Study a diagram of a TCP segment header

Assignment Help Computer Networking
Reference no: EM133127716

COIT20261 Network Routing and Switching - Central Queensland University

Question 1 - Information about the block

a) How many addresses are available in the block allocated to the company, including all special addresses?
b) What is the network address of the block?
c) What is the direct broadcast address of the block?

Question 2- Allocating subnets from the block

Create five contiguous subnets from the given block beginning with the first address of the block, as follows:
i. The first subnet with 256 addresses
ii. A second subnet with 128 addresses
iii. A third subnet with 64 addresses
iv. Two subnets with 32 addresses each

For each subnet, show its prefix in CIDR format, its subnet address, and its direct broadcast address. Organize your data clearly in a table.

Question 3 - Network Tools (Windows)

Often the best way to gain an initial familiarity with network tools is to simply use them at a basic level, exploring and looking up information as you go. Some common tools you can explore include Wireshark, Ipconfig, Tracert, Netstat, Ping and Arp. All but Wireshark are included in Windows, Wireshark is free to download and install.

Explore these tools by researching online and trying them out yourself. Then answer the following questions, using your own words.

a) You have listed several devices (all turned on and working) in your home network along with their IP addresses. You decide that you want to add a column for their MAC addresses as well. From your desktop what command (tool) could you try first to get the MAC addresses? Explain the tool and its output.

b) You want to display the configuration of all the logical interfaces associated with each adapter in the computer. What command could you use? What other information could you discover from using that command? Explain your answer.

c) Assume that your computer is configured with IP address 192.168.0.230. You ping this address and receive four successful ping replies. Explain why you can rely on this to conclude that you have successful Internet access and explain when you cannot make such a conclusion from the same ping result.

Question 4 -- TCP

Study a diagram of a TCP segment header, paying special attention to the header fields, then list each field along with the value in decimal that would be in that field given the facts below. You must briefly explain your answer for each field.
• The segment is from a Daytime server to a Daytime client
• A port number of 53,500 was assigned on the receiver side
• There were no options
• The server will instruct the client not to send more than 6500 bytes at any one time
• The previous segment from the client was acknowledged by the server with an ack/data segment that had an acknowledgement number of 13,500 and a sequence number of 7,301
• The TCP checksum was calculated to equal binary zero
• The control flag fields indicate states of Not urgent; not first (sync request) or final (termination request) segment; no bypass of buffer queues required; and not a rest.

Attachment:- Routing and Switching.rar

Reference no: EM133127716

Questions Cloud

Calculate the covariate levels : Calculate the covariate levels - If treatment levels within blocks cannot be randomly ordered, the variance/covariance matrix
Calculate the cost of goods manufactured : The following information is related to current costs, year 2021, incurred for Job 201 - Direct materials used $26,000. Calculate the cost of goods manufactured
What is the amount to be reported for the investment : Assuming that Alpha Inc. Accounts for this investment under the FVPL model, what is the amount to be reported for the investment in the SCI
Compute straight-line depreciation at the end : Compute straight-line depreciation at the end of one year, assuming an estimated 10-year useful life and a $18,000 estimated residual value
Study a diagram of a TCP segment header : Study a diagram of a TCP segment header, paying special attention to the header fields, then list each field along with the value in decimal
What is the amount of the gross profit : Question - During the current year, merchandise is sold for $57,800 cash and for $87,600 on account. What is the amount of the gross profit
What is the increase in gross margin and net change in cash : Grainger sold the merchandise to a customer for $7,000 cash. What is the increase in gross margin and the net change in cash flow
What is the contribution margin of Evans Retail Stores Inc : Variable Administrative Expenses $15,000. What is the contribution margin of Evans Retail Stores, Inc., for the first quarter
What is the purpose of the statements of earnings : What is the purpose of the statements of earnings and comprehensive income? Provide the excerpted guidance that responds to this question

Reviews

Write a Review

Computer Networking Questions & Answers

  CMPE-471 Special Topics-IoT Assignment

CMPE-471 Special Topics-IoT Assignment Help and Solution, Qatar University, Qatar. Discuss all the Carrier Sense Multiple Access schemes

  What is the transmission rate of ethernet lans

List six access technologies. Classify each one as residential access, company access, or wide-area wireless access.

  Identify the ethical issue that you want to analyze

Identify the ethical issue that you want to analyze, as described above. An example might be the falsification of your personal profile in a social networking site.

  What types of devices will be part of the architecture

What types of devices will be part of the architecture - Types of lines/circuits considered - the elements of the proposal and address the issues

  What is a medium access control protocol

What purpose does a hub serve? What is the difference between a physical design and a logical design? What is a medium access control protocol?

  What is the name of the domain controller database

What is the name of the domain controller database that Windows Server 2012 R2 uses to store data about user access and resources on the network?

  Explain nefarious computer activities

Write a short description of what they are and include your assessment of whether this activity is something to worry about or not.

  How will the software circuit firewall react

Which type of attack is primarily intended to disrupt the availability of critical business functions - assify each attack method in relation to its direct impact.

  How does network authentication work and why is it useful

Why is the management of user profiles an important aspect of a security policy? - How does network authentication work and why is it useful?

  Explain the differences between cir and mar

Explain the differences between CIR and MAR.- How do VPN services differ from common carrier services?- Explain how VPN services work.- Compare the three types of VPN.

  Write a report on the tcpIp protocol

Write a report on the tcp/ip protocol

  Prototype interface design for a dss application

As an analyst, pretend that you have been charged with the task of redesigning the interface for the student enrollment system at your college. Based on your research and readings, what type of prototyping interface design approach would you recom..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd