ITC542 Internetworking with TCP/IP Assignment

Assignment Help Computer Networking
Reference no: EM132601463

ITC542 Internetworking with TCP/IP - Charles Sturt University

Assessment item - Networking Fundamentals

Learning Outcome 1: be able to analyse IP addressing requirements and design an addressing scheme.

Learning Outcome 2: be able to analyse the requirements of IP routing and choose appropriate routing methods.

Learning Outcome 3: be able to demonstrate how internetworking devices obtain their network configuration.

Learning Outcome 4: be able to explain how data flows through the internet.

Learning Outcome 5: be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet.

Question 1
Complete the Hands-On Projects 3-1 and 3-2 from the prescribed textbook (pg. 144-145). The files required to complete these projects are available from the "resources" folder in the subject site. In order to complete these activities, students should insert screenshots in the assignment document along with a brief informative description of each step taken to complete the project. Marks will be deducted if the description is not provided.

Question 2
Watch the following two videos and write a reflective piece based on your observations and insights on the workings of both Link State and Distance Vector Routing, highlighting the major differences. In addition to the videos, students are encouraged to consult authentic additional resources such as text book, research articles etc. to enhance understanding of the topics.

Question 3 Case study task
Let us consider three hosts connected together in a local network having private IP addresses 10.0.1.14, 10.0.1.15 and 10.0.1.20. Between this local network of three hosts and the rest of the internet is a NAT enabled switch/router as shown in Figure1 below. All information in the form of IP datagrams being sent from or incoming towards these hosts must pass through this device.

862_figure.jpg

Figure 1: Network Diagram

Task 1
Figure 1 above shows a switched network, with Host A, B and C connected to ports Fa0/1, Fa0/2 and Fa0/3 respectively; the current MAC address table of Switch-1 is empty as below:

a) Discuss what would happen next if Switch-1 received a frame from Host-A with the destination MAC address of host-B?
b) Discuss what would happen next if Switch-1 received a frame from Host-B with the destination MAC address of host-A?
In both cases, illustrate the changes in the MAC address table in your answer.

Task 2
Let us assume that the host with IP address 10.0.1.20 sends an IP data-gram destined to host 128.119.165.183. The source port is randomly selected as 3428, and the destination port as 80.
What are the source and destination addresses of the IP datagram as well as the source and destination port numbers for the TCP segment in the datagram at:
a) step one (i.e. after it has been sent from the host but before it reaches the router).
b) step two? (i.e. after it has been transmitted from the router).
c) step three (just before it is received by the router)
d) step four (after it has been transmitted by the router but before it is received by the host).

Attachment:- Internetworking assignment.rar

Reference no: EM132601463

Questions Cloud

Responsible during monitoring and controlling phase : Sometimes we think of project managers as only being responsible during the monitoring and controlling phase.
Prepare a memorandum for tax manager : Prepare a memorandum for your tax manager explaining whether or not this transaction meets the tax-free requirements of Sec. 351.
Compare process and products layout : Compare process and products layout, what are the advantages and disadvantages of process versus product layouts? Explain in detail with an example.
What a crediting rate is : What would happen to interest rates if a new process was developed that allowed automobiles to run off oil that was formulated based on lemonade?
ITC542 Internetworking with TCP/IP Assignment : ITC542 Internetworking with TCP/IP Assignment Help and Solution, Charles Sturt University - Assessment Writing Service - analyse IP addressing requirements
Find how relevant are the new skills in profession : Determine and discuss the new skills acquired from this class? How relevant are the new skills in profession? How would you apply your new knowledge?
What kind of strategies or methods will be effective : How you will prepare for this presentation. What kind of strategies or methods will be effective for this type of communication and audience?
How can a business benefit from the appointment dynamic : Which of the four strategies did you find most interesting? Why? Explain how the ideas from the video can help you identify new creative business opportunities
Methods of controlling inmate behavior in prison : Discuss the various methods of controlling inmate behavior in prison. Which one do you think is the most effective and why?

Reviews

Write a Review

Computer Networking Questions & Answers

  How http works explain in detail

How HTTP works? Kindly explain in detail with proper examples. The response must be typed, single spaced.

  Find and post all the protocols that the site is using

Find and post all the protocols that the site is using (click on the lock on the right end side of your browser menu for IE).

  How does the home agent accomplish this interception

In the text it was stated that when a mobile host is not at home, packets sent to the home LAN are intercepted by its home agent on that LAN.

  Why private-public keys cannot be used in creating a mac

In RSA, why can't Bob choose 1 as the public key e? Explain why private-public keys cannot be used in creating a MAC.

  Design high level security policy for electromycycle faces

Design high level security policy for electromycycle faces

  Router traffic classification proof of concept

Router Traffic Classification Proof of Concept, Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab and what you learned by performing it

  Explain and plan server deployments and images

Explain and plan server deployments and images. Compare and contrast deployment strategies among different application servers and server roles.

  Create fictitious network diagram

Create fictitious network diagram. At min have a router, FW, web server, email server. Mode Selection: select basic assessment.

  Discuss role that firewalls and router access lists can play

Discuss the role that firewalls and router access lists can play in defending against such attacks. What can be done from the client side.

  Discuss two methods of providing fault tolerance to network

Discuss at least 2 methods of providing fault tolerance to a network. Include a discussion of the costs versus the benefits of each approach.

  Create a project report on networking and subnetting

Create a Project report on Networking and Subnetting

  Draw a diagram showing the sliding window and pointer

After b. the source receives acknowledgment of receipt of byte 300 and an announcement of a new window size of 300 bytes. Draw a diagram showing the sliding window and pointer at the source.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd