NET 256 Assignment 2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Zayed University

College of Technological Innovation


Fall 2018
Assignment

Course Title: Computer Network Foundations


Course Number: NET-256

Instructions:
I. Due Thursday, November 25, 2018.

m
er as
II. References

co
1. Slides and handouts posted on the course Web site

eH w
2. Selected readings of the textbook

o.
rs e
ou urc
Problem 1 – Packet vs. Circuit-Switched Communications:
o

a (a) Which type of communication is preferable in wireless network


aC s
vi y re

operation and describe its service guarantee expectation? Explain


your answer in detail.
b Answer:
ed d

c
ar stu

d Packet switching communication would be better since packets


can be directed around organized blockage. While the circuit
switching Dedicated channels may delay and the channele is not accessibale
is

until one side seperates.


Th

e
f (b) Give two examples of applications for which circuit switching
and packet switching would be more suitable respectively.
sh

g
h An example of circuit switching is a telephone network.
i An example for packet switching is frame relay and IP.

This study source was downloaded by 100000809912626 from CourseHero.com on 04-23-2021 14:35:27 GMT -05:00

https://www.coursehero.com/file/40425906/NET-256-Assignment-2docx/
Problem 2- IP Fragmentation

Consider sending 3000-byte datagram into a link that has an MTU of


500 bytes.

a) How many fragments are generated?

The original datagram was 3000 bytes, subtracting 20 for header, it


leaves 2980 bytes of data.

m
er as
Assume the ID of the original packet is “x”. with an MTU of 500

co
bytes, 500-2 = 480 bytes of data transmitted in each packet.

eH w
Therefore, ceiling(2980/480)= 7 packets are needed.

o.
rs e
ou urc
b) What are their characteristics (i.e. what are the flags and offset
values for each (Assume that the DF flag was not set : )
Solution: Assume that no optional fields of the IP header are in use
o

(i.e. IP header is 20 bytes)


aC s
vi y re

Packet 1: ID = x, Total_len = 500, MF = 1, Frag_offset = 0


Packet 2: ID = x, Total_len = 500, MF = 1, Frag_offset = 60
Packet 3: ID = x, Total_len = 500, MF = 1, Frag_offset = 120
ed d

Packet 4: ID = x, Total_len = 500, MF = 1, Frag_offset = 180


ar stu

Packet 5: ID = x, Total_len = 500, MF = 1, Frag_offset = 240


Packet 6: ID = x, Total_len = 500, MF = 1, Frag_offset = 300
Packet 7: ID = x, Total_len = 120, MF = 0, Frag_offset = 360
is
Th
sh

This study source was downloaded by 100000809912626 from CourseHero.com on 04-23-2021 14:35:27 GMT -05:00

https://www.coursehero.com/file/40425906/NET-256-Assignment-2docx/
c) Explain how traceroute works. Include a traceroute to a host at
least 20 hops away.

A TTL is set when a TCP packet is sent, which is the number of


hops it can pass through before that packet is discarded. When TTL
reaches 0 the packet is destroyed and an ICMP message is
returned. (I have tried several hosts in my house PC and none pf
them reached 20 hops)

m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
is
Th
sh

This study source was downloaded by 100000809912626 from CourseHero.com on 04-23-2021 14:35:27 GMT -05:00

https://www.coursehero.com/file/40425906/NET-256-Assignment-2docx/
Problem3: CIDR -A router has the following (CIDR) entries in its
routing table:

Destination Gateway Next hop


135.46.56.0/22 Interface 0
135.46.60.0/22 Interface 1
192.53.40.0/23 Router 1
default Router 2

m
er as
1. For each of the following IP address, what does the router do if

co
packets with the following addresses arrive?

eH w
o.
(a) 135.46.63.10
rs e
ou urc
The router will look for the first 22 bits, we have 135.45.60.0 routing
entry. It matches the network address of 135.45.60.0/22 routing entry,
o

therefore the packet will be routed out over interface 1


aC s
vi y re

(b) 135.46.57.14
ed d

The router will look for the first 22 bits, we have 135.45.56.0 . It
ar stu

matches the network address of 135.45.56.0/22 routing entry, therefore


the packet will be routed out over interface 0
is

(c) 135.46.52.2
Th

The address is lower than 22 bits, the default route will be used and it
sh

will be routed out over router 2

(d) 192.53.40.7

This study source was downloaded by 100000809912626 from CourseHero.com on 04-23-2021 14:35:27 GMT -05:00

https://www.coursehero.com/file/40425906/NET-256-Assignment-2docx/
The router will look for the first 23 bits, we have 192.53.40.0 . It
matches the network address of 135.43.40.0/23 routing entry, therefore
the packet will be routed out over router 1.

(e) 192.53.56.7
The router will look for the first 23 bits, we have 192.53.56.0 . the
default route will be used and it will be routed out over router 2

2. What is the relationship between the “gateway” and “interface”

m
fields?

er as
co
eH w
Problem 4- NAT

o.
rs e
What problem is tackled by Network Address Translation (NAT)? Please
ou urc
briefly describe what NAT does.
o

NAT stands for Network Address Translation, it is the prossess of a


aC s

network device, usually a firewall, and it assigns a public ip address to a


vi y re

device (computer/s) in a private network. NAT is mainly used to limit


the number of public ip addresses that companys and organizations are
ed d

recommended to use it for security purposes.


ar stu

Problem5- IP addresses
is
Th

How does a host get an IP address? How does a network get the subnet
part of an IP address?
How does a provider get a block of IP addresses? What is the principle
sh

behind these procedures?

Ithey can either be assigned statically (the network manager assigns them) or can
be assigned dynamically via Dynamic Host Control Protocol (DHCP). Subnetting

This study source was downloaded by 100000809912626 from CourseHero.com on 04-23-2021 14:35:27 GMT -05:00

https://www.coursehero.com/file/40425906/NET-256-Assignment-2docx/
is the way toward assigning some high-arrange bits from the host part as a major
aspect of the system prefix. ISPs (Internet Service Providers) or associations can
get in touch with them to enroll an IP address or a piece of IP tends to which is the
place you come in. to provide security to the host.

m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
is
Th
sh

This study source was downloaded by 100000809912626 from CourseHero.com on 04-23-2021 14:35:27 GMT -05:00

https://www.coursehero.com/file/40425906/NET-256-Assignment-2docx/
Powered by TCPDF (www.tcpdf.org)

You might also like