# ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

Save this PDF as:

Size: px
Start display at page:

Download "ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer"

## Transcription

1 ECE 358: Computer Networks Solutions to Homework #4 Chapter 4 - The Network Layer P 4. Consider the network below. a. Suppose that this network is a datagram network. Show the forwarding table in router A, such that all traffic destined to host H3 is forwarded through interface 3. b. Suppose that this network is a datagram network. Can you write down a forwarding table in router A, such that all traffic from HI destined to host H3 is forwarded through interface 3, while all traffic from H destined to host H3 is forwarded through interface 4? (Hint: this is a trick question.) c. Now suppose that this network is a virtual circuit network and that there is one ongoing call between HI and H3, and another ongoing call between H and H3. Write down a forwarding table in router A, such that all traffic from HI destined to host H3 is forwarded through interface 3, while all traffic from H destined to host H3 is forwarded through interface 4. d. Assuming the same scenario as (c), write down the forwarding tables in nodes B, C, and D. a) For Router A, data destined to host H3 is forwarded through interface 3. Distention address Link interface H3 #3 b) No, because, for datagram networks, forwarding rule is only based only on destination address (not the source address). c) One possible configuration for Router A is: Note, that the two flows could actually have the same VC numbers. d) One possible configuration is: for Router B 4

2 For Router C 8 50 For Router D P 7. Suppose two packets arrive at different input ports of a router at exactly the same time. Also suppose there are no other packets in the router. a. Suppose the two packets are to be forwarded to two different output ports. Is it possible to forward the two packets through the switch fabric at the same time when the fabric uses a shared bus? b. Suppose the two packets are to be forwarded to two different output ports. Is it possible to forward the two packets through the switch fabric at the same time when the fabric uses a crossbar? c. Suppose the two packets are to be forwarded to the same output port. Is it possible to forward the two packets through the switch fabric at the same time when the fabric uses a crossbar? a) No, you can only transmit one packet at a time over a shared bus. 3 4 b) Yes, as long as the two packets use different input busses and different output busses, they can be forwarded in parallel. 3 4 c) No, in this case the two packets would have to be sent over the same output bus at the same time, which is not possible. 3 4

3 P 9. Consider the switch shown below. Suppose that all datagrams have the same fixed length, that the switch operates in a slotted, synchronous manner, and that in one time slot a datagram can be transferred from an input port to an output port. The switch fabric is a crossbar so that at most one datagram can be transferred to a given output port in a time slot, but different output ports can receive datagrams from different input ports in a single time slot. What is the minimal number of time slots needed to transfer the packets shown from input ports to their output ports, assuming any input queue scheduling order you want? What is the largest number of slots needed, assuming the worst- case scheduling order you can devise, assuming that a non- empty input queue is never idle? The minimal number of time slots needed is 3. The scheduling is as follows. Slot : send X in top input queue, send Y in middle input queue. Slot : send X in middle input queue, send Y in bottom input queue Slot 3: send Z in bottom input queue. Largest number of slots is still 3. Actually, based on the assumption that a non- empty input queue is never idle, we see that the first time slot always consists of sending X in the top input queue and Y in either middle or bottom input queue, and in the second time slot, we can always send two more datagram, and the last datagram can be sent in third time slot. NOTE: Actually, if the first datagram in the bottom input queue is X, then the worst case would require 4 time slots.

6 Subnet # /6, Mask Subnet ID , Subnet broadcast address Hosts to Subnet #3 ( interfaces) The parent network is /6 Prefix to 0 Prefix to Subnet portion Host portion We can have 4 subnets, each with 6 addresses: /8 (range to ) /8 (range to ) /8 (range to ) 3..7./8 (range to ) We assign one of these to our Subnet #3 Subnet # /8, Mask Subnet ID , Subnet broadcast address Hosts to

7 P 6. Consider a subnet with prefix /6. Give an example of one IP address (of form xxx.xxx.xxx.xxx) that can be assigned to this network. Suppose an ISP owns the block of addresses of the form /6. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets? Any IP address in range to can be an example. Four equal size subnets: /8, /8, /8, /8

### Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

### CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

### Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

### Exam 1 Review Questions

CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

### Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d

Module 10 Subnetting Class A, B and C addresses Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d 10.3.5a Basic Subnetting Use the following information and answer the following subnet

Section #6: Addressing Problem 1: Routing entries Consider the following routing table for router A, given in CIDR ( slash-n ) notation: 56.162.0.0/15: Port 0 56.164.0.0/15: Port 1 56.166.0.0/16: Port

### IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces

### Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

### Network layer. Data Link Layer Network Interface Card TCP 1 TCP 2 UDP. TCP IP Interface UDP IP Interface RSVP ARP ICMP

Network layer The Network Layer ( layer 3 ) is made of IP and a large number of auxiliary protocols. Some of the auxiliary protocols do not fit very well into the OSI stack structure. Application Application

### Source net: 200.1.1.0 Destination net: 200.1.2.0 Subnet mask: 255.255.255.0 Subnet mask: 255.255.255.0. Router Hub

then to a router. Remember that with a Class C network address, the first 3 octets, or 24 bits, are assigned as the network address. So, these are two different Class C networks. This leaves one octet,

### Final for ECE374 05/06/13 Solution!!

1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

### Question 3.1.1. Question 3.2.1. Question 3.3.1. EdTech 552: Lab 3 Answer Sheet

Question 3.1.1 Question Answers a. 123 01111011 b. 202 11001010 c. 67 01000011 d. 7 00000111 e. 252 11111100 f. 91 01011011 g. 116.127.71.3 01110100.01111111.01010001.00000011 h. 255.255.255.0 11111111.11111111.11111111.00000000

### Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

### Chapter 2 NETWORK LAYER

Chapter 2 NETWORK LAYER This chapter provides an overview of the most important and common protocols associated with the TCP/IP network layer. These include: Internet Protocol (IP), Routing protocols Routing

### 2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

### Module 4, Assignment 3-2

Module 4, Assignment 3-2 Lab 3.4 Basic Subnetting Question 3.4.1: A company has applied for and received a Class C network address of 197.15.22.0. The physical network is to be divided into 4 subnets,

### Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 3 - Solutions Deadline : May 9 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

### Instructor Notes for Lab 3

Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

### 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short

### Packet Tracer - Subnetting Scenario 1 (Instructor Version)

(Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or to provide

### Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

### CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell campbell@cs.dartmouth.edu our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP

### The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

### Note: The preceding example is true only until you get up to /24. After that, it s numerically exactly like Class C.

Subnetting Class B Addresses Before we dive into this, let s look at all the possible Class B subnet masks first. Notice that we have a lot more possible subnet masks than we do with a Class C network

### The Network Layer Functions: Congestion Control

The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and

### Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

### NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25

NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses

### Lab 10.3.5a Basic Subnetting

Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet

### Internetworking II: VPNs, MPLS, and Traffic Engineering

Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual

### Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

### Internetworking and Internet-1. Global Addresses

Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

### What is VLAN Routing?

Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

### Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel

### Expert Reference Series of White Papers. Basics of IP Address Subnetting

Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction

### Internetworking II: MPLS, Security, and Traffic Engineering

Internetworking II: MPLS, Security, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Department of Computer Science University College London Last Fme: Internetworking IP interconnects

### DG Forwarding Algorithm

DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router

### APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is

### Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

### Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing

Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University

### 04 Internet Protocol (IP)

SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

### Network Address Translation on a Stick

Network Address Translation on a Stick Document ID: 6505 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Example 1 Network Diagram and Configuration

### MPLS. Packet switching vs. circuit switching Virtual circuits

MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit

### How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.

SUBNET MASK To define the network and host portions of an address, the devices use a separate 32-bit pattern called a subnet mask. We express the subnet mask in the same dotted decimal format as the IPv4

### Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

### Chapter 1: Introduction. Chapter 1: roadmap. Our goal: Overview:

Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course approach: use Internet as example Overview: what s the Internet what s a protocol? network edge network core

Addresses for the Virtual Internet CSIS 4222 Ch 21: IP: Internet Protocol Addresses Addressing is a critical component of the Internet All host computers must use a uniform addressing scheme Each address

### Teldat Router. ARP Proxy

Teldat Router ARP Proxy Doc. DM734-I Rev. 10.00 November, 2002 INDEX Chapter 1 Introduction...1 1. ARP Proxy... 2 Chapter 2 Configuration...4 1. ARP Proxy Configuration... 5 1.1. Enabling ARP Proxy...

Part2 Chapter 8 Advanced TCP/IP Network Design - CLASSLESS ADDRESSING AND VARIABLE- LENGTH SUBNET MASKS Variable-Length Subnet Masks Variable-length subnet masks specified how a single network ID could

### First Semester Examinations 2011/12 INTERNET PRINCIPLES

PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

VLSM & IP ADDRESSING EXAMPLE QUESTIONS with answers; 1 Given the network address of 112.44.0.0 and the network mask of 255.255.0.0 Would the two stations with addresses 112.44.22.19/16 and 112.44.23.2/16

### CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

### Introduction to Networking S Y STEMS

Introduction to Networking CS 40: INTRODUCTION TO U NIX A ND L I NUX O P E R AT ING S Y STEMS Objectives Introduce networking, including what it is and what it contains, which includes: Networking layers

### Internet Packets. Forwarding Datagrams

Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed

### William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols

William Stallings Data and Computer Communications Chapter 15 Internetwork Protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection

### EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

### Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

### Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg

Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful

### Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap \$20 for NIC first widely used LAN technology Simpler,

### CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012 Important: No cheating will be tolerated. No Late Submission will be allowed. Total points for 5480 = 37

### Computer Networks Homework 1

Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

### Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Subnetting Basics You learned previously how to define and find the valid host ranges used in a Class A, Class B, and Class C network address by turning the host bits all off and then all on. This is very

### Planning for Information Network

Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making

### Router Construction. Workstation-Based. Switching Hardware Design Goals throughput (depends on traffic model) scalability (a function of n) Buffering

Workstation-Based Outline Router Construction Switched Fabrics IP Routers Tag Switching Aggregate bandwidth 1/2 of the I/O bus bandwidth capacity shared among all hosts connected to switch example: 1Gbps

### CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 2.1 Routing Process Routers are amongst the most crucial components of the internet, as each bit of information on the internet passes through many routers [2]. Routing is the

### VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application

### Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to

### If your network is, or will be, connected to the Internet, you will need to get a unique network address from your ISP or network administrator.

Technical Support Technical Papers: IP 101 IP 101 Note: This is a very brief introduction to IP networking. For more in depth information, there are a number of excellent references. In particular, Douglas

### Router Architectures

Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components

### Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a

### Application Note 28. Configuring VLAN Tagging (802.1q) Tech. Support

Application Note 28 Configuring VLAN Tagging (802.1q) Tech. Support September 2016 Contents 1 Introduction... 2 1.1 Outline... 2 1.2 Assumptions... 3 1.3 Corrections... 3 1.4 Version... 4 2 Configuration...

### Cisco Configuring Basic MPLS Using OSPF

Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration

### How Subnets Work in Practice. Fred Marshall Coastal Computers & Networks

How Subnets Work in Practice Fred Marshall Coastal Computers & Networks Background There's lots of literature available on how the bit structure of an address can be split up using the subnet mask. Generally,

### (Refer Slide Time: 02:17)

Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

### Star topology. Ethernet. Ethernet Frame Structure (more) Ethernet Frame Structure. Ethernet uses CSMA/CD. Unreliable, connectionless service

thernet dominant wired LN technology: cheap \$0 for 00Mbs! first widely used LN technology Simpler, cheaper than token LNs and TM Kept up with speed race: 0 Mbps 0 bps Star topology us topology popular

IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

### You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

Lab 3-1 assignment check list **Please post your answers on the bulletin board. ** Lab 3.1 o Questions 3.1.1 Lab 3.2 o Questions 3.2.1 Lab 3.3 o Questions 3.3.1 o Questions 3.3.2 o Questions 3.3.3 Lab

### Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

### First Midterm for ECE374 02/25/15 Solution!!

1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

### Figure 5.1: Issues addressed by network layer protocols. (Figure by Forouzan)

Chapter 5 Network Layer The main responsibility of a network layer protocol is host-to-host data delivery. In doing this, the network layer has to deal with network layer addressing, packetization and

### LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

### IP Subnetting and Related Topics A Tutorial by Chris Uriarte <chrisjur@cju.com> Updated April 2001

IP Subnetting and Related Topics A Tutorial by Chris Uriarte Updated April 2001 IP Addresses and their Binary Equivalents First and foremost, it s important to understand that every

### Introduction to Computer Networking

Introduction to Computer Networking Dale Callahan, Ph.D., P.E. 6.1 Review MODULE 6: IP Addressing Scheme As explained in module 4, an IP address is a 32-bit number (4 bytes) that is used to identify a

### 2.1.2.2.2 Variable length subnetting

2.1.2.2.2 Variable length subnetting Variable length subnetting or variable length subnet masks (VLSM) allocated subnets within the same network can use different subnet masks. Advantage: conserves the

### Software Defined Networking (SDN) - Open Flow

Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,

### Transport and Network Layer

Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

### PART IV. Network Layer

PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

Planning the Addressing Structure Working at a Small-to-Medium Business or ISP Chapter 4 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name,

### CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

### Introduction. Internet Address Depletion and CIDR. Introduction. Introduction

Introduction Internet Address Depletion and A subnet is a subset of class A, B, or C networks IP addresses are formed of a network and host portions network mask used to separate the information Introduction

### Objectives. Explain the different classes of IP addresses Configure IP addresses Subdivide an IP network

IP Addressing Objectives Explain the different classes of IP addresses Configure IP addresses Subdivide an IP network CCNA Guide to Cisco Networking Fundamentals, Fourth Edition 2 Objectives (continued)

### SYMETRIX SOLUTIONS: TECH TIP April 2014

Understanding Class C Masking In the day to day support operations a Symertix tech support agent will most often come across customers that have their PC and Symetrix DSP on a Class C Mask of 255.255.255.0.

### From the previous lecture

CS 640: Introduction to Computer Networks Aditya Akella Lecture 7 - IP: Addressing and Forwarding From the previous lecture We will cover spanning tree from the last lecture 2 Spanning Tree Bridges More

### UPPER LAYER SWITCHING

52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

### 3201 Computer Networks 2014/2015 Handout: Subnetting Question

Subnetting Questions with Answers Question1: Given the following: Network address: 192.168.10.0 Subnet mask: 255.255.255.224 1. How many subnets? Ans: 6 2. How many hosts? Ans: 30 3. What are the valid

### CS413: Computer Networks

CS413: Computer Networks 2005 Fall Term Midterm Exam Solution Student ID: Name: Problem No. Marks Your Marks 1 16 2 5 3 5 4 7 5 4 6 7 7 3 8 3 Total 50 1 [Marking schemes are given in blue color and the