Networking Technologies Worksheet Four Solution - Detailed Analysis
VerifiedAdded on 2023/04/11
|6
|1419
|454
Homework Assignment
AI Summary
This assignment provides detailed solutions to Networking Technologies Worksheet Four, covering essential networking concepts. It begins with a description of the IPv4 address structure, explaining the host and network parts, and subnet numbers. Next, it elucidates the construction of a switching table, detailing how MAC addresses are learned and utilized for directed communication. The assignment also describes the structure and usage of a routing table, including network ID, next hop information, and interface details. Furthermore, it includes a reflection on the improvements of IPv6 over IPv4, WAN connection strategies, and challenges faced in configuring remote access networks. The document concludes with a list of references and is available on Desklib, where students can find more solved assignments and study resources.

1
Networking Technologies Worksheet Four
Student's Name
Institutional Affiliation
Networking Technologies Worksheet Four
Student's Name
Institutional Affiliation
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

NETWORKING TECHNOLOGIES WORKSHEET FOUR 2
Question 1
Internet Protocol address is a name or a label, typically numerical that is assigned to each gadget
that utilizes Internet convention to impart and is effectively associated with a PC organize. IPv4
address is Internet Protocol form 4 and is a 32-bit number which is written as decimal digits and
is displayed as four octets, that is, four 8-bit segments that are isolated by periods. (Jameson et
al. 2016, p. 20). IPv4 address is comprised of two sections; the Host part and the system part.
The Network part is the main section of the location that expressly expresses the number that is
one of a kind and has been doled out to a given system. This part is likewise the system class
identifier. The Second piece of the system is the host part. This part expresses the host
unequivocally and it distinguishes the machine(s) on a specific system. On any system, the host
part is unique whereas the system part remains the same. Subnet numbers may likewise be there
in situations where the nearby system has a lot of hosts.
Question 2
Switching is alluded to as a strategy through which hubs switch information in order to pass on it
between indicated organize focuses (Marom et al. 2017, p. 15). A switch constructs the MAC
address table by first making one PC to send a frame to another PC to begin correspondence
process, the frame will be gotten by the switch on given interface and puts source MAC address
in the table, if the got MAC address isn't found in the table, the frame is sent or sent to the
remainder of the dynamic interfaces. The beneficiary PC gets the casing and sends a reaction to
the sender PC and after that the edge is gotten by the switch on the second interface and puts the
collector PC's MAC address in the table. This will make it feasible for balanced correspondence
between the recipient and sender PCs. Some place in the system is a third PC that can't see the
transmission of edges between the two conveying PCs; at whatever point a gadget imparts to this
Question 1
Internet Protocol address is a name or a label, typically numerical that is assigned to each gadget
that utilizes Internet convention to impart and is effectively associated with a PC organize. IPv4
address is Internet Protocol form 4 and is a 32-bit number which is written as decimal digits and
is displayed as four octets, that is, four 8-bit segments that are isolated by periods. (Jameson et
al. 2016, p. 20). IPv4 address is comprised of two sections; the Host part and the system part.
The Network part is the main section of the location that expressly expresses the number that is
one of a kind and has been doled out to a given system. This part is likewise the system class
identifier. The Second piece of the system is the host part. This part expresses the host
unequivocally and it distinguishes the machine(s) on a specific system. On any system, the host
part is unique whereas the system part remains the same. Subnet numbers may likewise be there
in situations where the nearby system has a lot of hosts.
Question 2
Switching is alluded to as a strategy through which hubs switch information in order to pass on it
between indicated organize focuses (Marom et al. 2017, p. 15). A switch constructs the MAC
address table by first making one PC to send a frame to another PC to begin correspondence
process, the frame will be gotten by the switch on given interface and puts source MAC address
in the table, if the got MAC address isn't found in the table, the frame is sent or sent to the
remainder of the dynamic interfaces. The beneficiary PC gets the casing and sends a reaction to
the sender PC and after that the edge is gotten by the switch on the second interface and puts the
collector PC's MAC address in the table. This will make it feasible for balanced correspondence
between the recipient and sender PCs. Some place in the system is a third PC that can't see the
transmission of edges between the two conveying PCs; at whatever point a gadget imparts to this

NETWORKING TECHNOLOGIES WORKSHEET FOUR 3
third PC, its MAC address is additionally included the MAC address table of the switch. Now,
the switch's MAC address table will contain all the MAC addresses thus gadgets will almost
certainly direct a coordinated correspondence. This makes the refreshed table and at whatever
point no frame is exchanged inside a given time, the switch expels the addresses from the switch
table (Martin et al. 2017, p. 374).
A switch usually builds a MAC address table of its own by taking a proper record of MAC
address of each and every device that has a connection to its ports. The switch makes use of
MAC address table information in sending frames out the port that are meant for particular
devices and that is assigned to that particular device. Once a switch has received a frame from a
port, it must also know where to send the frames to. For all that to be achieved, the switch has to
look at the switch table or rather the MAC address table to find its destination. Whenever the
switch does not find a table entry, the frame is flooded on all ports and upon a reply to the frame,
source MAC address is taken from the frame by the switch and added to switch table. Any time
the device receives a frame, it is found in the switch table and sent to the suitable port.
Question 3
A routing table is referred to as the data table found in a router or a computer that has been
networked and contains a list of network destination routes and distances associated with them. It
has all the information of network topology at its immediate surrounding. The routing table
contains information about network ID which composes of network destination and netmask.
Network destination usually identifies remote network address. The table also contains next hop
information which is the same as the gateway information. The next hop identifies the next
available route for packet forwarding. Another information that makes up the routing table is the
interface commonly called the outgoing interface. This information usually identifies the
third PC, its MAC address is additionally included the MAC address table of the switch. Now,
the switch's MAC address table will contain all the MAC addresses thus gadgets will almost
certainly direct a coordinated correspondence. This makes the refreshed table and at whatever
point no frame is exchanged inside a given time, the switch expels the addresses from the switch
table (Martin et al. 2017, p. 374).
A switch usually builds a MAC address table of its own by taking a proper record of MAC
address of each and every device that has a connection to its ports. The switch makes use of
MAC address table information in sending frames out the port that are meant for particular
devices and that is assigned to that particular device. Once a switch has received a frame from a
port, it must also know where to send the frames to. For all that to be achieved, the switch has to
look at the switch table or rather the MAC address table to find its destination. Whenever the
switch does not find a table entry, the frame is flooded on all ports and upon a reply to the frame,
source MAC address is taken from the frame by the switch and added to switch table. Any time
the device receives a frame, it is found in the switch table and sent to the suitable port.
Question 3
A routing table is referred to as the data table found in a router or a computer that has been
networked and contains a list of network destination routes and distances associated with them. It
has all the information of network topology at its immediate surrounding. The routing table
contains information about network ID which composes of network destination and netmask.
Network destination usually identifies remote network address. The table also contains next hop
information which is the same as the gateway information. The next hop identifies the next
available route for packet forwarding. Another information that makes up the routing table is the
interface commonly called the outgoing interface. This information usually identifies the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

NETWORKING TECHNOLOGIES WORKSHEET FOUR 4
interface for a packet to exit to its final destination or next hop. The metric shows the cost
associated with route usage; the preferred route usually has the lowest cost or value. Another
information is the route source which shows how the route was discovered and administrative
distance information for learning the trustworthiness of a given route source. Finally, the route
timestamp which is an identifier of when a particular route was last heard (Kamath et al. 2017, p.
238).
Generally, a routing table is used for the generation of information for a forwarding table that is
smaller. This smaller forwarding table only has the preferred routes for forwarding data packets
that are chosen by the routing algorithm. It is utilized so that whenever one hub needs to send
information parcels to another, it needs to initially know where the information is going to. In
case that particular node cannot send data directly to the destination node, it sends it through
another node available. A routing table is like a database hence used in keeping track of routes or
paths and identifies which path to forward traffic.
Reflection (a)
IPv6 was made in order to enhance functionalities and vigor in IPv4. The improvement grown by
IPv6 incorporates bigger location space, Hierarchical location space, Autoconfiguration, worked
in QoS, versatility and security backing, and extensibility. It utilizes 128 bits, not at all like IPv4
which utilizes 32 bits. Its interface is 64-bit and uses 48-bit MAC address for a bigger segment of
the addresses. IPv6 characterizes three kinds of location, in particular, Unicast, Multicast, and
Anycast. IPv6 autoconfiguration, for the most part, happens in two strategies to be specific
stateless and stateful arrangements. In the stateless design, the hub as a rule tunes in for switch
commercial messages from a nearby switch while in stateful autoconfiguration the hub utilizes
the autoconfiguration convention to get its very own IPv6 address and any required arrangement.
interface for a packet to exit to its final destination or next hop. The metric shows the cost
associated with route usage; the preferred route usually has the lowest cost or value. Another
information is the route source which shows how the route was discovered and administrative
distance information for learning the trustworthiness of a given route source. Finally, the route
timestamp which is an identifier of when a particular route was last heard (Kamath et al. 2017, p.
238).
Generally, a routing table is used for the generation of information for a forwarding table that is
smaller. This smaller forwarding table only has the preferred routes for forwarding data packets
that are chosen by the routing algorithm. It is utilized so that whenever one hub needs to send
information parcels to another, it needs to initially know where the information is going to. In
case that particular node cannot send data directly to the destination node, it sends it through
another node available. A routing table is like a database hence used in keeping track of routes or
paths and identifies which path to forward traffic.
Reflection (a)
IPv6 was made in order to enhance functionalities and vigor in IPv4. The improvement grown by
IPv6 incorporates bigger location space, Hierarchical location space, Autoconfiguration, worked
in QoS, versatility and security backing, and extensibility. It utilizes 128 bits, not at all like IPv4
which utilizes 32 bits. Its interface is 64-bit and uses 48-bit MAC address for a bigger segment of
the addresses. IPv6 characterizes three kinds of location, in particular, Unicast, Multicast, and
Anycast. IPv6 autoconfiguration, for the most part, happens in two strategies to be specific
stateless and stateful arrangements. In the stateless design, the hub as a rule tunes in for switch
commercial messages from a nearby switch while in stateful autoconfiguration the hub utilizes
the autoconfiguration convention to get its very own IPv6 address and any required arrangement.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

NETWORKING TECHNOLOGIES WORKSHEET FOUR 5
Interworks and WAN are a system involving at least two LAN associated together. There are
four primary WAN association strategies which incorporate Circuit-exchanged which make an
impermanent committed association among sender and beneficiary on interest, rented line which
gives a protected devoted and changeless point to point association from the customers LAN
through ISP to the goal organize, parcel exchanged which does not make a committed
association among sender and collector and VPN over the system which utilizes a web
association with confirmation and encryption to give a safe system to the LAN. Customers can
make dialed-up or VPN arrange associations with access servers found remotely. Distributed
computing is a systems administration model whereby every one of the conditions, for example,
information, applications, and preparing power are controlled and oversaw on the web. There are
three fundamental groupings of could registering which essentially involves hosted applications,
hosted platforms, and hosted infractructure
Reflection (b)
I find challenge in configuring a remote access network and making the VPN and a dial-up
connection in windows. In IP addressing, I have problems with the conversion of binary to
decimal and vice versa. Classless Interdomain Routing is also another concept that I don’t
understand well. Internet Protocol version six (IPv6) is an IP address that gives me problems in
understanding its structure.
Interworks and WAN are a system involving at least two LAN associated together. There are
four primary WAN association strategies which incorporate Circuit-exchanged which make an
impermanent committed association among sender and beneficiary on interest, rented line which
gives a protected devoted and changeless point to point association from the customers LAN
through ISP to the goal organize, parcel exchanged which does not make a committed
association among sender and collector and VPN over the system which utilizes a web
association with confirmation and encryption to give a safe system to the LAN. Customers can
make dialed-up or VPN arrange associations with access servers found remotely. Distributed
computing is a systems administration model whereby every one of the conditions, for example,
information, applications, and preparing power are controlled and oversaw on the web. There are
three fundamental groupings of could registering which essentially involves hosted applications,
hosted platforms, and hosted infractructure
Reflection (b)
I find challenge in configuring a remote access network and making the VPN and a dial-up
connection in windows. In IP addressing, I have problems with the conversion of binary to
decimal and vice versa. Classless Interdomain Routing is also another concept that I don’t
understand well. Internet Protocol version six (IPv6) is an IP address that gives me problems in
understanding its structure.

NETWORKING TECHNOLOGIES WORKSHEET FOUR 6
References
Jameson, D., Aalders, M. and Lahti, P., Avaya Inc, 2016. Method and system for enhanced
internet protocol address aggregation. U.S. Patent 9,521,063, pp. 15-23.
Kamath, D.G., Kumbhare, A.P., Mukherjee, N. and Pandey, V.A., International Business
Machines Corp, 2017. Switch routing table utilizing software-defined network (SDN) controller
programmed route segregation and prioritization. U.S. Patent 9,722,922, pp. 230-245.
Marom, D.M., Colbourne, P.D., D’errico, A., Fontaine, N.K., Ikuma, Y., Proietti, R., Zong, L.,
Rivas-Moscoso, J.M. and Tomkos, I., 2017. Survey of photonic switching architectures and
technologies in support of spatially and spectrally flexible optical networking. IEEE/OSA
Journal of Optical Communications and Networking, 9(1), pp.1-26.
Martin, J., Mayberry, T., Donahue, C., Foppe, L., Brown, L., Riggins, C., Rye, E.C. and Brown,
D., 2017. A study of MAC address randomization in mobile devices and when it
fails. Proceedings on Privacy Enhancing Technologies, 2017(4), pp.365-383.
References
Jameson, D., Aalders, M. and Lahti, P., Avaya Inc, 2016. Method and system for enhanced
internet protocol address aggregation. U.S. Patent 9,521,063, pp. 15-23.
Kamath, D.G., Kumbhare, A.P., Mukherjee, N. and Pandey, V.A., International Business
Machines Corp, 2017. Switch routing table utilizing software-defined network (SDN) controller
programmed route segregation and prioritization. U.S. Patent 9,722,922, pp. 230-245.
Marom, D.M., Colbourne, P.D., D’errico, A., Fontaine, N.K., Ikuma, Y., Proietti, R., Zong, L.,
Rivas-Moscoso, J.M. and Tomkos, I., 2017. Survey of photonic switching architectures and
technologies in support of spatially and spectrally flexible optical networking. IEEE/OSA
Journal of Optical Communications and Networking, 9(1), pp.1-26.
Martin, J., Mayberry, T., Donahue, C., Foppe, L., Brown, L., Riggins, C., Rye, E.C. and Brown,
D., 2017. A study of MAC address randomization in mobile devices and when it
fails. Proceedings on Privacy Enhancing Technologies, 2017(4), pp.365-383.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





