MITS4002 Networking Assignment: Addressing and Protocols

Verified

Added on  2022/11/24

|8
|1512
|199
Homework Assignment
AI Summary
This assignment provides a comprehensive overview of core networking concepts. It begins by differentiating between classful and classless addressing in IPv4, explaining address wastage in Class A, and the limitations of Class C for larger organizations. The assignment details the function of masks, network addresses, and subnetting. It further explores NAT, its benefits in address depletion, and the differences between connection-oriented and connectionless services. Fragmentation, transition strategies from IPv4 to IPv6 (including tunneling and dual stack), and common address mapping protocols are also discussed. The role of ICMP and autonomous systems are explained. Finally, the assignment covers routing protocols like RIP, OSPF, and BGP, detailing their functions and message characteristics. The document concludes with a bibliography of cited sources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: BASICS OF NETWORKING
BASICS OF NETWORKING
Name of the Student
Name of the University
Authors note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BASICS OF NETWORKING
1.Classful addressing bifurcates the IP address into host ID and network ID. Classful
addressing limits the count of network which can be providing to the network. In classful
addressing subset mask is used. Classless addressing allows the usage of subnet mask which
is of varying length called VLSM (Variable Length Subnet Mask). The subnet mask used is
different in the same network. Network ID and host ID is not bounded in classless
addressing. In classless addressing has no subnet mask.
2.Class A is large as it has 24 bits of addressing that is enough for a large number of
individual devices. This is the reason as why Class A address is wasted. The class A subnet is
large for almost all organization and most establishment have small scale amount of devices.
Hence a big chunk of Class A addressing is not used as is wasted.
The reason for most organization not wanting a clock of Class C is because Class C is
way too small scale for organizations.
3.Mask in IPv4 is used to recognize the network addresses of the IP address by bitwise AND
operation on netmask. The subnet mask masks the IP address and further bifurcates the
address into host address and network address.
4. In one block of address, network address is the very first address. Given that if one of the
addresses in the block is known, we can find the network address by ANDing the mask with
the known address in the block.
5.Subnetting is the method to partition one single network into smaller logical networks or
subnets. Partition is done to generate more than one sub networks. Subnets are highly
Document Page
BASICS OF NETWORKING
enhances security and efficiency of network and reduces broadcast domain size. Subnets
accepts the bits from host segment of the IP address, uses the bits to allocate sub networks
within the initial network.
Default subnet mask in IP addresses for Class A, B and C are:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Subnetting gives allowance to create multiple networks with the existing network. In a
classful addressing the number of consecutive one’s in subnet mask is more than default
mask.
6.NAT or Network Address Translation is so designed to conserve IP address. The IP
networks which are private and uses unregistered addresses, NAT enables them to link to the
Internet. NAT connects two distinct network together and a router is needed to operate NAT.
NAT translates private addresses into the legal address inside the network before any data
packets are send into another network. NAT is configured to proclaim 1 address for whole
network. This enhances security level as the internal network is hidden behind the address.
NAT improves the security of the network and reduces the count of the IP addresses
the organization needs. The user can have internally a large set of address or a small set
externally. NAT helps in address depletion by regulating the traffic on the larger set and the
traffic outside to the smaller set.
Document Page
BASICS OF NETWORKING
7.Connection Oriented Services creates virtual connection before the packets are sent on the
internet. There is a need to authenticate the data destination before data is transferred. The
connection is way reliable and handshaking is applied to ensure agreement between the
sender and the receiver. Connectionless services send packets without the creating of virtual
connection. The data packets are send to the unauthenticated destination. There is no
reliability on the transmission of the data packets. Lastly, handshaking is not performed when
the packets are send on the network.
8.Fragmentation is the process of breaking the data packets into small packet size, maximum
number of PDU (Packet Data Unit) which are supported by underlying networks.
Fragmentation is needed as MTU or Maximum Transmission Unit varies from one
router to the other.
9. The strategies required to move from IPv4 to IPv6 are: Data Stack Routers, Tunneling and
NAT Protocol Translation.
Tunneling provides solution to pass the data in the scenario where there is dissimilar version
of IP existing on the transit networks.
Dual Stack strategy has the capability to communicate simultaneously with both the network
thus providing a medium to access server by the host without having to change the IP
versions respectively.
10. The Common address mapping protocols are Reverse ARP(RARP), ARP, Proxy ARP,
Inverse ARP(InARP) and Gratuitous ARP.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BASICS OF NETWORKING
11. ICMP or Internet Control message protocol is a protocol network used for reporting
errors. This protocol is used to generate error messages by devices like routers to the IP
address of the source when delivery of IP packets are prevented due to problems in the
network. The necessity of ICMP takes place due to the absence of in-built mechanism for
transmitting of error and control messages in IP.
12. The collection of networks, heterogeneous in nature, whose management and supervision
is done by a single organisation is known as an Autonomous System (AS). An AS contains
many subnetworks that have a common routing logic with routing policies that are common
for all and every subnetwork is assigned a unique 16-digit identification code, known as AS
number or ASN, provided by the IANA (Internet Assigned Numbers Authority)
13. RIP or Routing Information Protocol serves the purpose of preventing routing loops by
putting a restriction over the number of hops that are allowed in a path between the source
and destination.
14. The function of a Routing Information Protocol message, used by a router, is requesting
and receiving of information related to routing of an Autonomous System (AS) and also to
share its knowledge in a periodic manner with neighbors.
15. OSPF or Open Shortest Path First messages are transmitted with immediate priority
because the network gets flooded with the changes occurring in any neighborhood by the
router using OSPF. While RIP messages have a slow transmission because of its dependence
on periodic updates that happen every 30 seconds for carrying the news to the routers.
Document Page
BASICS OF NETWORKING
16. The purpose of BGP or Border Gateway Protocol is the management of routing of packets
over the internet with the use of the exchange of routing and reach-ability information
between the edge routers. It also gives direction to the packets between the ASs.
17. Distance vector routing uses Bellman ford algorithm while that of the link state routing is
Dijkstra’s algorithm. Full routing is updated for the former while the later updates the link
states only. Unlike DVR, LSR do have a hierarchical structure.
Document Page
BASICS OF NETWORKING
Bibliography
Merkel, M. and Schneider, F., NEC Laboratories Europe GmbH, 2019. Method for operating
a software defined network and a software defined network. U.S. Patent Application
16/218,521.
Benassai, G., Aucelli, P., Budillon, G., De Stefano, M., Di Luccio, D., Di Paola, G.,
Montella, R., Mucerino, L., Sica, M. and Pennetta, M., 2017. Rip current evidence by
hydrodynamic simulations, bathymetric surveys and UAV observation. Nat. Hazards Earth
Syst. Sci, 17, pp.1493-1503.
Khan, A.Z., Saudi Arabian Oil Co, 2018. Ipv4 addressing schema design methodology using
a visual interactive tool. U.S. Patent Application 15/626,906.
Carter-Schwendler, C. and Sangubhatla, M., Microsoft Technology Licensing LLC,
2016. IPv4/IPv6 bridge. U.S. Patent 9,392,080.
Jeong, W., Cho, H., Lee, Y., Lee, J., Yoon, S., Hwang, J. and Lee, D., 2017. Improving flash
storage performance by caching address mapping table in host memory. In 9th {USENIX}
Workshop on Hot Topics in Storage and File Systems (HotStorage 17).
Perkins, C.E., WiChorus Inc, 2015. Method and apparatus for performing network address
translation. U.S. Patent 8,942,233.
Sun, Y., Xu, M. and Shieh, C.Y.M., VARMOUR NETWORKS Inc, 2016. Non-fragmented
IP packet tunneling in a network. U.S. Patent 9,294,302.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BASICS OF NETWORKING
Lee, J., Noh, J., Lee, C., Muehle, M., Schroeder, A., Paskamp, M. and Cha, S.K., SAP SE,
2015. Update protocol for client-side routing information. U.S. Patent 9,037,677.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]