# ITC542 Internetworking With TCP/IP

## Question:

Based on the protocol used, the Maximum Transmission Units (MTUs), range from 296 up to 65.535

What are the benefits of having a large MTU

What are the benefits of a small MTU

Compare and contrast CSMA/CD and CSMA/CA.

What purpose does including the IP header, the first 8 bytes datagram data and the IP header in error reporting ICMP messages serve?

What ICMP messages include part of the IP datagrams?

This is why it is necessary.

The following classless addresses have been assigned to an organisation by its ISP.

Your calculations should be as detailed as possible

Routers running RIP have a routing table that contains 20 entries.

a) How many periodic time are required to manage this table?

b) What are the expiration times required to manage this table?

c) If five routers fail, how many garbage collection times will it take to clean up this table?

You are the network administrator of a growing Internet service provider (ISP) and you want to maximize your network addresses.

You were assigned a classless network number of 160.50.1.1/23 by the Internet Assigned Numbers Authority.

The network addresses are being used to fulfill the IP address requirements for 16 corporate customers, who each require between 18 and 30 host-addresses.

Calculate a subnet mask to meet their needs without using a subnet calculator.

Show the calculation in detail.

A call comes in from an employee claiming she cannot access the network resources.

You would like the employee to see her IP address configuration.

You sent an email to the employee explaining the command-line program she should use and how to get the information she needs.

The employee replies that her IP address was 169.254.14.11 and that the subnet mask is 255.255.0.0.

What conclusion can you draw from this information?

You want to optimize the use of your network addresses as a network administrator for an expanding Internet service provider (ISP).

A Class C network with 192.168.1.0 is one of the network addresses Internet Assigned Numbers Authority has assigned you.

To satisfy 16 corporate customers who require between 10 and 14 addresses, you have chosen to use addresses from this Class C network.

Calculate a subnet mask to meet their needs without using a subnet calculator.

The subnet mask, as well as all subnetwork addresses that the mask will create, should be listed.

Detail calculation for each output

A block of addresses is granted to an organization with the starting address 14.24.74.0/24.

As shown below, the organization must have three subblocks of addresses for its three subnets.

O ne subblock with 120 addresses.

O ne subblock with 60 addresses.

Answer these questions to calculate the -.

Calculate the total number of IP addresses, first and last addresses for given blocks.

A larger MTU has the following advantages:

These are suitable for handling large amounts of data that have been set over a longer distance.

It is not necessary to have major fragmentation in order to speed up delivery. There are very few lost datagrams.

These advantages are available for small MTUs:

Good transfer of time sensitive data such as audio or video.

The suit for multiplexing.

CSMA/CD is used to detect collisions.

The collision is detected using the terminations that work over the system standards. Data is also detected depending on the transmitter that doesn’t waste time in continuing.

This allows for the retransmission of last information.

CSMA/CA does not require that one deal with recovery after a collision.

It is crucial to verify that the medium is in use.

It is important to locate the busy area in which the transmitter is operating. The transmitter will then wait until it is idle before starting transmissions.

It is possible to reduce the risk of collisions by making better use of the medium.

It is crucial to match the packets with the process that sent them.

This is why it is important to understand error messages. The destination should focus on unreachable messages and the causes.

For determining the router interface, the source IP address is necessary.

The protocol messages will contain the first bytes for the TCP source port and destination port.

This allows you to troubleshoot the problem by working on the TTL expiration and source quench messages.

The IP header includes the IP datagram.

This header is used to determine the destination and source of packet information.

There are 40 periods, each with two periodic times.

There are 20 expiration times that must be met, one per period.

21 garbage collection times will be required, one after each router.

Major Network: 160.50.0.0/23

Available IP addresses in major networks: 510

Number of IP addresses required: 480

Available IP addresses within subnets: 480

Around 100% of the available major network address space are used

Name of the Subnet

Size is important

Allocate Size

Assignable range

A

B

C

D

E

F

G

H

I

J

L

M

N

O

P

This information can be used to conclude that subnet masking was not done correctly, that DHCP error occurred, and that automatic subnetting was not performed.

Client’s system is not connected with the network and will need to be reset.

Major Network: 192.168.0.0/23

Available IP addresses in major networks: 510

Number of IP addresses required: 224

Around 50% of the available major network address space are used

The subnetted network address area is approximately 100% used

Name of the Subnet

Size is important

Allocate Size

Assignable range

A

B

C

D

E

F

G

H

I

J

L

M

N

O

P

Major Network 14.24.74.0/24

Available IP addresses in major networks: 254

Number of IP addresses required: 190

Around 81% of the available major network address space are used

Nearly 94% of subnetted address space is used

Name of the Subnet

Size is important

Allocate Size

Assignable range

A

B

C

## How do you place an order?

It takes a few steps to place an order with Us:

• The first step is to place your order. You will need to provide us with some basic information about your project.
• Once you have placed your order, you will be taken to our secure payment page.
• Once we receive your order, we will carefully review it and match you with a writer who has the skills and experience.
• Stay in contact with the writer and discuss vital details of research.
• Your completed proposal will be delivered via email within the specified deadline.

### You are secure when using our service

It's critical for each client to feel secure. As a result, we at Research Proposal Writing take precautions to secure your data.

Financial security You may securely pay for your purchase using a variety of secure payment methods.
Personal security The personal information of our clients is secure. Nobody else will have access to it.
Academic security We use a specialized program to check every completed paper to ensure that we deliver no-plagiarism samples.
Web security This website is safe from unauthorized breaches. We maintain our privacy management in line with the latest laws and regulations.