Calculating the subnet address for each subnet

Assignment Help Computer Networking
Reference no: EM132093323

Objectives

This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions.

The questions contain numerical as well as descriptive questions covering the material up to Week 6.

The questions are designed to help you to achieve the unit learning outcomes as listed in the unit profile.

Question 1 - Address usage

Consider the following classless address block:

145.87.100.3/25

Calculate the following:

a) the network address,
b) the direct broadcast address, and
c) the range of addresses available for hosts

Show the steps you took to arrive at your answers.

Question 2- Allocating subnets from a block

A company has been granted a block of addresses whichincludes the address 172.38.216.7/23. Answer the following questions, showing your calculations.

a) Calculate the network address of this block and how many addresses including special addresses this block can provide

b) Create the following 6 subnets for this company by calculating the subnet address for each subnet. Answer this question by filling in the table in the Answer template. Use CIDR format for the mask.
I. 2 subnets with 64 addresses each
II. 4 subnets with 32 addresses each

c) How many addresses are unallocated? Show calculation

Question 3 - Network Tools (Windows)
Often the best way to gain an initial familiarity with network tools is to simply use them, at a basic level in exploratory mode as suggested in some of the tutorial exercises. Netstat and Tracert are included in Windows, while Wireshark is free to download and install. Explore Wireshark, Netstat and Tracert, then complete this question.

a) A wireshark scan has produced a packet capture, saved to a file named wireshark_capture01.pcapng and available on the Unit website. Download the file and open it in Wireshark, then answer these questions about the scan:

i. View Frame 2: On which interface was this packet captured? what transport layer protocol was used? What kind of message was being transmitted at that point?

ii. View Frame 10: What transport layer protocol was used? Scan a few more frames down: what general activity was the user most likely engaged in? - give reasons

b) A ‘NETSTAT -aon' command has given the output shown below. Focussing on line 4 (highlighted), what type of application is sending messages on this connection, and is it over a secure connection or not a secure connection? - give reasons

Active Connections

Proto  Local Address         Foreign Address     State         PID

1 TCP    10.0.0.58:139          0.0.0.0:0              LISTENING      

2 TCP    10.0.0.58:5040         0.0.0.0:0              LISTENING      7480

3 TCP    10.0.0.118:139         0.0.0.0:0              LISTENING       4

4 TCP    10.0.0.118:52450       52.63.165.133:443      ESTABLISHED     14080

5 TCP    10.0.0.118:52458       104.116.191.195:443    CLOSE_WAIT      8912

6 TCP    10.0.0.118:52791       40.100.151.2:443       ESTABLISHED     22400

7 TCP    10.0.0.118:52811       162.125.34.129:443     ESTABLISHED     4696

8 TCP    10.0.0.118:52820       34.232.224.128:443     CLOSE_WAIT      4696

9 TCP    10.0.0.118:52879       162.125.34.129:443     ESTABLISHED     4696

c) Do a TRACERT on your computer to facebook. Paste the output to your assignment answer template and discuss the output in sufficient detail to demonstrate that you understand the information being displayed

Verified Expert

In this assignment we have studied networking concept. Here we write different concept like tracer and netstate command and we have done calculations for subnet mask

Reference no: EM132093323

Questions Cloud

Non employees on portland intramural sports teams : Write an e-mail or hard-copy memo to the staff denying the request of several employees to include non employees on Portland’s intramural sports teams.
Discuss a business in a specific industry : Discusses a business in a specific industry that is being successful or unsuccessful as a result of one or more of the six (6) elements.
Gdp in measuring total output and national welfare : What are the limitations of the GDP in measuring total output and national welfare?
Discuss the meaning of ergonomics : Employee safety extends to their workspaces. For HIM Professionals, this often involves an office, cubicle, or other space that contains a desk, computer.
Calculating the subnet address for each subnet : COIT20261 Network Routing and Switching - Create the following 6 subnets for this company by calculating the subnet address for each subnet
Potential explanations to the lasting us deficit : What are then the potential explanations to the lasting US deficit?
What is karl marx explanation : What is Karl Marx' explanation of why the industrial revolution began in Britain and how did his narrative influence early development ideas?
Discuss the origins and key technologies behind the internet : Create a graphic illustrating a common or best practices Internet infrastructure, and utilize it in your presentation.
Different predetermined overhead rate for each department : Calculate the following if the Green Company uses a different predetermined overhead rate for each department.

Reviews

inf2093323

10/26/2018 2:22:37 AM

Excellent till now as per the expectation I got very Good marks so please provide this kind of solution. Awesome Job. Submitted by the deadline and received great scores too. Surely recommend to all students

len2093323

8/22/2018 11:01:45 PM

Assessment Requirements and Marking Criteria There are 3 main questions with some sub-questions and the requirements are stated for each one. You must answer all questions and sub-questions. Marks are indicated in the Answer Template. The questions will be marked on correctness, logic and clarity, and addressing all parts of the question. The Assignment Questions begin on the next page. USE THE PROVIDED TEMPLATE ON P.4 FOR ALL YOUR ANSWERS.

len2093323

8/22/2018 11:01:36 PM

Where instructed, you must show the steps you took to arrive at your answers. Write your answers in your own words to avoid potential plagiarism and copyright violations. You must submit the Answer section as a Word file (.doc or .docx).Do not submit PDF’s or any other type of file without express permission from the Unit Coordinator. Plagiarism Procedures can be found in the CQUniversity Policies section of the Unit Profile.

len2093323

8/22/2018 11:01:30 PM

You must do this assignment on your own – it is not a group assignment. Type all your answers in the ‘Template for Your Answers’ Section of this document and upload only that template. You could do that by copying the Template section into a new Word document for uploading. Answers that are not typed into the “Template for Your Answers” section may not be marked, or may be returned to you for re-typing and re-submission – late penalties will apply.

Write a Review

Computer Networking Questions & Answers

  Implementation plan to explain topology of network

Implementation Plan describing how this network will be implemented. In paper, explain the topology (both logical and physical) of network, network operating system, creation of user accounts, and security concerns.

  List five steps that can be used to protect the home network

Why is checking the lights of the networking device that connects to the ISP important?

  In march of 2010 while working for a british aircraft parts

in march of 2010 while working for a british aircraft parts manufacturer in the finance department you were directed by

  Capture the essence of the literature review

Problem domain and research questions Is there a specific research problem identified? Are the research questions relevant

  What is bluetooth and why is it important

What is Bluetooth, and why is it important? Explain how Bluetooth is able to operate and function without conflict in areas that also permit the use of 802.11 Wi-Fi.

  Describe the objective of the communication

Writing Skills Problem Staff members from the marketing department of your firm are doing a splendid job selling products to customers.

  Explain the basic components and media of network systems

Write an five to seven (5-7) page proposal in which you: Recommend one (1) suitable network design. Suggest one (1) network architecture. Suggest LAN and Wireless LAN (WLAN) wiring considerations

  Rch and explain network analysis tool which can

you are the new network administrator for a small hospital in your local city. network availability and security are

  Diffie-hellman key exchange protocol

The security of many cryptographic techniques depends on a challenging mathematical concept-the discrete log problem (Anderson, 2008, Section 5.7.2). For this Assignment, you will review the Diffie-Hellman key exchange protocol and describe how to ad..

  Explain briefly how the polling mechanism will work

What do you think is the "traffic demand information" in this research i.e. what metric is used for traffic demand information and explain briefly how the "polling mechanism" will work to distribute the traffic demand information in this research?

  Design challenges and mobile computing

Design Challenges and Mobile Computing

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd