This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions. The questions contain numerical as well as descriptive questions covering the material up to Week 6.
The questions are designed to help you to achieve the unit learning outcomes as listed in the unit profile.
Instructions
You must do this assignment on your own – it is not a group assignment.
Type all your answers in the ‘Template for Your Answers’ Section of this document and upload only that template. You could do that by copying the Template section into a new Word document for uploading. Answers that are not typed into the “Template for Your Answers” section may not be marked, or may be returned to you for re-typing and re-submission – late penalties will apply.
Where instructed, you must show the steps you took to arrive at your answers. Write your answers in your own words to avoid potential plagiarism and copyright violations.
You must submit the Answer section as a Word file (.doc or .docx). Do not submit PDF’s or any other type of file without express permission from the Unit Coordinator.
Plagiarism Procedures can be found in the CQUniversity Policies section of the Unit Profile.
There are 3 main questions with some sub-questions and the requirements are stated for each one. You must answer all questions and their sub-questions. Marks are indicated in the Answer Template.
The questions will be marked on correctness, logic and clarity, and addressing all parts of the question.
The Assignment Questions begin on the next page.
USE THE PROVIDED TEMPLATE ON P.4 FOR ALL YOUR ANSWERS.
Question 1 – Address usage (3 marks)
Consider the following classless address block:
154.78.177.3/27
List the addresses from this block that would be used as:
Show the steps you took to arrive at your answers.
Question 2– Allocating subnets from a block (8 marks)
A company has been granted a block of addresses which includes the address 138.77.216.5/24. Answer the following questions, showing your calculations.
Question 3 – Network Tools (Windows) (4 marks)
Often the best way to gain an initial familiarity with network tools is to simply use them, at a basic level in exploratory mode as suggested in some of the tutorial exercises. Netstat and Tracert are included in Windows, while Wireshark is free to download and install. Explore Wireshark, Netstat and Tracert, then complete this question.
Active Connections
Proto Local Address Foreign Address State PID
TCP 10.0.0.58:139 0.0.0.0:0 LISTENING
TCP 10.0.0.58:5040 0.0.0.0:0 LISTENING 7480
TCP 10.0.0.118:139 0.0.0.0:0 LISTENING 4
TCP 10.0.0.118:52450 52.63.165.133:443 ESTABLISHED 14080
TCP 10.0.0.118:52458 104.116.191.195:443 CLOSE_WAIT 8912
TCP 10.0.0.118:52791 40.100.151.2:443 ESTABLISHED 22400
TCP 10.0.0.118:52811 162.125.34.129:443 ESTABLISHED 4696
TCP 10.0.0.118:52820 34.232.224.128:443 CLOSE_WAIT 4696
TCP 10.0.0.118:52879 162.125.34.129:443 ESTABLISHED 4696
Do a TRACERT on your computer to www.google.com. Paste the output to your assignment answer template and discuss the information being displayed (1 mark)
TEMPLATE FOR YOUR ANSWERS
Type your answers in this section in the spaces provided
First Name:_________________________ Last Name:_________________________
Student ID: __________________________
Question Number |
Mark allocated |
Mark earned |
|||||||||||||||||||||||||||||
Question 1: (3 marks) |
3 |
||||||||||||||||||||||||||||||
a) b) c) |
Address Block Given – 154.78.177.3 /27 Binary representation of the address 10011010.01001110.10110001.000 00011 Netmask /27 = 255.255.255.224 Binary representation of the subnet mask 11111111.11111111.11111111.111 00000 Network address 154.78.177.0 Binary representation = 10011010.01001110.10110001.000 00000 Broadcast address: 154.78.177.31 Binary representation 10011010.01001110.10110001.000 11111 The network address for the given block of IP address is 154.78.177.0 /27 The broadcast address of the given address block is 154.78.177.31 The range of host address available for the address block is given below: 154.78.177.1 to 154.78.177.30 |
1 mark each item, total 3 |
|||||||||||||||||||||||||||||
Question 2: (8 marks) |
8 |
||||||||||||||||||||||||||||||
a) |
Address block – 138.77.216.5 /24 The network address identified for the given block of address is 138.77.216.0 /24 The number of hoist that can be assigned with the IP address for the given address block is 256. |
1 |
|||||||||||||||||||||||||||||
b) |
|
6 |
|||||||||||||||||||||||||||||
c) |
The addition of new subnet with 1024 new host in the network is not possible utilizing the network address 138.77.216.0 /24 this is because the subnet can support 254 of usable IP address but the current network consist of 6 subnet and 244 address are consumed by the subnet and only 128 address are left in the network. |
1 |
|||||||||||||||||||||||||||||
Question 3: (4 marks) |
4 |
||||||||||||||||||||||||||||||
a) i) ii) iii) iv) |
There are 3 horizontal columns in the wireshark interface and they are named as packet list, packet details and the packet byte pane. The first panel shows the captured packets from the network and the second panel shows the details of the captured packet that is selected in the packet list pane. The last pane contains the hex details demonstrated in 16 hexadecimal bytes. The given wireshark .pcap packet is analysed for the identification of the IP address and the brand of computer that was used for capturing the packets. The identified brand is Helwett and the IP address of the computer is 138.77.216.88. The brand information is get from the Ethernet II option and the IP address is got from the internet protocol version 4 option in the packet detaisl pane. Frame 4 – Send hello message from client – server with a header file containing IP version, methodology of compression, certificate request, cipher suite and session ID. Frame 5 – Verification of the client certificate Frame 6 – hello message done is sent for establishment of the connection The flow of the information in the network is identified and it helps the network administrator to troubleshoot the different connectivity issues of the network. The network administrator can also find the source of abnormal traffic generation for securing the network from distributed denial of service attacks. |
.5 mark each item, total 2 for 3a. |
|||||||||||||||||||||||||||||
b) |
From the output of the ‘NETSTAT –aon’ command’s output it has been found that the active connections are listed with the headings Proto, Local Address, Foreign Address, State and the PID. The proto column lists the protocols used for transmission of the data packets in the network and it may be TCP for the connection oriented connection and UDP for the connection less transmission. The IP address of the local host is listed in the Local address columns and the address of the destination host is listed on the Foreign Address column. The state column defines the state of the connection and PID column lists the process ID for the active connection in the network. There are different states of a connection and it can be LISTENING, ESTABLISHED or CLOSE_WAIT. LISTENING is used for the open connection that is able to accept the inbound connection sin the network. The CLOSE_WAIT state is for the connections that have already closed the connection and terminated. The ESTABLISHED state is for active connection that is able to exchange data traffic between in the network. |
1 |
|||||||||||||||||||||||||||||
c) |
The IP address of the targeted host can be identified using the tracert command. The number of hops used for reaching the destination address can be determined using the tracert command and it is 7 hops and the address of the destination host is 216.52.203.164. |
1 |
|||||||||||||||||||||||||||||
Total marks awarded |
15 (max) |
||||||||||||||||||||||||||||||
Less late penalties if applicable |
|||||||||||||||||||||||||||||||
Less plagiarism penalties if applicable |
|||||||||||||||||||||||||||||||
Total marks earned |
Markers comments:
References
Bhatia, R., Hao, F., Kodialam, M., & Lakshman, T. V. (2015, April). Optimized network traffic engineering using segment routing. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 657-665). IEEE.
Medhi, D., & Ramasamy, K. (2017). Network routing: algorithms, protocols, and architectures. Morgan Kaufmann.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download