Network Management Assignment: Switch, IPv6, and Subnetting Analysis

Verified

Added on  2020/04/15

|5
|778
|77
Homework Assignment
AI Summary
This document presents a comprehensive solution to a network management assignment, addressing key networking concepts. The solution begins by explaining how a switch learns and stores MAC addresses, differentiating between Layer 2 and Layer 3 switches. It then details how a host detects data packet loss, providing a clear understanding of TCP/IP communication. The assignment further explores the transition to IPv6, outlining considerations for network readiness. Finally, it includes a practical exercise in subnetting, where a given CIDR block is divided into subnets to accommodate different network sizes. The solution provides a detailed breakdown of subnet allocation, including address ranges, masks, and broadcast addresses for each subnet, and concludes with a list of relevant references.
Document Page
Running head: NETWORK MANAGEMENT
Network Management
Name of the Student
Name of the University
Authors Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1NETWORK MANAGEMENT
1. Explain how a switch learns MAC addresses, and where a switch stores the address.
Ans: Broadcast of frame cannot be achieved by a switch which is neither can be called as an
action which is performed by switch. Flooding of frame can be easily achieved by the help of
switch. Broadcast of a frame can be easily achieved by the help of switch which has MAC
address and the particular port which the frame contains (Afanasyev, et al,.2014). In the matter
of MAC address which is not present at the destination of MAC address after that frame is
broken into ports which is generally make use of port.
2. How does a layer 3 switch differ from a layer 2 switch?
Ans: Traditional method at which switch works generally consist OSI model in this method
switch models contains packets which generally works on the mode or principle of the
destination of MAC address (Davies, 2012). The routine method generally operates on the
known layer which the third one. In this mechanism the hop IP which is present next to it are the
one which totally works on the principle of IP address which situated next to the given layer
(Jung & Kim, 2015).
3. Explain how a host knows whether a data packet was not received.
Ans: At the time of transfer of packet data from one point to another a dialogue is used which
works between the TCP/ IP software of the system which is considered to be host. The received
system is used so as to ensure that transfer of various files is successful. (Decusatis, Carranza &
DeCusatis, 2012) In many cases it is seen whole file which is present at the TCP/ IP of the
receiving message to the TCP/ IP of the system at host which will allow the system the particular
packet which is missing. The process of receiving of packets continues until and unless it is fully
received by receiver.
Document Page
2NETWORK MANAGEMENT
4. Your boss has read about IPv6 and wants to know whether the network you oversee is
ready for the transition. Prepare a response based on the networking and computer
operating systems used in your facility.
Ans: Proper usage of IPv6 will result in elimination of NAT as the use of IPv6 will create
platform where devices can easily have their own IP address (Decusatis, Carranza & DeCusatis,
2012). Various devices will create a platform where there can be easy management for sharing of
files, and many other mechanisms which will result in avoidance of complex setting in the
modem and routers. Security will also increase by making use of IPv6.
5. Your company is assigned a 206.206.155.0/24 CIDR block by your ISP. Your company
consists of 5 different networks.
Network A: 50 users
Network B: 26 users
Network C: 12 users
Network D: 10 users
Your job is to create four subnets and allocate enough IP addresses for the users within the
network. Document how you will do this.
Ans:
Document Page
3NETWORK MANAGEMENT
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignable
Range
Broadcast
Networ
k A
50 62 206.206.155.0 /24 255.255.255.19
2
206.206.155.1 -
206.206.155.62
206.206.155.63
Networ
k B
26 30 206.206.155.64 /25 255.255.255.22
4
206.206.155.65
-
206.206.155.94
206.206.155.95
Networ
k C
12 14 206.206.155.96 /26 255.255.255.24
0
206.206.155.97
-
206.206.155.11
0
206.206.155.11
1
Networ
k D
10 14 206.206.155.11
2
/27 255.255.255.24
0
206.206.155.11
3 -
206.206.155.12
6
206.206.155.12
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4NETWORK MANAGEMENT
References:
Afanasyev, A., Burke, J., Zhang, L., Claffy, K., Wang, L., Jacobson, V., ... & Zhang, B. (2014).
Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-
73.
Davies, J. (2012). Understanding ipv6. Pearson Education.
Decusatis, C. J. S., Carranza, A., & DeCusatis, C. M. (2012). Communication within clouds:
open standards and proprietary protocols for data center networking. IEEE
Communications Magazine, 50(9).
Jung, K., & Kim, J. (2015). All-fibre photonic signal generator for attosecond timing and
ultralow-noise microwave. Scientific reports, 5, 16250.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]