MITS4004 IT Networking and Communication Assignment

Assignment Help Computer Networking
Reference no: EM132524645

MITS4004 IT Networking and Communication - Victorian Institute of Technology

Learning outcome 1: Identify the operation of the protocols that are used inside the Internet and use the seven-layer model to classify networking topology, protocol and security needs.
Learning outcome 2: Evaluate LAN technology issues, including routing and flow control. Explain the difference between switches and routers. Build and troubleshoot Ethernet, Wi-Fi and Leased line networks. Connect networks with routers.
Learning outcome 3: Critically analyse specific processes and functions that apply to a layered network model, with specific reference to TCP/IP; Subnet a network using multi-level subnetting and provide a subnetted IP design based on a given topology or business profile;
Learning outcome 4: Evaluate the business implications of the proposed network application through the use of a network performance simulator or Analyzer and recommend alternates that would improve on the network performance.

Problem 1: Understand IP Addressing scheme
IPv4 addressing
Using the IP address and subnet mask shown write out the network address:

IP network

 

150.201.21.19

255.255.0.0

 

101.10.18.2

255.255.0.0

 

10.10.10.10

255.255.255.0

 

203.20.35.215

255.255.255.0

 

117.15.2.51

255.255.0.0

 


IPv4 subnetting
Write the correct default subnet mask for each of the following addresses:

IP Network address

 

223.69.230.250

 

77.251.200.51

 

12.0.0.0

 

223.0.0.0

 

191.123.0.0

 

192.1686.1.0

 


Subnet the following sub-network into 4 equal size subnets

Problem 2: Building a Network
Use the Cisco Packet Tracer simulation tool to build and test a small data network provided below. Configure router, switch and end devices. While configuring, you must
• change router name to R1-Student ID (Example: R1- 44912)
• change end devices name to PC1-Student ID and PC3-Student ID (use group members Student ID)

147_figure.jpg

What to submit in Problem 2?

• Screenshots of detailed configuration you have made for all the devices.
• Screenshots as an evidence of successful connection between NET-1 (PC3) and NET 2 (PC1) (using ping to verify the connectivity).

Problem 3: Wireshark Lab: ICMP v7.0
In this task, you will explore several aspects of the ICMP protocol using WIRESHARK. Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.
• ICMP messages generating by the Ping program;

1. ICMP and Ping

Let's begin our ICMP adventure by capturing the packets generated by the Ping program. The Ping program is simple tool that allows anyone (for example, a network administrator) to verify if a host is live or not. The Ping program in the source host sends a packet to the target IP address; if the target is live, the Ping program in the target host responds by sending a packet back to the source host. As you might have guessed (given that this lab is about ICMP), both Ping packets are ICMP packets.

Do the following1:
• Let's begin this adventure by opening the Windows Command Prompt application. You can
also use the MacOS or Linux terminal.
• Start up the Wireshark packet sniffer and begin Wireshark packet capture.
• The ping command is in c:\windows\system32, so type either "ping -n 10 hostname" in the MS-DOS command line (without quotation marks), where hostname is a host on another continent.
• MacOS/Linux ping -c 10
• Try ping multiple times some of the packets will get lost that is ok.
• When the Ping program terminates, stop the packet capture in Wireshark.

What to submit in Problem 3?

• You should hand in a screen shot of the Command Prompt/Terminal window similar to
Figure 1 above. Annotate the ScreenShot2 to explain your answer. To print a packet, use File-
>Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.
You should answer the following questions:
1. What is the IP address of your host? What is the IP address of the destination host?
2. Examine one of the ping request packets sent by your host. What are the ICMP type and code numbers? What other fields does this ICMP packet have? How many bytes are the checksum, sequence number and identifier fields?
3. Examine the corresponding ping reply packet. What are the ICMP type and code numbers? What other fields does this ICMP packet have? How many bytes is the checksum field?
4. Wireshark is a software that analyses packets sent throughout a network. In your opinion, why analysing a network in a real time is necessary?

The report should be prepared in Microsoft word and uploaded on to the LMS. The report should be a properly constructed as an academic report. The report should include references in IEEE style.

Attachment:- IT Networking and Communication.rar

Reference no: EM132524645

Questions Cloud

Calculate the free cash flow for year : Interest expense = $6 millions; Investment in fixed assets = $12 millions; and Investment in working capital Calculate the free cash flow (FCF) for year-1
Budgets and employee morale : Budgets play a critical role in management activities such as planning, controlling and motivating employees.
Find what information and financial reports are required : Find What information and financial reports are required to calculate financial ratios? Identify and explain. Financial ratios are used to simplify financial
Modern industrial society : How you connect the images associated with these products to a broader view on what it means to live in modern industrial society?
MITS4004 IT Networking and Communication Assignment : MITS4004 IT Networking and Communication Assignment Help and Solution, Victorian Institute of Technology - Assessment Writing Service
What do researchers say about healthy aging and sexuality : What do researchers say about healthy aging and sexuality? Should elder care facilities such as nursing homes support the sexuality of its residents?
Determine which is an adjusting event : KE Company reporting period ended on June 30, 2019 and the financial statements were issued on September 15, 2019. Which is an adjusting event?
What is the conversion value of bond : a) What is the conversion value of this bond if it is selling at $970.
Discuss about language acquisition and contextual influences : We covered much over the past several weeks. As we continue to expand our understanding of cognitive psychology it is important to evaluate current research.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd