Calculate the network address of the given block

Assignment Help Computer Networking
Reference no: EM131946929

Network Routing and Switching Assignment

Objectives

This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions. The questions contain numerical as well as descriptive questions covering the material.

The questions are designed to help you to achieve the unit learning outcomes as listed in the unit profile.

Instructions

You must do this assignment on your own - it is not a group assignment.

Type all your answers in the ‘Template for Your Answers' Section of this document and upload only that template. You could do that by copying the Template section into a new Word document for uploading. Answers that are not typed into the "Template for Your Answers" section may not be marked, or may be returned to you for re-typing and re-submission - late penalties will apply.

Question 1 - Address usage (3 marks)

Consider the following classless address block:

154.78.177.3/27

Listthe addresses from this block that would be used as:

a) the network address,
b) the direct broadcast address, and
c) the range available for hosts to use

Show the steps you took to arrive at your answers.

Question 2- Allocating subnets from a block (8 marks)

A company has been granted a block of addresses whichincludes the address138.77.216.5/24. Answer the following questions, showing your calculations.

a) Calculate the network address of this block and how many host addresses including special addresses this block can provide

b) Create the following 6 subnets for this company by calculating the subnet address for each subnet. Answer this question by filling in the table in the Answer template. Use CIDR format for the mask.

I. 2 subnets with 32 addresses each

II. 4 subnets with 16 addresses each

c) After some time, the company decides that it wants another subnet with 1,024 addresses. Explain whether this can be allocated from the existing block.

Question 3 - Network Tools (Windows)

Often the best way to gain an initial familiarity with network tools is to simply use them, at a basic level in exploratory mode as suggested in some of the tutorial exercises. Netstat and Tracert are included in Windows, while Wireshark is free to download and install. Explore Wireshark, Netstat and Tracert, then complete this question.

a) A wireshark scan has produced a packet capture, saved to a file named wireshark_capture01.pcapng and available on the Unit website. Download the file and open it in Wireshark, then answer these questions about the scan:

i. Very briefly summarise in your own words the content in each of the three horizontal display windows in Wireshark.

ii. In Frame 3, what brand of computer launched this scan and what was its IP address? State where this information is found.

iii. Briefly explain the exchange event captured in frames 4 - 6.

iv. Describe in your own words two specific network problems that a network administrator could use Wireshark for as a troubleshooting tool? (.5 mark)

b) A ‘NETSTAT -aon' command has given the output below (excerpted). Briefly describe each column heading, and the states LISTENING, ESTABLISHED and CLOSE_WAIT. (1 mark)

Active Connections

ProtoLocal Address                Foreign Address             State                PID
TCP    10.0.0.58:139             0.0.0.0:0                       LISTENING
TCP    10.0.0.58:5040           0.0.0.0:0                       LISTENING         7480
TCP    10.0.0.118:139           0.0.0.0:0                       LISTENING         4
TCP    10.0.0.118:52450       52.63.165.133:443         ESTABLISHED    14080
TCP    10.0.0.118:52458       104.116.191.195:443     CLOSE_WAIT     8912
TCP    10.0.0.118:52791       40.100.151.2:443          ESTABLISHED    22400
TCP    10.0.0.118:52811       162.125.34.129:443      ESTABLISHED    4696
TCP    10.0.0.118:52820       34.232.224.128:443      CLOSE_WAIT     4696
TCP    10.0.0.118:52879       162.125.34.129:443      ESTABLISHED    4696
...

c) Do a TRACERT on your computer to www.google.com. Paste the output to your assignment answer template and discuss the information being displayed.

Reference no: EM131946929

Questions Cloud

How you will motivate your employees to be highly productive : Explain the skills, knowledge, education, and experience that you will require of the store employees. Type your answer in complete sentences.
What angle with respect to the normal : Sunlight strikes the surface of a lake at an angle of incidence of 30o. At what angle with respect to the normal would a fish see the Sun
Write a memo to your supervisor requesting the technology : Research some new technologies and choose one that you would like to implement in your department to improve communication.
Angle between the polarizing directions of the sheets : What must be the angle between the polarizing directions of the sheets if the intensity of the transmitted light is to be one-third the incident intensity?
Calculate the network address of the given block : Calculate the network address of this block and how many host addresses including special addresses this block can provide.
What was the energy of the ?ray : (a). What was the energy of the ?ray? (b). The positron slows down nearly to rest and annihilates with an electron. What happens?
Wavelength matches the size of a benzene ring : What is the kinetic energy of electrons whose de Broglie wavelength matches the size of a benzene ring? (280 pm)
What is the energy rate for heating the air : a. What is the energy rate (Btu/min) for heating the air?
Why scenario planning is a useful technique for firms : Why scenario planning is a useful technique for firms competing in industries characterized by unpredictability and change. How is this important?

Reviews

Write a Review

Computer Networking Questions & Answers

  What are some of the ways you can secure dns and dhcp

What are some of the ways you can secure DNS and DHCP?

  How to choose a packet analysis or network management tool

Packet Capture - Discuss how to choose a packet analysis or network management tool given various network configurations

  A person providing information without direct knowledge

A person providing information without direct knowledge of or experience with the topic

  Discuss the issues related to the cable selection

A campus network is planning to put fiber optic cables in to replace outdated coaxial cables. They have the choice of putting in single-mode, multimode.

  Explain build a system or application in-house

"IT and technical organizations often assume that they can build a system or application in-house, in lieu of packaged products, either commercial or open source. Does this mean it is better to build it yourself? What should one do?"

  Define a dmz implementation and justify the decision

Define a DMZ implementation and justify the decision. Select physical security measures for each of the new academic buildings and justify the decision.

  What are the main components of cryptology

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext?- Define asymmetric encryption.

  Wlan security project report for bce

A local IT company ZeTech needs your help with a WLAN security project report for BCE. BCE is a medium size sports company and has 8 offices all around the world with 400-450 employees and around 500 daily customers on average

  Discuss the relationship between autonomous systems

COIT20261 Network Routing and Switching (Term 1, 2017) Assignment. Define the terms and discuss the relationship between Autonomous Systems

  Computer network security for a home

Assignment No. 1: Computer Network Security for a Home/Small scale Network.Learning outcomes:1. Identify the various threats and risks in a small scale network2. Describe and compare a number of different techniques to secure a network3. Analyse, eva..

  Asymmetrical digital subscriber line and wi-fi

Describe the specific modulation techniques that are used in a 56K modem, Asymmetrical Digital Subscriber Line, and Wi-Fi.

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd