MITS4004 IT Networking and Communication Assignment 2

Verified

Added on  2025/05/02

|9
|2640
|117
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
ASSIGNMENT_2 MITS4004 –
IT NETWORKING AND COMMUNICATION
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1. What are the differences between classful and classless addressing in IPv4?
Basis Classful addressing Classless Addressing
Method The particular method of allocating
the IP addresses which uses the five
different and main classes are used.
The Allocation method of the IP address
which is basically used to replace the
classful addressing is used.
Useful It is more useful It is less useful
Practicality It is less practical It is more practical
Working It divides IP address into two sub
parts Network ID and Host ID
It uses the subnet mask which is of the
variable length (Tutorial, 2013).
Originality Its addresses are original way of
creating classes (IBM, 2019).
this addressing is the way to allocate and
specify the internet addresses which are
used in inter domain routing.
Addresses These addresses are having three
different parts network, subnet and
host.
These addresses have two parts subnet
and host or prefix and host (Tutorial,
2013).
Protocols These protocols don’t consist of
masks and also not supports OSPF,
IGRP, VLSM etc..
Routing protocols consists of masks and
supports OSPF, EIGRP, VLSM etc.
2. Explain why most of the addresses in class A are wasted. Explain why a medium
or large size organization does not want a block of class C.
The most of the addresses in class A are wasted because a block in class A address is a
bulky address for any organization which is mostly wasted and not used at all and the
class C block is probably too small for some of the organizations that’s why its not
been used. A class A subnet consists of 24 bits which is worth for the addressing
technique which is capable of handling almost 17 million devices on its own that’s
why it is called as the largest addressing class so the units of this class are being
wasted and not being used by the organizations. Moving on to class C itss blocks are
too smaller than expected which aren’t able to fulfill the requirement of required
number of individual systems so it is not being used by the different organizations
because its capacity is lower than needed (Docsity, 2019).
2
Document Page
3. What is a mask in IPv4 addressing?
The Mask in IPv4 addressing is usually known as subnet mask because it is able to
find and detect the network address. The IP address is having two components one is
a network address and another one is host address. A mask or subnet mask is used to
separate the IP address into the network and the host address. It also divides the host
of an IP into a mask and the host address. It is named as the subnet mask because it
can identify the addresses of a particular network which consists of an IP address by
performing the bitwise AND operations. A subnet mask which is a 32 bit number
which further divides the IP into network and host addresses. It is made by setting the
network bits which consist of host bits and network bits. Two of the host addresses
are reserved within a particular network (IBM, 2019).
4. What is the network address in a block of addresses? How can we find the
network address if one of the addresses in the block is known?
A network address is a type of physical or logical address that uniquely differentiates
a network node or a device on a network of communication. The network address
consists of numbers or symbols and it is a address which is provided to any individual
device. We can find the network address in a block easily because it is the first
address presented in the block of addresses the subnet mask is used to identify the
network address if the one of the addresses in the block is known. The subnet mask is
very much helpful in generating the Network addresses of the user knows one of the
address in the block because the network address is the first block address which is
presented among the different addresses. The network address can be located using
subnet mask and the host address (Dulaney & Harwood, 2019).
5. Briefly define subnetting. How does the subnet mask differ from a default mask
in classful addressing?
A sub network or a subnet is basically a division of the IP network. The process of
dividing a network into the two or more sub networks is known as subnetting. The
subnetting is the strategy used to divide a single network into more than one sub
components. The systems which consists of the a subnet are consists of the address of
significant bit group in their IP addresses. A subnet mask is of such type that it can be
changed as per the requirements of the hosts. The default subnet mask oncly consists
of the default address of different classes. The subnet mask is able to state the
difference between the network part and the host part. The default subnet mask is the
mask for the class of the networks. The default subnet mask is the part of the network
which is already defined. Subnet mask consists of the number of bits used by the
network(Dulaney & Harwood, 2019).
3
Document Page
6. What is NAT? How can NAT help in address depletion?
NAT stands for Network Address Translation which is a method of reallocating one
IP address space into another by changing the network address in the IP header of the
different packets when they are about to be transmitted across a traffic routing device.
This method was originally used as shortcut which can reduce the need of
readdressing each and every host when a particular network was removed. The
number of ipv4 addresses are lesser in number. The NAT was developed keeping in
mind that the temporary solution dodge this problem and increases the reusability of
the IPv4 addresses. It resulted in IPv4 addresses into two broad categories which are
named as public and private. This devices use the Port Address translation PAT
technique to transmit the port addresses and to remember the IP address. NAT allows
the users to have the large set of addresses internally and one address (IBM, 2019).
7. What is the difference between connection oriented and connection less services?
Connection Oriented Connection Less
In these type of services the connection
should be established before the
communication process.
It is similar to postal services as it consists
of the full address.
It is more reliable than connection less
service.
It is less reliable than connection less
service.
In connection oriented service the data is
transferred from source to destination
through a connectivity.
In connection less the data is transferred in a
particular direction from the source end to
the destination end.
The order of message will always remain
the same.
The order of message can be different.
In this service the authentication of the data
is needed.
In connection less service the authentication
process is not necessary.
Its example is TCP (Transmission control
protocol)
Its example is UDP (User datagram
Protocol).
Its interface is stream based. Its service is message based.
8. Define fragmentation and why it is needed?
Fragmentation is the process which defines the disk conditions in which the files are
fragmented or divided into multiple things in the disk when the disk is frequently used
by the user for modifying, creating and deleting the files. The operating system needs
to store the parts of the files in the different clusters. This process is not displayed to
the users because it is the internal process of the disk. This process can also reduce the
speed of data transmission. This is needed for making the IP protocol totally
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
independent for the physical network. This process makes the data transmission more
effective so that the complete data can be transmitted to the receiver. The data should
not be lost by using the fragmentation technique. The datagram which is fragmented
can also travel through the different routes (Whatis, 2019).
9. List transition strategies to move from IPv4 to IPv6. Explain the differences
between tunneling and dual stack strategies during the transition period.
The methods used to switch the IPv4 to IPv6 are as follows:
Translation: This method can convert the IPv6 to IPv4 and Vice versa.
Dual Stack: This method is able to run both the IPv4 and IPv6 at a single
device (Petri, 2012).
Tunneling: This method transports IPv6 data through the IPv4 and vice versa.
Tunneling Dual stack
It can run the IPv4 and IPv6 at the same
time.
It can transport the IPv6 data through the
IPv4.
It is not able to run two TCP/IP protocol
inside one another.
It is able to run two TCP/IP protocol inside
another.
It consists of the enterprise network and
LAB environments.
It can be the large datacenters, LAN and
WAN as well.
It is necessary if the institution is not able to
run IPv6 on the network.
it can run both the ipv4 and ipv6 at same
network.
10. What are some common address mapping protocols and in which scenario would
you use each?
Some of the common address mapping protocols are as follows:
Address Resolution Protocol: If a system is communicating from the another
system the communication process will require the MAC address the ARP
states that the system should at least have the destination and the source
address for the communication process to make it more effective and efficient.
Reverse Address Resolution Protocol: This protocol states that the physical
system in a LAN network is able to process its request from the address of the
server’s ARP. This protocol is needed when the machine is not having an
attached disk in it (mask & Butola, 2011).
ICMP(Internet control message protocol): This protocol is also called the
supporting protocol in the internet protocol. The network devices uses this
protocol which includes the information of the messages and the routers for
efficient transmission (Enterprisenetworkingplanet, 2019).
5
Document Page
11. What is ICMP and why do we need it?
This protocol is also called the supporting protocol in the internet protocol. The
network devices use this protocol which includes the information of the messages and
the routers for efficient transmission. It id different from the transport protocols like
the User datagram protocol and Transmission control Protocol. This protocol does not
allow the users to transfer the data between the systems and also not supports the end
user network. The IP address is not having the technique of generating the error
message the ICMP protocol is needed dor reporting the errors and management
related data. It enables the IP address to add extra features rather than transferring the
data from one system to another (Dulaney & Harwood, 2019).
12. What is an autonomous system?
An autonomous system is the unit of router which consists of the single or a group of
networks. This is controlled by a particular user. Networks within the system can
communicate the information with each other in order to send and receive the source
and destination address. This systems uses the IGP, EGP and BGP protocols. This
type of systems consists of the collection of the networks that’s why it is also known
as heterogeneous network which can be look-after by the larger enterprises. The
autonomous systems were designed for regulating the ISP’s, government sectors and
the educational sectors (Thenetworkencyclopedia, 2019).
13. What is the purpose of RIP?
RIP stands for the Routing information protocol which is one of the distance vector
routing protocol. This is the oldest protocol used. The RIP protocol is used to prevent
the routing loop by implementing a limit on the hop counts. This protocol is dynamic
in nature. This protocol is efficiently able to find the best path between the source and
the destination among the different paths so that the data should be speedily
transmitted and the communication could be more effective and efficient (Pluralsight,
2019).
14. What are the functions of a RIP message?
The RIP message is the message which is used by the router for requesting the data
access and receiving the permissions through the routing information. This protocol is
used to share the information from the sender to the receiver. The RIP message
consists of the different packets of UDP which consists of the information through the
different ports. This message consists of the HOP counts which is transferred from a
router to the directly connected message (nptel, 2019).
15. Why do OSPF messages propagate faster than RIP messages?
6
Document Page
The OSPF messages are immediately communicated because a router using the OSPF
will immediately fills the networks with the data consists of the news to the receiver
RIP messages are distributed slowly because a network is able to slowly communicate
the message because it uses the RIP which relies on the regular updates which occurs
on every thirty seconds in carrying the data from one router to another one (Sfu.ca,
2019).
16. What is the purpose BGP?
BGP stands for the Border gateway protocol which is able to manage the process of
the routing of the packets through the internet. This protocol enables the exchange of
the routing information between one system to another. The BGP protocol shows the
pathway to the data packets which are to be transmitted between the sender and the
receiver. This protocol is used because it makes the network more stable and make
sure that the routers are quickly sending the information to the systems at both the
ends (Demicoli, 2016).
17. Compare and contrast distance vector routing method against link state routing
method.
Distance Vector Routing Link State Routing
This routing process requires the low
bandwidth due to the local area sharing of
the data packets.
This system requires more bandwidth
because this system have to send the larger
packets of information.
This process enables consistent loop It doesn’t allows the consistent loops.
In this process the data traffic is less. In this process the data traffic is high.
It is totally dependent on the local
knowledge.
It is totally dependent on the global
knowledge.
It consists of The RIP and IGRP It consists of OSPF and ISIS
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References:
Classful and Classless Routing - Tutorial. (2013). Tutorial. Retrieved 14 May 2019,
from https://www.vskills.in/certification/tutorial/router-support/classful-and-classless-
routing/
Explain why most of the addresses in class A are wasted. Explain why a medium-size
or large-size corporation does not want a block of class C addresses.? - Docsity.
(2019). Docsity.com. Retrieved 14 May 2019, from
https://www.docsity.com/en/answers/explain-addresses-wasted-explain-medium-
corporation-addresses/113277/
IBM Knowledge Center. (2019). Ibm.com. Retrieved 14 May 2019, from
https://www.ibm.com/support/knowledgecenter/en/STCMML8/com.ibm.storage.ts35
00.doc/opg_3584_IPv4_IPv6_prefix_subnet_mask.html
mask, F., & Butola, S. (2011). Finding the first and last address of a block of IP
addresses with subnet mask. Server Fault. Retrieved 14 May 2019, from
https://serverfault.com/questions/327777/finding-the-first-and-last-address-of-a-
block-of-ip-addresses-with-subnet-mask
Subnet Mask Definition. (2019). Techterms.com. Retrieved 14 May 2019, from
https://techterms.com/definition/subnet_mask
Yahoo is now part of Oath. (2019). Answers.yahoo.com. Retrieved 14 May 2019,
from https://answers.yahoo.com/question/index?
qid=20111109153028AAk6V6H&guccounter=1&guce_referrer=aHR0cHM6Ly93d3
cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACV8IXbsslTCv1czWqIqCFUdlN
HsTHrJ0hBrSykneviN6CfS7Yz1tQRf5suJP1WbwYV2LU3qFT_Oq_IyWa393tb_Ws
MH99241ei-Hc23WvksfDwaEiZscbb87_-
G3Nuy2UvhtgXiBNA0gEFLBMgScYHI__BxUFmitTXhfKfbS0ZL
Services., C. (2019). Compare Connection-Oriented & Connection-Less
Services. . Ques10.com. Retrieved 14 May 2019, from
http://www.ques10.com/p/9498/compare-connection-oriented-connection-less-servic/
What is fragmentation? - Definition from WhatIs.com. (2019). SearchWindowsServer.
Retrieved 14 May 2019, from
https://searchwindowsserver.techtarget.com/definition/fragmentation
Transition to IPv6 - Moving from IPv4 to IPv6. (2012). Petri. Retrieved 14 May 2019,
from https://www.petri.com/ipv6-transition
Dulaney, E., & Harwood, M. (2019). Network+ Exam Cram: Addressing and Routing
| IP Addressing | Pearson IT Certification. Pearsonitcertification.com. Retrieved 14
May 2019, from http://www.pearsonitcertification.com/articles/article.aspx?
p=1823690
8
Document Page
Networking 101: Understanding (and Using) ICMP.
(2019). Enterprisenetworkingplanet.com. Retrieved 14 May 2019, from
http://www.enterprisenetworkingplanet.com/netsp/article.php/3584166/Networking-
101-Understanding-and-Using-ICMP.htm
Autonomous System (AS) in The Network Encyclopedia.
(2019). Thenetworkencyclopedia.com. Retrieved 14 May 2019, from
http://www.thenetworkencyclopedia.com/entry/autonomous-system-as/
(2019). Nptel.ac.in. Retrieved 14 May 2019, from
https://nptel.ac.in/courses/106105080/pdf/M7L2.pdf
(2019). Sfu.ca. Retrieved 14 May 2019, from
https://www.sfu.ca/~sihengw/ENSC427_Group9/Final%20Report%20.pdf
Demicoli, C. (2016). Beginner's Guide to Understanding BGP. blog.cdemi.io.
Retrieved 14 May 2019, from https://blog.cdemi.io/beginners-guide-to-understanding-
bgp/
Dynamic Routing Protocols: Distance Vector and Link State Protocols.
(2019). Pluralsight.com. Retrieved 14 May 2019, from
https://www.pluralsight.com/blog/it-ops/dynamic-routing-protocol
9
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]