COIT12206 TCP/IP Principles and Protocols Management
Questions:
Part A
Question 1
(a) Explain why the client issues an active open for the control connection and a passive open for the data connection.
(b) Why should there be limitations on anonymous FTP? What could a malicious user do?
Question 2
Which field(s) of the IP header change router to router? Explain why they change?
Question 3
UDP and IP are considered unreliable protocols. Are they unreliable to the same degree? Explain why or why not.
Part B
Question 1
An ISP is granted a block of IPv4 address with its CIDR notation as 132.34.12.0/23. Your organization needs to have three (3) sub-blocks of addresses to use in its three subnets as shown below:
- First subblock of 120 usable host IP addresses.
- Second subblock of 100 usable host IP addresses.
- Third subblock of 60 usable host IP addresses.
Calculate the subnetworks and answer the following questions for all three of the subblocks.
a. |
What is the subnet mask of the subblocks? |
b. |
What is first and last address of the subblocks? |
c. |
Show detailed calculations for each of the answers. |
Question 2
In an IPv4 network, router HQ is using RIP routing protocol. The router HQ has the routing information below for routing.
Table 1: routing information of router HQ
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS -IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
141.14.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 141.14.0.0/16 is directly connected, GigabitEthernet0/0
L 141.14.1.1/32 is directly connected, GigabitEthernet0/0
141.15.0.0/16 is variably subnetted, 2 subnets, 2 masks C 141.15.0.0/16 is directly connected, GigabitEthernet0/1 L 141.15.1.1/32 is directly connected, GigabitEthernet0/1
R 192.168.1.0/24 [120/1] via 141.15.1.2, 00:00:07, GigabitEthernet0/1
R 192.168.5.0/24 [120/1] via 141.15.1.2, 00:00:07, GigabitEthernet0/1
Based on the routing information in Table 1, answer the questions below.
Question 3
An Ethernet MAC sublayer receives 1510 bytes of data from the LLC layer.
Part C
Question 1
You’re the head network administrator for a large manufacturing enterprise that’s completing its support for IPv6. The company has six major locations with network administrators and several thousand users in each location. You’re using a base IPv6 address of 2001:DB8:FAB/48 and want network administrators to be able to subnet their networks however they see fit. You also want to maintain a reserve of address spaces for a possible 6 to 10 additional locations in the future. Each network administrator should be able to construct at least 200 subnets from the addresses you supply, and each location should have the same amount of available address space.
What IPv6 addresses should you assign to each location? When constructing your answer, list each location as Location 1, Location 2, and so forth.
Question 2
You have configured a LAN with 25 workstations, three network printers, and two servers. The workstations will have dynamically assigned IPv4 addresses. The servers and the printers always need to have the same IPv4 address assigned with static IPv4 addresses. The network is assigned with a classfull IPv4 block 192.168.1.0/24. As a network administrator you need to configure the DHCP server in router R1 for this LAN. In the configuration, exclude all the static IP address allocated to servers, printers and gateway. Based on this answer the followings -
Answers:
Part A
Question 1 (a)
File Transfer Protocol establishes two separate TCP connection between the client and the server using the two modes that are active mode and passive mode, for transferring the commands and data through the two different channels. Active Mode establishes command channel from the client to the server and the passive mode establishes the data channel from the server to the client.
Question 1 (b)
Anonymous IP addresses are the nodes of the network that are unknown to the server. In addition, the anonymous user also might be an attacker who will be allowed easily to manipulate the system. Therefore, there should be anonymous restriction.
A malicious user can easily implement tools to guess the password of the server using wildcards and also could upload huge amount of data to the server to make the system down or may replace the existing files with the same name that will cause harm to other nodes as well when they try to access the file.
Question 2
IP header contains various fields storing information about the data that are about the source IP of the packet, destination IP of the packet, the TTL or time to live that define the time the packets will be online and many more.
When a packet is transferred from one one end to another end it requires to travel through various routers to reach the final destination. Therefore, while one packet is generated at the source location, the IP header is created with the above-mentioned information. No, while the packet travels through the routers the IP headers are requires to be modified because of presence of several nodes on the route. When the first time packet reaches to the router at that time, the IP header contains source IP as the end user’s IP and destination IP as the router’s IP. Again, when the router forwards that packet to the next hop or the next router/node, the IP header changes its source IP as the router’s IP and destination IP as the IP of the next hope or the next node.
Another field is the TTL or Time to Live when the packet is generated it assigns a time limit for which the packet will remain alive. Now, when the packet travels through router it reduces by 1 every time. When the TTL reduces to zero or 0 then the packet dies automatically and this ensures that the packet is no more on the channel.
Question 3
UDP or User Datagram Protocol is a layer 4 protocol while IP or Internet Protocol is the layer 3 protocol of the TCP/IP model. They serves for different purposes thus they are not directly equivalent for any comparison regarding their reliability. UDP is the protocol that transmits data without establishing a serious connection with the other end it generally does not bother about if the data reaches the other end or not. While, TCP another layer 4 protocol first establishes a secure connection with the other end and after receiving the acknowledgement it starts transmitting the data. Therefore, TCP is considered reliable while UDP is considered unreliable. In addition, IP, the layer three protocol encapsulates the datagram sent down by the layer 4 protocols UDP or TCP, where it adds its own additional information regarding the source and destination and forwards the packet to the destination node. Now, the case is that the reliability of delivery of packet does not depend on the IP but it depends on the UDP and TCP protocols. Therefore, the protocols UDP and IP are not unreliable at the same degree.
