Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I hope there is someone can help me with this assignment. 1- Which of the follow

ID: 3801824 • Letter: I

Question

I hope there is someone can help me with this assignment.

1- Which of the following is a valid public IPv4 address?

a) 192.168.1.25                                                                 b)              127.0.0.1

c) 66.23.261.45                                                                 d)              66.211.206.7

2- What is the proper IP address for the gateway router for a subnet with subnet ID 172.16.30 and subnet mask 255.255.255.0 ?

3- A computer is unable to communicate with other computers on the subnet. Ipconfig shows its IP address as 169.254.5.7. What is wrong?

4- For displaying to a human an IPv6 address consists of what? Include the format.

5- What is the basic idea of network tunneling? Give an example when it is used. I mentioned at least two in class.

6- The following 4 computers have the subnet mask 255.255.254.0. Which computers, if any, are on the same physical local subnet? Explain.

Computer

IP address

A

10.30.50.5

B

10.30. 20.6

C

10.30.21.8

D

10.30.20.22.7

Computer

IP address

A

10.30.50.5

B

10.30. 20.6

C

10.30.21.8

D

10.30.20.22.7

Explanation / Answer

1- Which of the following is a valid public IPv4 address?

Ans: a) 192.168.1.25  

2- What is the proper IP address for the gateway router for a subnet with subnet ID 172.16.30 and subnet mask 255.255.255.0 ?

Ans: Range: 172.16.0.0 - 172.16.0.255 IP Addresses: 256 Mask: 255.255.255.0 /24

3. 3- A computer is unable to communicate with other computers on the subnet. Ipconfig shows its IP address as 169.254.5.7. What is wrong?

Ans: a DHCP server cannot be reached

4- For displaying to a human an IPv6 address consists of what? Include the format.

Ans: web Protocol version vi (IPv6) is that the most up-to-date version of the web Protocol (IP), the rule that gives associate identification and placement system for computers on networks and routes traffic across the web. IPv6 was developed by the web Engineering Task Force (IETF) to alter the long-anticipated downside of IPv4 address exhaustion. IPv6 is meant to switch IPv4.

associate IPv6 address will have either of the subsequent 2 formats:

Normal - Pure IPv6 format

Dual - IPv6 and IPv4 formats

An IPv6 (Normal) address has the subsequent format: y : y : y : y : y : y : y : y wherever y is termed a section and may be any hex worth between zero and FFFF. The segments area unit separated by colons - not periods. associate IPv6 traditional address should have eight segments, but a brief kind notation are often utilized in the Tape Library Specialist internet interface for segments that area unit zero, or those who have leading zeros. The short kind notation cannot be used from the operator panel.

The following list shows samples of valid IPv6 (Normal) addresses:

2001 : db8: 3333 : 4444 : 5555 : 6666 : 7777 : 8888

2001 : db8 : 3333 : 4444 : CCCC : DDDD : EEEE : FFFF

: : (implies all eight segments area unit zero)

2001: db8: : (implies that the last six segments area unit zero)

: : 1234 : 5678 (implies that the primary six segments area unit zero)

2001 : db8: : 1234 : 5678 (implies that the center four segments area unit zero)

2001:0db8:0001:0000:0000:0ab9:C0A8:0102 (This are often compressed to eliminate leading zeros, as follows: 2001:db8:1::ab9:C0A8:102 )

5- what is the basic idea of network tunneling? give an example once it is used. i mentioned at least two in class.

Ans: In laptop networks, a tunneling protocol permits a network user to access or give a network service that the underlying network doesn't support or give directly. One vital use of a tunneling protocol is to permit a remote protocol to run over a network that doesn't support that individual protocol; as an example, running IPv6 over IPv4. Another vital use is to supply services that area unit impractical or unsafe to be offered victimisation solely the underlying network services; as an example, providing a company network address to a far off user whose physical network address isn't a part of the company network. as a result of tunneling involves repackaging the traffic knowledge into a special kind, maybe with secret writing as customary, a 3rd use is to cover the character of the traffic that's run through the tunnels.

The tunneling protocol works by victimisation the information portion of a packet (the payload) to hold the packets that really give the service. Tunneling uses a bedded protocol model like those of the OSI or TCP/IP protocol suite, however typically violates the layering once victimisation the payload to hold a service not ordinarily provided by the network. Typically, the delivery protocol operates at associate equal or higher level within the bedded model than the payload protocol.

There area unit numerous protocols that enable tunneling to occur, including:

Point-to-Point Tunneling Protocol (PPTP): PPTP keeps proprietary knowledge secure even once it's being communicated over public networks. licensed users will access non-public|a personal|a non-public} network known as a virtual private network, that is provided by an online service supplier. this is often a personal network within the “virtual” sense as a result of it's truly being created in an exceedingly tunneled setting.

Layer 2 Tunneling Protocol (L2TP): this kind of tunneling protocol involves a mix of victimisation PPTP and Layer two Forwarding.

Tunneling could be a manner for communication to be conducted over a personal network however tunneled through a public network. this is often significantly helpful in an exceedingly company setting and conjointly offers safety features like secret writing choices.