 May 2019, from https://www.studytonight.com/computer-networks/connection-
oriented-and-connectionless-service
IP Addresses and Subnet Masks
IP Addresses and Subnet Masks. (2019). Cse.uconn.edu. Retrieved 13 May 2019, from
http://www.cse.uconn.edu/~vcb5043/MISC
What is ICMP (Internet Control Message Protocol)? - Definition from WhatIs.com
What is ICMP (Internet Control Message Protocol)? - Definition from WhatIs.com.
(2019). SearchNetworking. Retrieved 13 May 2019, from
https://searchnetworking.techtarget.com/d
What is Fragmentation? - Definition from Techopedia
What is Fragmentation? - Definition from Techopedia. (2019). Techopedia.com. Retrieved 13
May 2019, from https://www.techopedia.com/definition/14383/fragmentation-hard-disks
Computer Network | ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP
and Gratuitous ARP - GeeksforGeeks
Computer Network | ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP and
Gratuitous ARP - GeeksforGeeks. (2017). GeeksforGeeks. Retrieved 13 May 2019, from
https://www.geeksforgeeks.org/computer-network-arp-reverse-arprarp-inverse-arpinarp-
proxy-arp-gratuitous-arp/
Transition to IPv6 - Moving from IPv4 to IPv6
Transition to IPv6 - Moving from IPv4 to IPv6. (2012). Petri. Retrieved 13 May 2019, from
https://www.petri.com/ipv6-transition#dual-stack
Connection-Oriented and Connectionless Services | Study tonight
Connection-Oriented and Connectionless Services | Studytonight. (2019). Studytonight.com.
Retrieved 13 May 2019, from https://www.studytonight.com/computer-networks/connection-
oriented-and-connectionless-service
IP Addresses and Subnet Masks
IP Addresses and Subnet Masks. (2019). Cse.uconn.edu. Retrieved 13 May 2019, from
http://www.cse.uconn.edu/~vcb5043/MISC
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.