Part B
Question 1 (a)
Subnet Name |
Required Host |
Subnet Mask |
Subnet A |
120 |
255.255.255.128 |
Subnet B |
100 |
255.255.255.128 |
Subnet C |
60 |
255.255.255.192 |
Question 1 (b)
Subnet Name |
First IP |
Last IP |
Subnet A |
132.34.12.1 |
132.34.12.126 |
Subnet B |
132.34.12.129 |
132.34.12.254 |
Subnet C |
132.34.13.1 |
132.34.13.62 |
Question 1 (c)
The given IP block is 132.34.12.0/23 when it is converted into binary it becomes 10000110.00100010.0000110|0.00000000/23 where the first 23 bits are the network bits and the rest 9 bits are host bits.
Three sub networks are required to form out of this IP block with having 120, 100 and 60 hosts respectively. The sub netting acquires host bits to act as the network bits. Borrowing 1 bit from the host Part will make 21 or 2 sub networks while borrowing 2 bits will make 22 or 4 sub networks. In this case, 120 hosts are required in the first sub network therefore, 27 or 128 IPs or 7 bits are assigned to the host Part and 25 bits are assigned to the network Part.
Subnet A:
Network Address: 10000110.00100010.00001100.0|0000000/25 or 134.34.12.0/25
Broadcast address: 10000110.00100010.00001100.0|1111111 or 134.34.12.127
(The network bits will remain same and host bits will be all on.)
Subnet Mask: 11111111.11111111.11111111.1|0000000 or 255.255.255.128
(The networks bit will be all on and host bits will be all off)
First IP: 134.34.12.1 (The next IP of the network address)
Last IP: 134.34.12.126 (The previous IP of the broadcast Address)
Subnet B:
Network Address: 10000110.00100010.00001100.1|0000000/25 or 134.34.12.128/25
Broadcast address: 10000110.00100010.00001100.1|1111111 or 134.34.12.255
(The network bits will remain same and host bits will be all on.)
Subnet Mask: 11111111.11111111.11111111.1|0000000 or 255.255.255.128
(The networks bit will be all on and host bits will be all off)
First IP: 134.34.12.129 (The next IP of the network address)
Last IP: 134.34.12.254 (The previous IP of the broadcast Address)
Subnet C:
Network Address: 10000110.00100010.00001101.00|000000/26 or 134.34.13.0/26
Broadcast address: 10000110.00100010.00001101.00|111111 or 134.34.13.63
(The network bits will remain same and host bits will be all on.)
Subnet Mask: 11111111.11111111.11111111.11|000000 or 255.255.255.192
(The networks bit will be all on and host bits will be all off)
First IP: 134.34.13.1 (The next IP of the network address)
Last IP: 134.34.13.62 (The previous IP of the broadcast Address)
Question 2 (a)
Destination |
Network Mask |
Gateway |
Interface |
Protocol |
141.14.0.0 |
255.255.0.0 |
Not set |
GigabitEthernet 0/0 |
Connected |
141.14.1.1 |
255.255.0.0 |
Not set |
GigabitEthernet 0/0 |
Local |
141.15.0.0 |
255.255.0.0 |
Not set |
GigabitEthernet 0/1 |
Connected |
141.15.1.1 |
255.255.0.0 |
Not set |
GigabitEthernet 0/1 |
Local |
192.168.1.0 |
255.255.255.0 |
141.15.1.2 |
GigabitEthernet 0/1 |
Local |
192.168.5.0 |
255.255.255.0 |
141.15.1.2 |
GigabitEthernet 0/1 |
Local |
Question 2 (b)
When the router receives a packet having destination of 192.168.5.10 it modifies the IP header of the packet and the source and destination addresses in the header. Thereafter, it despatches the packet through the port GigabitEthernet 0/1 and the gateway IP 141.15.1.2.
Question 3 (a)
The Ethernet frame supports to transmit the maximum of 1500 bytes of the generally. Therefore, it is not possible to encapsulate the 1510 bytes of data in one frame.
It will require two frames to be sent for transmitting the 1510 bytes of data.
Question 3 (b)
The highest capacity of Ethernet frame is 1500 bytes. Therefore, the first frame will contain 1500 bytes of data and the last frame will contain 10 bytes of data. However, the Ethernet frame contains the Ethernet frame header of 14 bytes and those will be also attaches to the frame and sizes of each of the frames will be 1514 and 24 respectively
Part C
Question 1
The organisation currently exists in six different locations. However, it may extend its operations to 10 other locations as well. Therefore, the sub-netting of the IPv6 block 2001:DB8:FAB::/48 is being done for 16 different location.
GIVEN IP BLOCK: 2001:0DB8:0FAB|:0000:0000:0000:0000:0000/48
In IPv6 a given carrying four bits or one nibble will help to create 24 or 16 numbers of Sub networks.
Location 1:
Range Starts 2001:0DB8:0FAB:0|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:0|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 2:
Range Starts 2001:0DB8:0FAB:1|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:1|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 3:
Range Starts 2001:0DB8:0FAB:2|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:2|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 4:
Range Starts 2001:0DB8:0FAB:3|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:3|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 5:
Range Starts 2001:0DB8:0FAB:4|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:4|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 6:
Range Starts 2001:0DB8:0FAB:5|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:5|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 7:
Range Starts 2001:0DB8:0FAB:6|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:6|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 8:
Range Starts 2001:0DB8:0FAB:7|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:7|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 9:
Range Starts 2001:0DB8:0FAB:8|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:8|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 10:
Range Starts 2001:0DB8:0FAB:9|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:9|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 11:
Range Starts 2001:0DB8:0FAB:A|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:A|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 12:
Range Starts 2001:0DB8:0FAB:B|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:B|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 13:
Range Starts 2001:0DB8:0FAB:C|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:C|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 14:
Range Starts 2001:0DB8:0FAB:D|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:D|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 15:
Range Starts 2001:0DB8:0FAB:E|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:E|FFF:FFFF:FFFF:FFFF:FFFF/52
Location 16:
Range Starts 2001:0DB8:0FAB:F|000:0000:0000:0000:0000/52
Range Ends: 2001:0DB8:0FAB:F|FFF:FFFF:FFFF:FFFF:FFFF/52
Now, after providing these IP blocks to the network administrators of these location. They will be able to easily to Subnet these blocks easily to 200 Subnets of equivalent sizes. To create 200 Subnets it will require borrowing 8 bit or two nibbles so it will give 28 or 256 Subnets. However, 7 bits are borrowed then it will allow forming only 27 or 128 Subnets.
Question 2 (a)
To configure the DHCP in the router, connect the router to the workstation using a console cable in order to access the configuration terminal of the router. After getting access to the configuration terminal, enter the following commands to configure the router:
R1# configure terminal
R1(config)# interface gigabitEthernet 0/0
R1(config-if)# ip address 192.168.1.1 255.255.255.0
R1(config-if)# no shutdown
R1(config-if)# exit
R1(config)# ip dhcp pool mypool
R1(dhcp-config)# network 192.168.1.0 255.255.255.0
R1(dhcp-config)# default-router 192.168.1.1
R1(dhcp-config)# exit
R1(config)# ip dhcp excluded-address 192.168.1.1
R1(dhcp-config)# Ctrl+Z
After applying this configuration in the router, move to the server and printer settings and in their configuration options opt for obtain IP addresses automatically. Thereafter all the devices on the network will be provided with an IP address from the IP pool.
Question 2 (b)
R1# configure terminal – This command turns on the configuration mode of the router.
R1(config)# interface gigabitEthernet 0/0 - This command selects the Gigabit Ethernet 0/0 port of router for futher configuration on that Particular interface.
R1(config-if)# ip address 192.168.1.1 255.255.255.0 – This command assigns the ip address 192.168.1.1 and its Subnet mask 255.255.255.0 to the Gigabit Ethernet 0/0 port of the router.
R1(config-if)# no shutdown – This command turns the port Gigabit Ethernet 0/0 on.
R1(config-if)# exit – This command takes back to the previous configuration mode or leaves the Gigabit Ethernet 0/0 interface configuration mode
R1(config)# ip dhcp pool mypool – This command generates a dhcp pool and its name that will contain a range of ip addresses for DHCP purposes.
R1(dhcp-config)# network 192.168.1.0 255.255.255.0 – This command includes all the ip addresses in the 192.168.1.0/24 network id to that IP pool. That is the range 192.168.1.1 to 192.168.1.254
R1(dhcp-config)# default-router 192.168.1.1 – This command assigns the default routers Ip or the default gateway in the DHCP pool.
R1(config)# ip dhcp excluded-address 192.168.1.1 – This command excludes the IP 192.168.1.1 from the pool because it is already assigned to the router.
R1(dhcp-config)# Ctrl+Z - This command saves the configuration.
References
Ando, Y., Nagao, H., Miyao, T. and Shudo, K., 2014, September. Routing table construction method solely based on query flows for structured overlays. In Peer-to-Peer Computing (P2P), 14-th IEEE International Conference on (pp. 1-5). IEEE.
Goralski, W., 2017. The Illustrated network: How TCP/IP works in a modern network. Morgan Kaufmann.
Ko, Y., Box, Inc., 2014. System and method for load balancing multiple file transfer protocol (FTP) servers to service FTP connections for a cloud-based service. U.S. Patent 8,719,445.
Yan, D., 2014. Applications of Packet Tracer simulator in the course< Router Configuration. Electronic Test, 8, 019.
Buy COIT12206 TCP/IP Principles and Protocols Management Answers Online
Talk to our expert to get the help with COIT12206 TCP/IP Principles and Protocols Management Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.