Last day of the OFFER FLAT 20% off & $20 sign up bonus Order Now

Last day of the offer FLAT 20% off & $20 sign up bonus

us

Free Resources

  • icon 75000+ Completed Assignments
  • icon 1500+ PhD Experts
  • icon 100+ Subjects we cater
  • icon 100% Secure Payment

CNT 4004 Computer Networks

Published : 28-Sep,2021  |  Views : 10

Questions:

1. Explain how a switch learns MAC addresses, and where a switch stores the address.

2. How does a layer 3 switch differ from a layer 2 switch?

3. Explain how a host knows whether a data packet was not received.

4. Your boss has read about IPv6 and wants to know whether the network you oversee is ready for the transition. Prepare a response based on the networking and computer operating systems used in your facility.

5. Your company is assigned a 206.206.155.0/24 CIDR block by your ISP. Your company consists of 5 different networks.

Network A: 50 users
Network B: 26 users
Network C: 12 users
Network D: 10 users

Your job is to create four subnets and allocate enough IP addresses for the users within the network. Document how you will do this.

Answers:

1. Explain how a switch learns MAC addresses, and where a switch stores the address.

Broadcast of frame cannot be achieved by a switch which is neither can be called as an action which is performed by switch. Flooding of frame can be easily achieved by the help of switch. Broadcast of a frame can be easily achieved by the help of switch which has MAC address and the particular port which the frame contains (Afanasyev, et al,.2014). In the matter of MAC address which is not present at the destination of MAC address after that frame is broken into ports which is generally make use of port.

2. How does a layer 3 switch differ from a layer 2 switch?

Traditional method at which switch works generally consist OSI model in this method switch models contains packets which generally works on the mode or principle of the destination of MAC address (Davies, 2012). The routine method generally operates on the known layer which the third one.  In this mechanism the hop IP which is present next to it are the one which totally works on the principle of IP address which situated next to the given layer (Jung & Kim, 2015).

3. Explain how a host knows whether a data packet was not received.

At the time of transfer of packet data from one point to another a dialogue is used which works between the TCP/ IP software of the system which is considered to be host. The received system is used so as to ensure that transfer of various files is successful. (Decusatis, Carranza & DeCusatis, 2012) In many cases it is seen whole file which is present at the TCP/ IP of the receiving message to the TCP/ IP of the system at host which will allow the system the particular packet which is missing. The process of receiving of packets continues until and unless it is fully received by receiver.

 4. Your boss has read about IPv6 and wants to know whether the network you oversee is ready for the transition. Prepare a response based on the networking and computer operating systems used in your facility.

Proper usage of IPv6 will result in elimination of NAT as the use of IPv6 will create platform where devices can easily have their own IP address (Decusatis, Carranza & DeCusatis, 2012). Various devices will create a platform where there can be easy management for sharing of files, and many other mechanisms which will result in avoidance of complex setting in the modem and routers. Security will also increase by making use of IPv6.     

5. Your company is assigned a 206.206.155.0/24 CIDR block by your ISP. Your company consists of 5 different networks.

Network A: 50 users
Network B: 26 users
Network C: 12 users
Network D: 10 users

Your job is to create four subnets and allocate enough IP addresses for the users within the network. Document how you will do this.

Subnet Name

Needed Size

Allocated Size

Address

Mask

Dec Mask

Assignable Range

Broadcast

Network A

50

62

206.206.155.0

/24

255.255.255.192

206.206.155.1 - 206.206.155.62

206.206.155.63

Network B

26

30

206.206.155.64

/25

255.255.255.224

206.206.155.65 - 206.206.155.94

206.206.155.95

Network C

12

14

206.206.155.96

/26

255.255.255.240

206.206.155.97 - 206.206.155.110

206.206.155.111

Network D

10

14

206.206.155.112

/27

255.255.255.240

206.206.155.113 - 206.206.155.126

206.206.155.127

References:

Afanasyev, A., Burke, J., Zhang, L., Claffy, K., Wang, L., Jacobson, V., ... & Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73.

Davies, J. (2012). Understanding ipv6. Pearson Education.

Decusatis, C. J. S., Carranza, A., & DeCusatis, C. M. (2012). Communication within clouds: open standards and proprietary protocols for data center networking. IEEE Communications Magazine, 50(9).

Jung, K., & Kim, J. (2015). All-fibre photonic signal generator for attosecond timing and ultralow-noise microwave. Scientific reports, 5, 16250.

Our Amazing Features

delivery

No missing deadline risk

No matter how close the deadline is, you will find quick solutions for your urgent assignments.

work

100% Plagiarism-free content

All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.

time

500+ subject matter experts

Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.

subject

Covers all subjects

We offer academic help services for a wide array of subjects.

price

Pocket-friendly rate

We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.

Not sure yet?

Get in touch with us or

get free price quote.

Get A Free Quote