Networking Assignment: Protocols and Network Communication Concepts
VerifiedAdded on 2022/06/20
|7
|1545
|14
Homework Assignment
AI Summary
This document presents a comprehensive solution to a networking assignment, addressing key concepts such as classful and classless IP addressing, subnetting, and network addressing. It explains the functions of subnet masks and NAT, and differentiates between connection-oriented and connectionless services. The assignment further explores IP fragmentation, transition strategies, and the roles of ARP, RARP, and ICMP. It also covers autonomous systems, RIP, OSPF, and BGP, comparing distance vector and link state routing protocols. The document provides detailed explanations and examples to enhance understanding of fundamental networking principles.

Running head: NETWORKING
NETWORKING
Name of student
Name of university
Author’s note:
NETWORKING
Name of student
Name of university
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
NETWORKING
Answer of question 1:
In classful addressing system, the available IP addresses are divided into five classes. A, B,
C, D, and E where the classes A, B and C are used more often as the class D is for the
multicast and it is hardly used. Every IP addresses belongs to any particular class and this is
the reason why these are called classful addresses.
The Classless addressing is the method of allocating and specifying the internet addresses
that are utilised in the inter-domain routing more flexibly.
Answer of question 2:
In any class A network, the primary eight bits, or first dotted decimal, is the part of the
network of address with remaining part of address that is being the part of the host of the
address. There are 128 possible Class A network. It starts from 0.0.0.0 to 127.0.0.0 and the
initial few addresses are not used by anyone, so they are mostly wasted.
Answer of question 3:
A subnet mask separates the IP address into any subnet and the host address, if there is a
requirement of any subnetwork. This is called the subnet mask as it is utilised for identifying
the network address of any IP address by the performing of any bitwise AND operation on
netmask.
Answer of question 4:
Any network address is the identifier for any node or any host on any network block. The
designing of the network addresses is done to be unique identifiers all through the network,
even though some of the networks allows for the private and local addresses or the locally
administered addresses that might not be unique. In some of the cases, the hosts of the
network might not have network address that is more than one and each of the interface of
NETWORKING
Answer of question 1:
In classful addressing system, the available IP addresses are divided into five classes. A, B,
C, D, and E where the classes A, B and C are used more often as the class D is for the
multicast and it is hardly used. Every IP addresses belongs to any particular class and this is
the reason why these are called classful addresses.
The Classless addressing is the method of allocating and specifying the internet addresses
that are utilised in the inter-domain routing more flexibly.
Answer of question 2:
In any class A network, the primary eight bits, or first dotted decimal, is the part of the
network of address with remaining part of address that is being the part of the host of the
address. There are 128 possible Class A network. It starts from 0.0.0.0 to 127.0.0.0 and the
initial few addresses are not used by anyone, so they are mostly wasted.
Answer of question 3:
A subnet mask separates the IP address into any subnet and the host address, if there is a
requirement of any subnetwork. This is called the subnet mask as it is utilised for identifying
the network address of any IP address by the performing of any bitwise AND operation on
netmask.
Answer of question 4:
Any network address is the identifier for any node or any host on any network block. The
designing of the network addresses is done to be unique identifiers all through the network,
even though some of the networks allows for the private and local addresses or the locally
administered addresses that might not be unique. In some of the cases, the hosts of the
network might not have network address that is more than one and each of the interface of

2
NETWORKING
network might not be exclusively identified (Kreutz et al., 2015). The process of finding any
network address from a block of address can be understood from this example:
The addresses in the block can be converted into IPv4 notation gives range 172.41.100.32 -
172.41.100.47.
The addresses number can be calculated directly from CIDR (/28): 2³² ²⁸ = 2⁴ = 16.⁻
Answer of question 5:
The subnetting is a strategy that is used for partitioning any single physical network into
several minor logical sub-networks. The designing of subnets is done with accepting the bits
from any host part of the IP address. Any subnet mask consists of more consecutive 1s than
any corresponding default mask.
Answer of question 6:
NAT is referred to the process of assigning any public address to any computer where the
network, commonly a firewall inside the private network (Conti & Giordano, 2014). The
process of NAT is the method of remapping any space of IP address into another using the
modification of the information of the network address in the header of IP of the packets
while it is being transmitted across any routing device.
Answer of question 7:
Connection oriented requires the session connection to be established prior any transmission
of data is done. This methods is considered to be any reliable network service.
Connectionless services are the services that does not require any kind of session connection
among the receiver and sender.
Answer of question 8:
NETWORKING
network might not be exclusively identified (Kreutz et al., 2015). The process of finding any
network address from a block of address can be understood from this example:
The addresses in the block can be converted into IPv4 notation gives range 172.41.100.32 -
172.41.100.47.
The addresses number can be calculated directly from CIDR (/28): 2³² ²⁸ = 2⁴ = 16.⁻
Answer of question 5:
The subnetting is a strategy that is used for partitioning any single physical network into
several minor logical sub-networks. The designing of subnets is done with accepting the bits
from any host part of the IP address. Any subnet mask consists of more consecutive 1s than
any corresponding default mask.
Answer of question 6:
NAT is referred to the process of assigning any public address to any computer where the
network, commonly a firewall inside the private network (Conti & Giordano, 2014). The
process of NAT is the method of remapping any space of IP address into another using the
modification of the information of the network address in the header of IP of the packets
while it is being transmitted across any routing device.
Answer of question 7:
Connection oriented requires the session connection to be established prior any transmission
of data is done. This methods is considered to be any reliable network service.
Connectionless services are the services that does not require any kind of session connection
among the receiver and sender.
Answer of question 8:

3
NETWORKING
IP fragmentation is the process of IP that breaks the packets into minor pieces for enabling
the passing of the pieces through any link with the minimum MTU than original size of the
packet (Nunes et al., 2014). This process is required for executing fast transmission of the
packets in any network.
Answer of question 9:
Transition strategies are:
Dual stack routers
Tunnelling
NAT protocol translation
In tunnelling, several IP version exist on the intermediate transit or path networks. In dual
stack, the router is installed with both the configured IPv6 and IPv4 addresses on the
interfaces focusses on the network of related IP scheme.
Answer of question 10:
ARP: When the physical address is not given and the logical address is provided then the
method of ARP is utilised, which is a method of dynamic mapping (Keeble & Wilkinson,
2017).
RARP: This is the form of the dynamic mapping when the physical address is provided with
the logical address.
Answer of question 11:
ICMP: The Internet Control Message Protocol is the protocol for reporting error of the
network devices that is used by the routers for generating the error messages to source IP
address when any problems in network prevents the delivery of the IP packets (Kim &
NETWORKING
IP fragmentation is the process of IP that breaks the packets into minor pieces for enabling
the passing of the pieces through any link with the minimum MTU than original size of the
packet (Nunes et al., 2014). This process is required for executing fast transmission of the
packets in any network.
Answer of question 9:
Transition strategies are:
Dual stack routers
Tunnelling
NAT protocol translation
In tunnelling, several IP version exist on the intermediate transit or path networks. In dual
stack, the router is installed with both the configured IPv6 and IPv4 addresses on the
interfaces focusses on the network of related IP scheme.
Answer of question 10:
ARP: When the physical address is not given and the logical address is provided then the
method of ARP is utilised, which is a method of dynamic mapping (Keeble & Wilkinson,
2017).
RARP: This is the form of the dynamic mapping when the physical address is provided with
the logical address.
Answer of question 11:
ICMP: The Internet Control Message Protocol is the protocol for reporting error of the
network devices that is used by the routers for generating the error messages to source IP
address when any problems in network prevents the delivery of the IP packets (Kim &
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
NETWORKING
Feamster, 2013). The ICMP makes and transmits the messages to source IP address that
indicates that any gateway to internet that any service, host or router could not be reached for
the delivery of packet.
Answer of question 12:
The autonomous system is the collection of the connected prefixes of IP routing in control of
one or more than one operators on network on the behalf of any single entity of administrator
or the domain that represents any clearly, common routing policy that is defined to the
internet
Answer of question 13:
The purpose of the RIP is to prevent the loops of routing by the implementation of any limit
on hops number that is allowed to a path from the source to the destination (Zhang et al.,
2014). The RIP deploys the mechanisms of route poisoning, holddown and split horizon for
preventing the incorrect information of routing from transmitted.
Answer of question 14:
The functions of any RIP message is utilised by any router for requesting and receiving the
information of routing regarding the autonomous system or for periodically share the
knowledge with the neighbours.
Answer of question 15:
The propagation of the OSPF messages are done immediately as the router that is using the
OSPF would immediately flood the network about any alterations in the vicinity
(Johannisson, 2017). The distribution of the RIP messages is done slowly than the OSPF
messages.
Answer of question 16:
NETWORKING
Feamster, 2013). The ICMP makes and transmits the messages to source IP address that
indicates that any gateway to internet that any service, host or router could not be reached for
the delivery of packet.
Answer of question 12:
The autonomous system is the collection of the connected prefixes of IP routing in control of
one or more than one operators on network on the behalf of any single entity of administrator
or the domain that represents any clearly, common routing policy that is defined to the
internet
Answer of question 13:
The purpose of the RIP is to prevent the loops of routing by the implementation of any limit
on hops number that is allowed to a path from the source to the destination (Zhang et al.,
2014). The RIP deploys the mechanisms of route poisoning, holddown and split horizon for
preventing the incorrect information of routing from transmitted.
Answer of question 14:
The functions of any RIP message is utilised by any router for requesting and receiving the
information of routing regarding the autonomous system or for periodically share the
knowledge with the neighbours.
Answer of question 15:
The propagation of the OSPF messages are done immediately as the router that is using the
OSPF would immediately flood the network about any alterations in the vicinity
(Johannisson, 2017). The distribution of the RIP messages is done slowly than the OSPF
messages.
Answer of question 16:

5
NETWORKING
The purpose of BGP is to perform an inter autonomous communication. This protocol is used
for managing the routing of the packets through the internet (Xylomenos et al., 2014).
Answer of question 17:
Difference between distance vector routing and link state routing
Comparison basis Link state routing Distance vector routing
algorithm Bellman ford Dijsktra
Network view Information of topology
from neighbour perspective
Total information on
network topology
Best path calculation Minimum hops number is
the basis
Cost basis
Updates Complete table of routing Updates of link state
Updates frequency Updates periodically Updates are triggered
Memory and CPU Minimal utilisation Intensive
Simplicity high Trained network
administrator is required
NETWORKING
The purpose of BGP is to perform an inter autonomous communication. This protocol is used
for managing the routing of the packets through the internet (Xylomenos et al., 2014).
Answer of question 17:
Difference between distance vector routing and link state routing
Comparison basis Link state routing Distance vector routing
algorithm Bellman ford Dijsktra
Network view Information of topology
from neighbour perspective
Total information on
network topology
Best path calculation Minimum hops number is
the basis
Cost basis
Updates Complete table of routing Updates of link state
Updates frequency Updates periodically Updates are triggered
Memory and CPU Minimal utilisation Intensive
Simplicity high Trained network
administrator is required

6
NETWORKING
References
Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and
new research directions. IEEE Communications Magazine, 52(1), 85-96.
Johannisson, B. (2017). Networking and entrepreneurial growth. The Blackwell handbook of
entrepreneurship, 368-386.
Keeble, D., & Wilkinson, F. (2017). High-technology clusters, networking and collective
learning in Europe. Routledge.
Kim, H., & Feamster, N. (2013). Improving network management with software defined
networking. IEEE Communications Magazine, 51(2), 114-119.
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S.
(2015). Software-defined networking: A comprehensive survey. Proceedings of the
IEEE, 103(1), 14-76.
Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A
survey of software-defined networking: Past, present, and future of programmable
networks. IEEE Communications Surveys & Tutorials, 16(3), 1617-1634.
Xylomenos, G., Ververidis, C. N., Siris, V. A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., ...
& Polyzos, G. C. (2014). A survey of information-centric networking research. IEEE
Communications Surveys and Tutorials, 16(2), 1024-1049.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., ... &
Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer
Communication Review, 44(3), 66-73.
NETWORKING
References
Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and
new research directions. IEEE Communications Magazine, 52(1), 85-96.
Johannisson, B. (2017). Networking and entrepreneurial growth. The Blackwell handbook of
entrepreneurship, 368-386.
Keeble, D., & Wilkinson, F. (2017). High-technology clusters, networking and collective
learning in Europe. Routledge.
Kim, H., & Feamster, N. (2013). Improving network management with software defined
networking. IEEE Communications Magazine, 51(2), 114-119.
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S.
(2015). Software-defined networking: A comprehensive survey. Proceedings of the
IEEE, 103(1), 14-76.
Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A
survey of software-defined networking: Past, present, and future of programmable
networks. IEEE Communications Surveys & Tutorials, 16(3), 1617-1634.
Xylomenos, G., Ververidis, C. N., Siris, V. A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., ...
& Polyzos, G. C. (2014). A survey of information-centric networking research. IEEE
Communications Surveys and Tutorials, 16(2), 1024-1049.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., ... &
Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer
Communication Review, 44(3), 66-73.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.