Role icmp plays in extending the ip protocol architecture

Assignment Help Computer Networking
Reference no: EM131016431

Task

This assessment item is to produce a short report by investigating and addressing some key topics for this subject. Note answering these questions will help you build some understanding for the next assessment item as well as for the entire subject material. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the Resource section of Interact site.

Answers MUST be written in your own words. If an answer contains more than 20% direct quote (referenced or unreferenced) 0 marks will be awarded for this question.

One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated.

For mathematical and subnetting questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

Question 2

(Show your working and give a short explanation for each answer.)

Designing IP Addressing schemes and configuring IP Addressing is a common activity undertaken by network engineers. Consider an ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP needs to distribute these blocks to 2600 customers as follows:

a. The first group has 200 medium-size businesses; each needs approximately 128 addresses.
b. The second group has 400 small-size businesses; each needs approximately 16 addresses.
c. The third group has 2000 households; each needs 4 addresses.

Design the sub blocks and give the slash notation for each sub block. Find out how many addresses are still available after these allocations.

Question 3

Consider the diagram below. Which of the two central routers (R1 and R2) is more critical for network operations and why?

1442_Network.jpg

Question 4

Contrast and compare distance vector routing with link state routing.

Question 5

Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?

I need top quality with 100% origniality and with no plagarism

Reference no: EM131016431

Questions Cloud

Discuss the claim that social institutions are related : Discuss the claim that social institutions are related
Explain how your journal entry on the settlement date : Prepare dated journal entries for Fleming to reflect the above transactions using the current method. Do not use hedge accounting.
Describe an example of a television program : Describe an example of a television program that you believe clearly displays social deviance, and explain why you specifically selected it
Draw a decision tree for the decision that buyu faces : Determine the range of values of the probability that SAEL will exercise its option, making the decision found in part c as optimal, and determine the expected value of perfect information about whether SAEL will exercise its option.
Role icmp plays in extending the ip protocol architecture : Discuss the role ICMP plays in extending the IP protocol architecture? Looking into the structure of the error reporting ICMP messages, what is the purpose of including the IP header and first 8 bytes of datagram data?
Describe the meaning of multiculturalism in your own words : Describe the meaning of multiculturalism in your own words. Is the United States of America a multicultural country? Why or why not
What are the functions of the components of mental status : What are the functions of the components of mental status and an interview in determining the competence of clients? Explain with examples and rationales
Both companies use a perpetual inventory system : Both companies use a perpetual inventory system, have a September 30 year-end, and a 30% tax rate. Madison uses the entity theory method for consolidation.
Explain the pathophysiologic processes : Explain the pathophysiologic processes of select health conditions. Predict clinical manifestations and complications of select disease processes

Reviews

Write a Review

Computer Networking Questions & Answers

  Depict topology in the diagram

Depict topology in the diagram, Determine if this is a peer-to-peer or client-server network. Be sure to explain what assumption drove you to select it.

  Find required bandwidth for transmission of video stream

A frame rate of 30 fps, and 8 bits for quantisation of each pixel. What is the required bandwidth for the transmission of the uncompressed video stream?

  Counteract the force of gravity

How does gravity affect the flow of blood in your body? The flow of sap in trees? How have organisms evolved to counteract the force of gravity?

  Describe the wireless spectrum

Describe the wireless spectrum. Describe how interference can distort and weaken a wireless signal. Describe the Frequency-Hopping Spread Spectrum (FHSS) and Direct-Sequence Spread Spectrum (DSSS) spread spectrum technologies

  Maturation of industry impact your business strategy

How would the maturation of the industry worldwide impact your business strategy?

  What should the subnet mask

How would you implement availability in this network? From an efficiency perspective, what should the subnet mask be for the connection between R1 and R2

  Perform a formal risk assessment of a computer network

Perform a formal risk assessment of a computer network of your choice (A sample network architecture will be provided for your reference).

  Is snort anomaly-based or signature-based

Is Snort an HIDS or an NIDS, how many sensors does Snort use and what does a preprocessor do?

  Explain nefarious computer activities

Write a short description of what they are and include your assessment of whether this activity is something to worry about or not.

  Advantages of using a gantt chart over a pert chart

Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other

  Define the type of packet filters

Define the type of packet filters that you might build to capture traffic destined to you six critical Web servers?

  What windows server 2012 service and applications offer ipv6

What is the primary reason IPv6 has not completely replaced IPv4

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd