What is the bit size of the port address in a udp header

Assignment Help Computer Networking
Reference no: EM131938408

Assignment: Network Routing and Switching

PART A

Question 1

What is the maximum size of an IPv4 header?

Question 2

What is the bit size of the port address in a UDP header?

Question 3

What is the default mask for a class A address in CIDR notation?

Question 4

A host needs to send a message to a local node. The host has the IP address of this local node but not the MAC address. What protocol should it use to obtain this MAC address?

Question 5

The following is an abbreviated IPv6 address:

FD80:3:A7A::20:0:3E

Write the full (expanded) address of this abbreviate IPv6 address.

Question 6

In a TCP connection, the value of cwnd is 6000 and the value of rwnd is 7000. The host has sent 4,000 bytes, which have not been acknowledged. How many more bytes can be sent?

Question 7

What is encapsulation in network protocols?

Question 8

Layer 1 and layer 2 of the OSI model are sufficient to support the operation of a network in the delivery of data. Why then was layer 3 introduced? Briefly explain.

Question 9

What is a Partially Qualified Domain Name (PQDN)? Explain.

Question 10

What is this IPv6 address also known as: ::1/128 ?

Question 11

What is an Autonomous System in networking context?

Question 12

Give two pieces of information that a DHCP server provides to a client.

Question 13

If a router using RIP has five expiration timers running, what is the maximum possible number of periodic timers that the router can have?

Question 14

What is a DNS resolver? Explain.

PART B

Question 1

An organisation has been allocated a block of classless addresses by the ISP:

142.39.51.16/30

List all the addresses in this range. Then identify those from your list: the network address, the addresses that can be used by hosts, and the direct broadcast address.

Question 2

An organisation has been granted a block of addresses which starts at 32.175.40.0/22. Create the following 8 subnets for this organisation:

(a) 1 subnet with 512 addresses.
(b) 3 subnets with 128 addresses.
(c) 4 subnets with 32 addresses.

Give your answer by copying and completing the following table in the examination Answer Booklet.

Number of addresses

Subnet address (including mask)

512

 

128

 

128

 

128

 

32

 

32

 

32

 

32

 

Question 3

The following is an ICMPv6 message fragment with its header (in hexadecimal): 01 04 B1 B5 00 00 00 00 00 00 00 00 00 .. ..

Identify the information that is carried in the header, and state their values. What type of ICMPv6 message is this? What is the message?

Question 4

The figure below shows the configuration of a hypothetical section of the Internet.

588_Router-Diagram.jpg

Construct the routing table of Router R3 for this configuration by copying and completing the following table in the examination Answer Booklet. Add or remove rows from the table as necessary.

Mask

Network address

Next-hop address

Interface

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

PART C

Question 1

In a communication between a client and a server, TCP is used to establish a network connection. This connection is established before any data is exchanged between the client and the server.

Describe the 3-way handshake that establishes this connection. Use suitable diagrams to support your description. Your diagram(s) and explanation must be clear. Use your own words to describe, and do not copy directly from any source including the textbook.

Question 2

IPv6 was proposed to address various limitations and weaknesses in IPv4. Identify six key changes that were introduced in IPv6, and briefly explain them. Use your own words to describe, and do not copy directly from any source including the textbook.

Question 3

Intradomain routers use the Distance Vector routing protocol and the Link State routing protocol. Compare and contrast the features of the Distance Vector routing protocol and the Link State routing protocol.

Do not simply describe the mechanism of a specific protocol. Use your own words to explain, and do not copy directly from any source including the textbook.

Question 4

In the area of wireless communications, LTE technology is used in mobile and data networking. Identify six key features of LTE technology, and briefly describe how these features provide benefits to mobile data communications.

Be clear and specific in your answer. Use your own words to explain, and do not copy directly from any source including the textbook.

Reference no: EM131938408

Questions Cloud

Finding the value of social security promise : Assume that Social Security promises you $40,000 per year starting when you retire 45 years from today (the first $40,000 will get paid 45 years from now).
How much interest rate would you have effectively paid : If you spend 1,000 using this credit card. How much will you have to pay in 1 year to settle your account. How much interest rate would you have effectively
What is the breakeven stock price at maturity : Create a payoff and profit table table (using a range of stock prices from $630 to $670, in increments of $10) if the exercise price is $650.
Result of chad decision not to withdraw : What is the result of Chad's decision not to withdraw any of Trey's contribution to the trust?
What is the bit size of the port address in a udp header : What is the maximum size of an IPv4 header? What is bit size of the port address in a UDP header? What is default mask for a class A address in CIDR notation?
Private and public organizations : As with businesses, schools were expected to improve their products (how effectively they teach) to win students from competitors.
Which of the two stock would you prefer and why : Assume that Steelcase is currently operating at a net loss (i.e. no profits), but all of the other values you have calculated remain the same.
What component or variable is this group trying to work : In terms of the value equation, what component or variable is this group trying to work on with its market?
What is the price for each unit : Annual fixed costs are $280,887 and the variable costs are $.28 cents per unit. The following equations will be useful.

Reviews

Write a Review

Computer Networking Questions & Answers

  Q1 explain what a relational database is and why relational

you are the trainer for a major technology firm. one of the problems your firm has is hiring new technologists who have

  Discuss remote access domain best practices

1. Discuss LAN-to-WAN traffic and performance monitoring and analysis. Discuss WAN confguration and change management. Discuss remote access domain best practices

  Explain detailed response to the network design request

The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.

  Describe real-world examples of attenuation and white noise

Describe real-world examples of attenuation and white noise. Determine the most important and justify its significance over the remaining items.

  What is the cidr notation for the blocks in the first subnet

An organization is assigned the block 2000:1234:1423/48. What is the CIDR notation for the blocks in the first and second subnets in this organization?

  Discuss the potential interfaces used in accessing the data

Discuss the potential interfaces used in accessing the data, the amount of storage used by your company and Foundational cloud architectures.

  Problem in using database dictionary managed tablespaces

Write the explanation for why your tablespace might have problem, and write at least two actions you can take to decrease problem.

  Compare among local area and wide area network technologies

Compare and contrast among local area and wide area network technologies and architectures. Use technology and information resources to research issues.

  How do cloud threats differ from traditional threats

How do cloud threats differ from traditional threats? Against which threats are cloud services typically more effective compared to local ones?

  Define a new generation of wireless lan technology

In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN techno..

  How each layer of the model represents communication flow

How each layer of the Model/Suite represents communication flow between organizational levels and across departments/division of actual hierarchical business.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd