What is the size of the largest possible IP packet

Assignment Help Computer Networking
Reference no: EM132411311

Assignment - Network Layer

Review questions -

1. Briefly describe routing - the primary function of the network layer.

2. How are IP addresses similar to MAC addresses? In what ways are the two addresses different?

3. What is the need for a computer address at the IP layer when computers also have a MAC address?

4. What are the advantages of designing the Internet in such a way that specialized devices called routers handle all the details of routing? What may be the possible disadvantages?

5. What are the advantages of designing IP as a best-effort protocol?

6. What are RFCs? Read RFC 791 that defines IP, and briefly describe one thing in the RFC that caught your attention? (This is not a trick question, just a way for you to express what you personally found interesting).

7. Which, in your opinion, are the three most important fields in the IP header? Briefly describe the functions of these fields.

8. What is the need for the time-to-live field in the IP header?

9. What is the size of the largest possible IP packet?

10. How many objects can be uniquely labeled with 10-bit address labels?

11. You wish to assign unique labels to 200 objects using binary numbers. What is the minimum number of bits needed?

12. How would you represent 217 in binary? 168?

13. What decimal number does the binary number 10001101 represent? 11011001?

14. What is dotted decimal notation?

15. What information is conveyed by each part of a two-part IP address?

16. How are the 32 bits of an IP address organized in a typical large network?

17. Find the IP addresses of any five department websites at your school. Do you observe any patterns in the IP addresses of the websites? (You can find the IP addresses for URLs in many ways. Many websites will give you the IP address if you provide a URL. Alternately, you can open a command prompt or terminal window and type in nslookup <URL>).

18. In what way are the 32 bits of an IP address organized similarly to the 10 digits of phone numbers? In what way are they different?

19. What were the three address classes in early IP networks? How many hosts (computers) could be accommodated in a network in each address class?

20. What are the disadvantages of using address classes? How does CIDR overcome these disadvantages?

21. What is registry in the context of IP addresses?

22. What requirements must an organization satisfy in order to obtain IP addresses directly from a registry?

23. What is the correct representation of the IPv6 address, as specified by RFC 5952 - 2607:FE50:0010:0000:0000:1000:0101:abcd?

24. On your home computer, what is the IP address reported by ipconfig /all (Windows) or ifconfig (MAC/ Linux)?

25. From your home computer, go to www.whatismyip.com and make a note of your IP address. Type this address into the search box at www.arin.net. Who is the owner of that address block?

Hands-on exercise -

ipconfig

1. What are the IP addresses assigned to the interfaces on your computer?

2. We have seen in this chapter that the network parts of IP addresses identify the owners of IP address blocks. Use the WHOIS search facility at the American Registry for Internet numbers to search the WHOIS database and identify the owner of the address block to which your IP address belongs. You can do this by visiting arin → typing in your IP address into the search WHOIS field on the site → press enter or click the button next to the search field. Follow the link to the "related organization's POC records" just below the table to gather information on the following fields associated with your IP address:

a. OrgName

b. NetRange

c. NetType

d. NameServer

e. OrgTechName

f. OrgTechPhone

3. Is the OrgName the same as your ISP's name? (If not, we will explore the main reason for this in Chapter 7).

ping

1. How does ping work? Use Wikipedia or other resource to write a brief description of how ping works.

2. Use Wikipedia or other resource to write a brief description of the Internet Control Message Protocol (ICMP) and its use.

3. Ping the website of your university. Show the output. What is the average round-trip time? (If your university is locked down, i.e. does not respond to ping queries, try your ISP's web site)

4. Ping the website of a university in a neighboring city or town. Show the output. What is the average round-trip time? (Again, if the website is locked down, try the website of a company in another state)

5. Ping the website of a company located abroad. Show the output. What is the average round-trip time?

6. You wake up one day to find that you are unable to connect to the Internet from home. You make some calls to your friends and neighbors and find that they have no issues connecting to the Internet. You conclude that the fault is within your home. As shown, there are two networking components within your home-your computer and your home router. As shown, the IP address of the home router is the IP address of the default gateway in your ipconfig output, and home routers typically respond to ping requests. How can you use ping to determine whether the network connectivity problem is at the home router or at your computer?

7. The creator of ping has an interesting description of its creation. What is the most interesting story narrated by the author of the use of ping for network trouble-shooting?

8. (optional) A related utility is pathping. It combines the features of ping (reachability), tracert (hop visibiility) and packet loss statistics per hop. The most useful information in the output is the packet loss information.

Critical thinking questions -

1. The genetic code uses three-letter DNA-words, where each letter can take four values - A, C, G, and T. How many words are possible in the DNA dictionary?

IT infrastructure design exercise -

1. If each computer on TrendyWidgets's network is allocated an IP address, how many IP addresses is TrendyWidgets likely to need?

2. Based on this estimate, what is a CIDR address-block size suitable for TrendyWidgets?

Example case questions -

1. Based on the case, what computer networking technologies do retailers like Wal-Mart use?

2. Based on the case, how do retailers like Wal-Mart use computer networks to lower the costs of goods sold?

3. What is cross-docking?

4. Among the processes at a retailer that can be managed using IT are merchandise planning, sourcing, distribution, and store operations. Briefly define each process using any information source available to you (such as Wikipedia or Google).

5. For each of these processes, give an example of how IT can be used to manage the process. If your example uses computer networks, highlight the role of the network.

6. Based on the case, what are some reasons that Kmart did not achieve the same benefits from IT investments as Wal-Mart?

Reference no: EM132411311

Questions Cloud

What are the functions of the transport layer : What are the functions of the transport layer? Why are two protocols, TCP and UDP, defined at the transport layer instead of just TCP
Describing the purchases and fixed assets business areas : Review the Robatelli's Pizzeria Case Study. Describing the purchases and fixed assets business areas.
Help implement effective ethics program : Describe the concept of an ethics audit as a way to help implement an effective ethics program.
Describe one innovative health care delivery model : Describe one innovative health care delivery model that incorporates an interdisciplinary care delivery team. Explain how this model is advantageous to patient.
What is the size of the largest possible IP packet : Assignment - Network Layer. What is the size of the largest possible IP packet? Briefly describe routing - the primary function of the network layer
How pay for performance affect patient outcomes : Discuss how quality measures and pay for performance affect patient outcomes. Explain how these affect nursing practice and describe the expectation.
Discussion beyond merely agreeing-disagreeing : Write in-depth, comprehensive responses that promote further discussion beyond merely agreeing/disagreeing.
What is a technology road map : What are the internal and external benefits of implementing a technology road map and What clarification do you need regarding the posting
Why your organization should implement strategy : Building upon the outline for an educational session you created in the Educational Program on Risk Management Part One: Outline of Topic 2 assignment.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd