What are the source and destination addresses

Assignment Help Computer Networking
Reference no: EM132601680

Assessment - Networking Fundamental

TASK

Question 1
Complete the Hands-On Projects 3-1 and 3-2 from the prescribed textbook (pg. 144-145). The files required to complete these projects are available from the "resources" folder in the subject site. In order to complete these activities, students should insert screenshots in the assignment document along with a brief informative description of each step taken to complete the project. Marks will be deducted if the description is not provided.

Question 2
Watch the following two videos and write a reflective piece based on your observations and insights on the workings of both Link State and Distance Vector Routing, highlighting the major differences. In addition to the videos, students are encouraged to consult authentic additional resources such as text book, research articles etc. to enhance understanding of the topics.

Question 3 Case study
Let us consider three hosts connected together in a local network having private IP addresses 10.0.1.14, 10.0.1.15 and 10.0.1.20. Between this local network of three hosts and the rest of the internet is a NAT enabled switch/router as shown in Figure1 below. All information in the form of IP datagrams being sent from or incoming towards these hosts must pass through this device.

269_figure.jpg

Figure 1: Network Diagram

Task 1
Figure 1 above shows a switched network, with Host A, B and C connected to ports Fa0/1, Fa0/2 and Fa0/3 respectively; the current MAC address table of Switch-1 is empty as below:
Mac Address Port Number

a) Discuss what would happen next if Switch-1 received a frame from Host-A with the destination MAC address of host-B?
b) Discuss what would happen next if Switch-1 received a frame from Host-B with the destination MAC address of host-A?
In both cases, illustrate the changes in the MAC address table in your answer.

Task 2
Let us assume that the host with IP address 10.0.1.20 sends an IP data-gram destined to host 128.119.165.183. The source port is randomly selected as 3428, and the destination port as 80.
What are the source and destination addresses of the IP datagram as well as the source and destination port numbers for the TCP segment in the datagram at:
a) step one (i.e. after it has been sent from the host but before it reaches the router).
b) step two? (i.e. after it has been transmitted from the router).
c) step three (just before it is received by the router)
d) step four (after it has been transmitted by the router but before it is received by the host).

PRESENTATION
• Students must ensure that all tasks/questions are identified clearly with headings.
• Answers to the questions must be in your own words and should be precise but complete and informative. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or unreferenced).
• APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style.

Reference no: EM132601680

Questions Cloud

Estimate Rooms department revenue and direct costs : The indirect operating expenses and fixed charges were $300,000 and $350,000, respectively. Estimate Rooms department revenue and direct costs
Leveraged data mining technologies : Select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.
How is present value related to the concept of a liability : Define a contingency and a contingent liability. What is the key characteristic of a present obligation? What are the recognition criteria for provisions?
Describe the types of line and textures the artist has used : A brief assessment of the visual properties you observe. Describe the types of lines, shapes, colors and textures (actual and perceived) the artist has used.
What are the source and destination addresses : What are the source and destination addresses of the IP datagram as well as the source and destination port numbers for the TCP segment
How a borrowing cost could arise as part of the measurement : Explain how a borrowing cost could arise as part of the measurement of a provision. Illustrate your explanation with a simple example.
What amount of travel-related expenditures may Danny deduct : Danny owns an electronics outlet in Dallas. What amount of these travel-related expenditures may Danny deduct as business expenses
How problem should be addressed in the financial statements : Fair presentation, Advise the directors how problem should be addressed in the financial statements in accordance with AASB 101/IAS 1
What is the aftertax salvage value of the equipment : The company's tax rate is 34 percent. What is the aftertax salvage value of the equipment?

Reviews

Write a Review

Computer Networking Questions & Answers

  how to hack public Wi-Fi

Write about a project plan for 12 weeks about how to hack public Wi-Fi

  Explore three reasons for utilizing professional networking

Discuss three reasons for utilizing professional networking during the job-hunting process. Note:Some potential points to consider include: developing a professional network.

  Provide an executive overview for infrastructure proposal

Provide an executive overview for Infrastructure proposal. How will your proposal help ESoft? What are the key aspects of your design? Why should ESoft select your proposal over your competitors' proposals?

  How could traffic from one vlan get to another

1. How would you assign an IP address to a switch, and why would you want to do that and how could traffic from one VLAN get to another?

  Server room requirement

Assume that you have converted part of an area of a general office space into a server room.  Describe the factors you would consider when planning for each of the following: Walls and doors

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  What is the best-case delay in response to a request

Computer Networks for HND RQF Level-INTRODUCTION-An alternative to a LAN is simply a big timesharing system with terminals for all users.

  Main categories of information assets

Assess the information security situation in a small business eg. a restaurant and make recommendations for improvements.

  Explain properties and characteristics of tcp-ip

Explain properties and characteristics of TCP/IP. Explain common TCP and UDP ports, protocols and their purpose. Identify types of network cables and connector.

  What is the size of data in the ipv4 datagram

An IPv4 header bytes in Hex notation is given below: 45 c0 00 38 9b 3e 00 00 ff 01 fd 3b 80 99 90 01 80 99 91 56.Answer the following questions about the header:What is the size of data in the IPv4 datagram?

  What makes tcp-ip networking so popular

What makes TCP/IP networking so popular? Provide at least 2 examples (other than the Internet) for which TCP/IP networking is well-suited, and discuss reasons to support your answer.

  Identify the users of the information system.

Identify the users of the information system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd