Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please ANSWER ALL QUESTIONS 2. Understand why network layer addresses are logica

ID: 3714140 • Letter: P

Question

Please ANSWER ALL QUESTIONS 2. Understand why network layer addresses are logical, rather than physical 3. Describe why a mesh network is reliable 4. Discuss why packets may take different paths to destinations 5. Describe both why and how fragmentation occurs at L3, and reassembly process 6. Describe what ping is used for, as well as traceroute. Describe how they work, and what they were designed for. 7. Describe the structure of an IP packet in terms of encapsulation. 8. Describe the hierarchy of IP addresses 9. Describe the purpose of the DHCP protocol, and the basics of how it works 10. Discuss IPv4 addresses a. Structure, how many there are, why initial allocation was wasteful b. Know the IP address classes, and # of networks and hosts available in each c. Know what IPv4 exhaustion means 11. Explain how NAT works, specifically PAT a. Know what a NAT table looks like b. Understand what NAT does to IPv4 addresses c. Know why NAT is used, and what it means for IPv4 exhaustion d. Know NAT IP address ranges for all three classes e. Understand what inside and outside mean in terms of NAT f. Describe port forwarding, why it’s used, and limitations to using it 12. Explain the concept of subnetting. a. Explain why subnetting would be used in an organization b. Explain how subnet sizes would be calculated (not math, but why from an organizational standpoint) 13. Explain CIDR, and be able to recognize CIDR “/” notation 14. Explain what VLSM is used for 15. Know what the Version, Fragment offset, TTL, Protocol, and SRC & DST IP address fields are used for in an IPv4 header 16. Understand how TTL works and what it’s used for 17. Be able to outline a troubleshooting process with Ping. THERE WILL BE AN ESSAY QUESTION ABOUT THIS! 18. Explain why Ping is sometimes considered a security risk 19. Explain how traceroute works 20. Describe IPv6 a. Structure (don’t memorize how many IPv6 addresses, but know how many bits) b. Security c. Recognize IPv6 address (don’t need to condense a fully-written IPv6) d. Know what Version, Hop Limit, and SRC & DST IP fields are for in IPv6 21. Know IPv4 to IPv6 transition strategies 22. Discuss the function of a router 23. Be able to list and discuss the steps of a routing decision (slide 11, lecture 11) 24. Know what the default route is 25. Understand what metrics are, and be able to list a few 26. Describe the binary AND process, and why it’s important in routing 27. Given an IP packet with source and destination IP addresses, be able to identify all possible matches in a routing table 28. Discuss what routing means in terms of speed 29. Describe static and dynamic routes 30. Discuss what routing protocols do 31. Discuss how RIP works Please ANSWER ALL QUESTIONS 2. Understand why network layer addresses are logical, rather than physical 3. Describe why a mesh network is reliable 4. Discuss why packets may take different paths to destinations 5. Describe both why and how fragmentation occurs at L3, and reassembly process 6. Describe what ping is used for, as well as traceroute. Describe how they work, and what they were designed for. 7. Describe the structure of an IP packet in terms of encapsulation. 8. Describe the hierarchy of IP addresses 9. Describe the purpose of the DHCP protocol, and the basics of how it works 10. Discuss IPv4 addresses a. Structure, how many there are, why initial allocation was wasteful b. Know the IP address classes, and # of networks and hosts available in each c. Know what IPv4 exhaustion means 11. Explain how NAT works, specifically PAT a. Know what a NAT table looks like b. Understand what NAT does to IPv4 addresses c. Know why NAT is used, and what it means for IPv4 exhaustion d. Know NAT IP address ranges for all three classes e. Understand what inside and outside mean in terms of NAT f. Describe port forwarding, why it’s used, and limitations to using it 12. Explain the concept of subnetting. a. Explain why subnetting would be used in an organization b. Explain how subnet sizes would be calculated (not math, but why from an organizational standpoint) 13. Explain CIDR, and be able to recognize CIDR “/” notation 14. Explain what VLSM is used for 15. Know what the Version, Fragment offset, TTL, Protocol, and SRC & DST IP address fields are used for in an IPv4 header 16. Understand how TTL works and what it’s used for 17. Be able to outline a troubleshooting process with Ping. THERE WILL BE AN ESSAY QUESTION ABOUT THIS! 18. Explain why Ping is sometimes considered a security risk 19. Explain how traceroute works 20. Describe IPv6 a. Structure (don’t memorize how many IPv6 addresses, but know how many bits) b. Security c. Recognize IPv6 address (don’t need to condense a fully-written IPv6) d. Know what Version, Hop Limit, and SRC & DST IP fields are for in IPv6 21. Know IPv4 to IPv6 transition strategies 22. Discuss the function of a router 23. Be able to list and discuss the steps of a routing decision (slide 11, lecture 11) 24. Know what the default route is 25. Understand what metrics are, and be able to list a few 26. Describe the binary AND process, and why it’s important in routing 27. Given an IP packet with source and destination IP addresses, be able to identify all possible matches in a routing table 28. Discuss what routing means in terms of speed 29. Describe static and dynamic routes 30. Discuss what routing protocols do 31. Discuss how RIP works Please ANSWER ALL QUESTIONS 2. Understand why network layer addresses are logical, rather than physical 3. Describe why a mesh network is reliable 4. Discuss why packets may take different paths to destinations 5. Describe both why and how fragmentation occurs at L3, and reassembly process 6. Describe what ping is used for, as well as traceroute. Describe how they work, and what they were designed for. 7. Describe the structure of an IP packet in terms of encapsulation. 8. Describe the hierarchy of IP addresses 9. Describe the purpose of the DHCP protocol, and the basics of how it works 10. Discuss IPv4 addresses a. Structure, how many there are, why initial allocation was wasteful b. Know the IP address classes, and # of networks and hosts available in each c. Know what IPv4 exhaustion means 11. Explain how NAT works, specifically PAT a. Know what a NAT table looks like b. Understand what NAT does to IPv4 addresses c. Know why NAT is used, and what it means for IPv4 exhaustion d. Know NAT IP address ranges for all three classes e. Understand what inside and outside mean in terms of NAT f. Describe port forwarding, why it’s used, and limitations to using it 12. Explain the concept of subnetting. a. Explain why subnetting would be used in an organization b. Explain how subnet sizes would be calculated (not math, but why from an organizational standpoint) 13. Explain CIDR, and be able to recognize CIDR “/” notation 14. Explain what VLSM is used for 15. Know what the Version, Fragment offset, TTL, Protocol, and SRC & DST IP address fields are used for in an IPv4 header 16. Understand how TTL works and what it’s used for 17. Be able to outline a troubleshooting process with Ping. THERE WILL BE AN ESSAY QUESTION ABOUT THIS! 18. Explain why Ping is sometimes considered a security risk 19. Explain how traceroute works 20. Describe IPv6 a. Structure (don’t memorize how many IPv6 addresses, but know how many bits) b. Security c. Recognize IPv6 address (don’t need to condense a fully-written IPv6) d. Know what Version, Hop Limit, and SRC & DST IP fields are for in IPv6 21. Know IPv4 to IPv6 transition strategies 22. Discuss the function of a router 23. Be able to list and discuss the steps of a routing decision (slide 11, lecture 11) 24. Know what the default route is 25. Understand what metrics are, and be able to list a few 26. Describe the binary AND process, and why it’s important in routing 27. Given an IP packet with source and destination IP addresses, be able to identify all possible matches in a routing table 28. Discuss what routing means in terms of speed 29. Describe static and dynamic routes 30. Discuss what routing protocols do 31. Discuss how RIP works

Explanation / Answer

9)Answer:

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign an IP address to any new node entering the network. DHCP permits a node to be configured automatically, thereby avoiding the necessity of involvement by a network administrator.

DHCP does the following:

Dynamic Host Configuration Protocol is also known as RFC 2131.

DHCP is an automated method by which any newly added or transferred node in a network can be assigned or reassigned an IP address instantly. Without DHCP, the network administrators would be forced to assign IP address manually for every node in a network.

A DHCP server has many duties:

how dhcp works:

we first have to understand the different messages that are used in the process.

1. DHCPDISCOVER

It is a DHCP message that marks the beginning of a DHCP interaction between client and server. This message is sent by a client (host or device connected to a network) that is connected to a local subnet. It’s a broadcast message that uses 255.255.255.255 as destination IP address while the source IP address is 0.0.0.0

2. DHCPOFFER

It is DHCP message that is sent in response to DHCPDISCOVER by a DHCP server to DHCP client. This message contains the network configuration settings for the client that sent the DHCPDISCOVER message.

3. DHCPREQUEST

This DHCP message is sent in response to DHCPOFFER indicating that the client has accepted the network configuration sent in DHCPOFFER message from the server.

4. DHCPACK

This message is sent by the DHCP server in response to DHCPREQUEST recieved from the client. This message marks the end of the process that started with DHCPDISCOVER. The DHCPACK message is nothing but an acknowledgement by the DHCP server that authorizes the DHCP client to start using the network configuration it received from the DHCP server earlier.

5. DHCPNAK

This message is the exact opposite to DHCPACK described above. This message is sent by the DHCP server when it is not able to satisfy the DHCPREQUEST message from the client.

6. DHCPDECLINE

This message is sent from the DHCP client to the server in case the client finds that the IP address assigned by DHCP server is already in use.

7. DHCPINFORM

This message is sent from the DHCP client in case the IP address is statically configured on the client and only other network settings or configurations are desired to be dynamically acquired from DHCP server.

8. DHCPRELEASE

This message is sent by the DHCP client in case it wants to terminate the lease of network address it has be provided by DHCP server.

13)Answer:

CIDR:

Classless interdomain routing (CIDR) allows for the aggregation of different classes of IPv4 addresses. In the original IPv4 scheme, IP addresses were designated according to class, and this designation was illustrated in the values of the different octets of a given IPv4 address. When the IETF and other similar organizations began to recognize that simply dividing IP address space into classes would not be sufficient enough to conserve IP address space, the concept of CIDR was developed.

Classless interdomain routing involves two portions of an IPv4 address, the network portion and the host portion. The network portion are is the left-most bits of a given IP address. As the term indicates, this identifies a given network. The right-most bits are the host portion, and as you may have guessed, these bits identify a specific host within a network. So, when a network achieves a certain number of nodes, CIDR allows for the host portion of an IPv4 address to, in effect, borrow bits from the network portion, thus allowing for the conservation of address space, and allowing for more control within the local network.

14)Answer:

VLSM:

A Variable Length Subnet Mask (VLSM) is a numerical masking sequence, or IP address subset, based on overall network requirements. A VLSM allows a network administrator to use long masks for networks with few hosts and short masks for networks with multiple hosts. A VLSM is used with a VLSM router and must have routing protocol support.

A VLSM is also known as a classless Internet Protocol (IP) address.

Key VLSM features include:

VLSMs are used by a variety of network systems and services, including: