University Networking Basics Assignment: IPv4, IPv6, and Protocols
VerifiedAdded on 2022/09/01
|10
|1712
|16
Homework Assignment
AI Summary
This document presents a comprehensive solution to a networking assignment, addressing key concepts in computer networking. The assignment covers the differences between classful and classless addressing in IPv4, explaining address allocation and the inefficiencies of class A and the limitatio...

Running head: BASICS OF NETWORKING
BASICS OF NETWORKING
Student Name:
University Name:
Note of the Author:
BASICS OF NETWORKING
Student Name:
University Name:
Note of the Author:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1BASICS OF NETWORKING
Table of Contents
Answer 1:...................................................................................................................................2
Answer 2:...................................................................................................................................2
Answer 3:...................................................................................................................................2
Answer 4:...................................................................................................................................2
Answer 5:...................................................................................................................................3
Answer 6:...................................................................................................................................3
Answer 7:...................................................................................................................................3
Answer 8:...................................................................................................................................3
Answer 9:...................................................................................................................................4
Answer 10:.................................................................................................................................4
Answer 11:.................................................................................................................................4
Answer 12:.................................................................................................................................4
Answer 13:.................................................................................................................................5
Answer 14:.................................................................................................................................5
Answer 15:.................................................................................................................................5
Answer 16:.................................................................................................................................5
Answer 17:.................................................................................................................................5
References..................................................................................................................................7
Table of Contents
Answer 1:...................................................................................................................................2
Answer 2:...................................................................................................................................2
Answer 3:...................................................................................................................................2
Answer 4:...................................................................................................................................2
Answer 5:...................................................................................................................................3
Answer 6:...................................................................................................................................3
Answer 7:...................................................................................................................................3
Answer 8:...................................................................................................................................3
Answer 9:...................................................................................................................................4
Answer 10:.................................................................................................................................4
Answer 11:.................................................................................................................................4
Answer 12:.................................................................................................................................4
Answer 13:.................................................................................................................................5
Answer 14:.................................................................................................................................5
Answer 15:.................................................................................................................................5
Answer 16:.................................................................................................................................5
Answer 17:.................................................................................................................................5
References..................................................................................................................................7

2BASICS OF NETWORKING

3BASICS OF NETWORKING
Answer 1:
In classful addressing, it allows for efficient allocation of the addresses of IP than in
the addressing that is classless for IPv4. In the former one, assignment of the IP addresses is
done according to the major classes of A, B, C, D and E (Anand S & Jayavignesh T, 2019,
February, 20). However, in classless addressing, IP addresses are allocated in a way that they
are not exhausted rapidly. In classful addressing, Network ID and Host ID changes as the
class varies making it less practical unlike classless addressing where no boundary exists for
the ID’s making it more useful.
Answer 2:
Class A address can incorporate a huge number of hosts; and routers with the first
octet of 8 bits recognises the network, and the last three comprising of 24 bits signifies the
host. The first bit of network is zero, thus 27=128 blocks are available. Among the host, 224
=16777214 addresses are available. Thus, many addresses in class A are wasted. However,
for class C, only 254 hosts are available that is insufficient for large organizations.
Answer 3:
The networking address and the hosting address are the two prime components of an
IP address. The subnet mask in IPv4 addressing does the separation between these two types
of addresses in an IP address. Comprising of a 32-bit address, this mask carries out bitwise
AND operation on the net-mask to represent the network part of the IP address.
Answer 4:
The Internet Protocol addresses comprises of two parts, out of which the first part is
called the network address and the later parts are the host address (Al-Sarawi et al., 2017 May
17). The subnet mask separates these two components. The first octet in IPv4 addressing is
Answer 1:
In classful addressing, it allows for efficient allocation of the addresses of IP than in
the addressing that is classless for IPv4. In the former one, assignment of the IP addresses is
done according to the major classes of A, B, C, D and E (Anand S & Jayavignesh T, 2019,
February, 20). However, in classless addressing, IP addresses are allocated in a way that they
are not exhausted rapidly. In classful addressing, Network ID and Host ID changes as the
class varies making it less practical unlike classless addressing where no boundary exists for
the ID’s making it more useful.
Answer 2:
Class A address can incorporate a huge number of hosts; and routers with the first
octet of 8 bits recognises the network, and the last three comprising of 24 bits signifies the
host. The first bit of network is zero, thus 27=128 blocks are available. Among the host, 224
=16777214 addresses are available. Thus, many addresses in class A are wasted. However,
for class C, only 254 hosts are available that is insufficient for large organizations.
Answer 3:
The networking address and the hosting address are the two prime components of an
IP address. The subnet mask in IPv4 addressing does the separation between these two types
of addresses in an IP address. Comprising of a 32-bit address, this mask carries out bitwise
AND operation on the net-mask to represent the network part of the IP address.
Answer 4:
The Internet Protocol addresses comprises of two parts, out of which the first part is
called the network address and the later parts are the host address (Al-Sarawi et al., 2017 May
17). The subnet mask separates these two components. The first octet in IPv4 addressing is
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4BASICS OF NETWORKING
the network address. To find the network address of an IP address, when the other blocks are
known, AND bitwise operation is applied between the net mask and the IP address.
Answer 5:
The procedure or strategy followed to make partition of a single network into smaller
sub networks consisting of a network and a host is known as sub-netting. These small-
subdivided networks are called subnets. In classful addressing, the default mask has less
consecutive 1’s than the corresponding subnet masks.
Answer 6:
Network Address Translation or NAT is the procedure used to remap one IP address
into another by making modifications in the network address. By this method, the security in
the IP address is maintained. While doing the mapping it is checked which address does not
have a partner that can be assigned (Richter et al., 2016 Nov 14). Those IP addresses are
discarded. Thus, NAT helps in reducing unnecessary IP addresses.
Answer 7:
In connection oriented service protocol, a confirmation is taken on whether the
message is delivered or not, unlike the connection less services. Since the confirmation is
taken, hence authentic connection is a necessity in the former one whereas not a necessary
factor in the latter one. Hence, connection based protocol are more reliable than the
connection less services.
Answer 8:
Datagrams are the packets of data that are transferred through a network. The process
of breaking up these datagrams into smaller fragments during the transmission process is
the network address. To find the network address of an IP address, when the other blocks are
known, AND bitwise operation is applied between the net mask and the IP address.
Answer 5:
The procedure or strategy followed to make partition of a single network into smaller
sub networks consisting of a network and a host is known as sub-netting. These small-
subdivided networks are called subnets. In classful addressing, the default mask has less
consecutive 1’s than the corresponding subnet masks.
Answer 6:
Network Address Translation or NAT is the procedure used to remap one IP address
into another by making modifications in the network address. By this method, the security in
the IP address is maintained. While doing the mapping it is checked which address does not
have a partner that can be assigned (Richter et al., 2016 Nov 14). Those IP addresses are
discarded. Thus, NAT helps in reducing unnecessary IP addresses.
Answer 7:
In connection oriented service protocol, a confirmation is taken on whether the
message is delivered or not, unlike the connection less services. Since the confirmation is
taken, hence authentic connection is a necessity in the former one whereas not a necessary
factor in the latter one. Hence, connection based protocol are more reliable than the
connection less services.
Answer 8:
Datagrams are the packets of data that are transferred through a network. The process
of breaking up these datagrams into smaller fragments during the transmission process is

5BASICS OF NETWORKING
known as IP fragmentation (Tilli & Kantola, 2017 Sep 18). This fragmentation of datagrams
is a necessity because transfer of smaller data chunks are easier than bigger data fragments.
Answer 9:
The transition strategies that are used by many organizations to move from IPv4
addresses to IPv6 are the Dual Stack, Tunneling and Translation. The Dual Stack is the
procedure where the IPv6 addresses are run on all the devices incorporating IPv4 addresses.
However, this is not an efficient method. Tunneling, is the transfering of data packets through
the addresses by encapsulating and decapsulating them.
Answer 10:
Some common address mapping protocols are the Address Resolution Protocols
(ARP), the Reverse Address Resolution Protocol (RARP) and the Internet Control Message
Protocol (ICMP) (Kietzmann et al., 2017 Sep 26). ARP is used when a computer uses a ping
program to contact a remote machine. RARP is used in machines that need a direct network
access. ICMP is used in connection less based protocols to deliver messages from source to
destination.
Answer 11:
The routers use Internet Control Message Protocol or the ICMP to notify with the
fault messages that has to be send to the source IP address when the messages fail to reach its
destination due to network problems. The ICMP does not help in sending the data through
delivery packets and only creates notification. ICMP is needed to keep a track, which
delivery packets are, send and which were failed to deliver.
known as IP fragmentation (Tilli & Kantola, 2017 Sep 18). This fragmentation of datagrams
is a necessity because transfer of smaller data chunks are easier than bigger data fragments.
Answer 9:
The transition strategies that are used by many organizations to move from IPv4
addresses to IPv6 are the Dual Stack, Tunneling and Translation. The Dual Stack is the
procedure where the IPv6 addresses are run on all the devices incorporating IPv4 addresses.
However, this is not an efficient method. Tunneling, is the transfering of data packets through
the addresses by encapsulating and decapsulating them.
Answer 10:
Some common address mapping protocols are the Address Resolution Protocols
(ARP), the Reverse Address Resolution Protocol (RARP) and the Internet Control Message
Protocol (ICMP) (Kietzmann et al., 2017 Sep 26). ARP is used when a computer uses a ping
program to contact a remote machine. RARP is used in machines that need a direct network
access. ICMP is used in connection less based protocols to deliver messages from source to
destination.
Answer 11:
The routers use Internet Control Message Protocol or the ICMP to notify with the
fault messages that has to be send to the source IP address when the messages fail to reach its
destination due to network problems. The ICMP does not help in sending the data through
delivery packets and only creates notification. ICMP is needed to keep a track, which
delivery packets are, send and which were failed to deliver.

6BASICS OF NETWORKING
Answer 12:
When a single organization manages a network or a collection of it, it is called an
autonomous system in networking. These large organizations might be schools, banks or any
medical institutions. When these large enterprises uses a single Internet Service Provider to
provide network to its various devices, it is called autonomous system.
Answer 13:
Routing Information Protocol or RIP determines the optimum route for a message to
be delivered from its source to its destination over a network (Verma & Bhardwaj, 2016
April). RIP is an algorithm helps in delivering the message within the shortest span of time
using the greatest speed. A hop count is used to measure the distance from one router to
another.
Answer 14:
The Routing Information Protocol messages or the RIP messages are shared between
autonomous systems and its neighbours. These messages are used to request and receive
information about routing amongst the autonomous systems and periodically share the
knowledge with the other systems.
Answer 15:
In OSPF link state protocol, the router that is using the network updates with
messages informing about any kind of changes that is happening in the neighbourhood.
However, the RIP messages are updated periodically and are distributed very slowly if any
changes occurs between the routers.
Answer 12:
When a single organization manages a network or a collection of it, it is called an
autonomous system in networking. These large organizations might be schools, banks or any
medical institutions. When these large enterprises uses a single Internet Service Provider to
provide network to its various devices, it is called autonomous system.
Answer 13:
Routing Information Protocol or RIP determines the optimum route for a message to
be delivered from its source to its destination over a network (Verma & Bhardwaj, 2016
April). RIP is an algorithm helps in delivering the message within the shortest span of time
using the greatest speed. A hop count is used to measure the distance from one router to
another.
Answer 14:
The Routing Information Protocol messages or the RIP messages are shared between
autonomous systems and its neighbours. These messages are used to request and receive
information about routing amongst the autonomous systems and periodically share the
knowledge with the other systems.
Answer 15:
In OSPF link state protocol, the router that is using the network updates with
messages informing about any kind of changes that is happening in the neighbourhood.
However, the RIP messages are updated periodically and are distributed very slowly if any
changes occurs between the routers.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7BASICS OF NETWORKING
Answer 16:
The routing protocol that is used when messages are exchanged between host
gateways, Internet and the autonomous systems is called the BGP or the Border Gateway
Protocol. It supervises the path, between different gateway routers, networks and hosts while
exchanging messages (Chang, Arianezhad & Trajković, 2016 May 15). The routing decision
is taken based on the BGP.
Answer 17:
An overall information on the network topology is viewed in the link state routing
while, for distance vector routing, the topology information is viewed from the neighbour’s
point (Lehman et al., 2016 Jan). Thus, distance vector routing is less utilized than link state
routing. In link state routing, updates occur on triggers while in distance vector routing
periodic updates occur.
Answer 16:
The routing protocol that is used when messages are exchanged between host
gateways, Internet and the autonomous systems is called the BGP or the Border Gateway
Protocol. It supervises the path, between different gateway routers, networks and hosts while
exchanging messages (Chang, Arianezhad & Trajković, 2016 May 15). The routing decision
is taken based on the BGP.
Answer 17:
An overall information on the network topology is viewed in the link state routing
while, for distance vector routing, the topology information is viewed from the neighbour’s
point (Lehman et al., 2016 Jan). Thus, distance vector routing is less utilized than link state
routing. In link state routing, updates occur on triggers while in distance vector routing
periodic updates occur.

8BASICS OF NETWORKING
References
Al-Sarawi S, Anbar M, Alieyan K, Alzubaidi M. Internet of Things (IoT) communication
protocols. In2017 8th International conference on information technology (ICIT) 2017 May
17 (pp. 685-690). IEEE.
Anand S, Jayavignesh T. An Efficient Mask Reduction Strategy to Optimize Storage and
Computational Complexity in Routing Table Lookups. In2019 IEEE International
Conference on Electrical, Computer and Communication Technologies (ICECCT) 2019 Feb
20 (pp. 1-5). IEEE.
Chang G, Arianezhad M, Trajković L. Using resource public key infrastructure for secure
border gateway protocol. In2016 IEEE Canadian Conference on Electrical and Computer
Engineering (CCECE) 2016 May 15 (pp. 1-6). IEEE.
Kietzmann P, Gündoğan C, Schmidt TC, Hahm O, Wählisch M. The need for a name to
MAC address mapping in NDN: towards quantifying the resource gain. InProceedings of the
4th ACM Conference on Information-Centric Networking 2017 Sep 26 (pp. 36-42). ACM.
Lehman V, Hoque AM, Yu Y, Wang L, Zhang B, Zhang L. A secure link state routing
protocol for NDN. Tech. Rep. NDN-0037. 2016 Jan.
Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C,
Weaver N, Paxson V. A multi-perspective analysis of carrier-grade NAT deployment.
InProceedings of the 2016 Internet Measurement Conference 2016 Nov 14 (pp. 215-229).
ACM.
Tilli JM, Kantola R. Data plane protocols and fragmentation for 5g. In2017 IEEE Conference
on Standards for Communications and Networking (CSCN) 2017 Sep 18 (pp. 207-213).
IEEE.
References
Al-Sarawi S, Anbar M, Alieyan K, Alzubaidi M. Internet of Things (IoT) communication
protocols. In2017 8th International conference on information technology (ICIT) 2017 May
17 (pp. 685-690). IEEE.
Anand S, Jayavignesh T. An Efficient Mask Reduction Strategy to Optimize Storage and
Computational Complexity in Routing Table Lookups. In2019 IEEE International
Conference on Electrical, Computer and Communication Technologies (ICECCT) 2019 Feb
20 (pp. 1-5). IEEE.
Chang G, Arianezhad M, Trajković L. Using resource public key infrastructure for secure
border gateway protocol. In2016 IEEE Canadian Conference on Electrical and Computer
Engineering (CCECE) 2016 May 15 (pp. 1-6). IEEE.
Kietzmann P, Gündoğan C, Schmidt TC, Hahm O, Wählisch M. The need for a name to
MAC address mapping in NDN: towards quantifying the resource gain. InProceedings of the
4th ACM Conference on Information-Centric Networking 2017 Sep 26 (pp. 36-42). ACM.
Lehman V, Hoque AM, Yu Y, Wang L, Zhang B, Zhang L. A secure link state routing
protocol for NDN. Tech. Rep. NDN-0037. 2016 Jan.
Richter P, Wohlfart F, Vallina-Rodriguez N, Allman M, Bush R, Feldmann A, Kreibich C,
Weaver N, Paxson V. A multi-perspective analysis of carrier-grade NAT deployment.
InProceedings of the 2016 Internet Measurement Conference 2016 Nov 14 (pp. 215-229).
ACM.
Tilli JM, Kantola R. Data plane protocols and fragmentation for 5g. In2017 IEEE Conference
on Standards for Communications and Networking (CSCN) 2017 Sep 18 (pp. 207-213).
IEEE.

9BASICS OF NETWORKING
Verma A, Bhardwaj N. A review on routing information protocol (RIP) and open shortest
path first (OSPF) routing protocol. International Journal of Future Generation
Communication and Networking. 2016 Apr 1;9(4):161-70.
Verma A, Bhardwaj N. A review on routing information protocol (RIP) and open shortest
path first (OSPF) routing protocol. International Journal of Future Generation
Communication and Networking. 2016 Apr 1;9(4):161-70.
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.