Networking with tcp/ip

Assignment Help Computer Networking
Reference no: EM13721255

Question 1 

Router X running RIP has the following routing table:

Destination

Cost

Next Router

Net1

5

A

Net2

3

B

Net3

4

C

Net4

2

D

 

a)      Assuming no other route update message has been received, show the updated routing table after router X has received the RIP message shown below from router C after 200s:

(Net1, 2), (Net2, 2), (Net3, 2), (Net4, 1). (0.5 marks for each correct row entry)

b)      Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X? (0.5 marks for each correct answer)

Question 2 

An organisation has been granted a block of addresses starting with the address 172.154.60.0/22.

a)      Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 10 addresses. (0.5 marks for each correct answer)

b)      How many addresses are left? 

Question 3 

Consider the following TCP header dump:

04210019 000007D0 00000641 50020800 00000000

a)      What is the source port number? (0.5 mark)

b)      What is the destination port number? (0.5 marks)

c)      What is the sequence number? (0.5 mark)

d)     What is the acknowledgement number? (0.5 marks)

e)      What is the length of the header? (0.5 marks)

f)       What is the type of the segment? (0.5 marks)

g)      What is the window size? 

Question 4 (5 marks)

Using Wireshark tool capture the packets at the same time that you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet. It is recommended that you undertake the packet capture exercises using Wireshark that are scheduled for Weeks 8-9 before you attempt this question. You may not be able to complete this task in any CQUniversity lab.

a)      Submit the captured pcap file.  You should filter the file so that only TCP traffic is included. (1 mark)

b)      What is the server IP address? (0.5 marks)

c)      What is the application layer protocol involved? (0.5 marks)

d)     What is the client port number for data download? (0.5 marks)

e)      What is the server port number for data download? (0.5 marks)

f)       How many data bytes have been downloaded? (0.5 marks)

g)      What is the size of the downloaded Lecture 1 file? (0.5marks)

h)      Discuss the difference in your answers to parts f) and g).  You need to consider the packet formats in your discussion. (1mark)

Question 5 (15 marks)

Investigate the emergingwireless broadband services available in Australia and compile a brief report of around 1400 words.  Your references may come from websites, white papers, government documents or published conference or journal papers. Your report should include brief descriptions of underlying technologies and protocols, bandwidth and QoS issues, recommended usages and the geographical areas covered as well as any other relevant information on such networks. Please ensure that you understand the term wireless broadband first before you undertake your literature research.

Your report should include only the body (about 1200 words), conclusion (about 200 words) and the reference list (Do not include the executive summary, table of contents and introduction). Use the sub-headings given in the template and include in-text references in the body of the report. Use Harvard style of referencing for the list of references and in-text references.

Marks allocation:

Body:

1.      Underlying technologies and protocols. (3 marks)

2.      Bandwidth and QoS. (3 marks)

3.      Usages. (3 marks)

4.      Geographical areas covered. (1.5 marks)

5.      Any other relevant information. (1.5 marks)

Conclusion:

A well written coherent conclusion (2 marks)

References:

Adhered to Harvard reference style (1 mark)

 

Question 6 (5 marks)

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable provide your answers in fully expanded hexadecimal colon notation.

a)      What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF?                                                                                                                       

b)      What is the type of block of the abbreviated IPv6 address

2001:A100:FC1::A4B8:AE12:3217:FCBA?                                                

 

c)      What is the type of address of the abbreviated IPv6 address 0::FFFF:194.42.12.7?                                                                                                                             

Question 7 (6 marks)

Answer the following questionsin relation to Wi-Fi Direct technology. Your answers should include in-text references and a reference list.

a)      Briefly describe its purpose? (1 mark)

b)      What is its transmission distance from radio to radio? (1 mark)

c)      Which standard coversthis technology? (1 mark)

d)     What is the security method used? (1 mark)

e)      Discuss if the creation of a Wi-Fi Direct multi-hop network is possible or not (use approximately 200 words). (2 marks)

Attachment:- 27354_1COIT20229 Networking with TCPIP Assignment 4.docx

Reference no: EM13721255

Questions Cloud

Compute the fractional conversion of the limiting reactant : Calculate the fractional conversion of the limiting reactant and the percentage by which the other reactant is in excess. What is the extent of reaction?
Determine upper and lower control limits for mean and range : Determine upper and lower control limits for mean and range charts, and decide if the process is in control.
Explain intensively managed livestock operations : Explain the difference between intensively managed and extensively managed livestock operations. Give two examples of each kind.
Determine the weight of this person : A person has a mass of 63 kg. The person is standing at sea level on earth. Determine the weight of this person using Fw=mg
Networking with tcp/ip : Using Wireshark tool capture the packets at the same time that you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet
What is the total annual purchasing and transportation cost : What is the probability that all three suppliers will be disrupted using option 1. What is the probability that all three suppliers will be disrupted using option
Describe the quick trip system : How did quick trip system breed accountability and improves management performance and resulted in higher profits for the organization?
Reaserch paper on oil and energy : Reaserch paper on OIL and ENERGY, you need to use some physics knowledge to finish this research paper, how long gas gonna lost
Find probability that one customer receive spoiled food : a sushi has prepared 39 portions of seafood, three of which had been left out too long and spoiled. What is the probability that at least one customer will receive spoiled food?

Reviews

Write a Review

Computer Networking Questions & Answers

  Attack can be detected and mitigated by stateless firewall

For each of the following attacks, say whether the attack can be detected and mitigated (to a significant degree) by a stateless or stateful firewall. Explain briefly.

  Business processes ultimately drive type of cable media

Business processes and needs ultimately drive the type of cable media and hardware you select. What factors might determine how we select which ones are appropriate for our organization?

  A sub-network design that needs of acme corporation

Acme Computing Corp. has remote sites in Port Clinton and Napoleon in addition to their main site in Toledo. There are currently 29 devices connected to the network in Toledo.

  Ethernet has been broadly deployed around the world in

ethernet has been widely deployed around the world in local area networks lan until now. native ethernet packet data

  Write characteristics of smtp-pop3-tcpprotocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols? What are they used for?

  Aloha network

In a pure ALOHA network with G=1/2, how is the throughout affected in each of the subsequent cases?

  How does a packet from one lan node find its way to a

how does a packet from one lan node find its way to a recipient on the same lan? how does a packet find its way to a

  Question 1 let npq where pq are primes of the same length

question 1 let npq where pq are primes of the same length and let phi be eulers totient function. consider the

  How to increase capacity if-fiber-optic line reach capacity

England and lies on ocean floor. This fiber-optic line has reached capacity. What alternatives can telephone company consider to increase capacity?

  Building a payroll program for a large organization

Application Architecture. You have been tasked with building a payroll program for a large organization with offices spread across the United States.

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

  Why an organization block icmp traffic

CMP provides many useful services, yet some organizations block ICMP traffic. Why should an organization block ICMP traffic?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd