Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

B) Consider the following _ -Network A 10.102.1.78 Network B 10.102.0.1 10.102.1

ID: 3604414 • Letter: B

Question

B) Consider the following _ -Network A 10.102.1.78 Network B 10.102.0.1 10.102.1.255 10.102.0.2 10.102.0.15 10.102.0.3 10.102.0.2 17.102.1.78 Network C 17.85.17.64 17.19.57.9 i) Assume that the three networks indicated in the diagram use the smallest possible subnets (ie smallest number of addresses). Give the network and broadcast addresses for those subnets as well as the number of bits in the host part of addresses. [4 marks] Network Network addressBroadcast address Host bits Network A Network B Network C ii) Something is wrong with the collection of networks above. What is it? 2 marks]

Explanation / Answer

Network

Network Address

Broadcast Address

Host bits

Network A

10.102.0.0

10.102.1.255

9 (already mentioned )

Network B

10.0.0.0

10.127.255.255

23(only one subnet)

Network C

17.0.0.0

17.127.255.255

23(only one subnet)

Network Address:

A network address is any logical or physical address that uniquely distinguishes a network node or device over a computer or telecommunications network. It is a numeric/symbolic number or address that is assigned to any device that seeks access to or is part of a network.

As an example:

193.040.136.064 = 11000001.00101000.10001000.01000000 (network)

255.255.255.240 = 11111111.11111111.11111111.11110000 (mask)

Broadcast address is the last address in the network, and it is used for addressing all the nodes in the network at the same time. It means that IP packet, where the destination address is broadcast address, is sent to all nodes of the IP network. It is important for remote announcements in network segment. In some cases it is used for attacking purposes by hackers or can cause problems in bigger network segments

ii)

Supernettting can’t be applied to the above addresses.

Since they are not contiguous network addresses.

D)

Term

Layer

Internet Explorer and Safari

Application

SCP

Application

MAC

Data Link

Port

Transport

The application layer : It is layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services.

Internet Explorer and Safari are applications.

Network layer: It knows the address of the neighboring nodes in the network, packages output with the correct network address information, selects routes and quality of service, and recognizes and forwards to the Transport layer incoming messages for local host domains.

The Data-Link layer is the protocol layer in a program that handles the moving of data in and out across a physical link in a network. The Data-Link layer is layer 2 in the Open Systems Interconnect (OSI) model for a set of telecommunication protocols.

The transport layer is the fourth layer of the OSI reference model. It provides transparent transfer of data between end systems using the services of the network layer (e.g. IP) below to move PDUs of data between the two communicating systems. Ports are related transport layer.

Secure Copy Protocol (SCP)

MAC: In the Open Systems Interconnection (OSI) model of communication, the Media Access Control layer is one of two sublayers of the Data Link Control layer and is concerned with sharing the physical connection to the network among several computers. Each computer has its own unique MAC address.

C)

Port number:

There are 2 kinds of ports.

So, you may forgot to set the static port instead of dynamic port.

Network

Network Address

Broadcast Address

Host bits

Network A

10.102.0.0

10.102.1.255

9 (already mentioned )

Network B

10.0.0.0

10.127.255.255

23(only one subnet)

Network C

17.0.0.0

17.127.255.255

23(only one subnet)