Charles Sturt University: Internetworking With Tcp/Ip
Charles Sturt University: Internetworking With Tcp/Ip
UNIVERSITY
INTERNETWORKING WITH TCP/IP
Sydney Australia
April – 2010
ASSIGNMENT 1
Question 1:
In order to note what are the advantages that packet switched offers to data
communication and circuit switched not, it is need to know what circuit and
packet switched are; also it is need to know how they works.
In circuit switched the connection between the sender and receiver is set up in
advance as well as the path (Uruth, N.D.). This path is decided by taking into
account different elements such as algorithms which are used for optimizing the
use of resources. One of these resources could be bandwidth ( Kozierok.2005).
There could be more than one possible path; however, only one route will be
used from the beginning to the end of the connection.
Question 2:
c) What is the network and the broadcast address of the subnet the
specific host belongs to?
0 0 0 1 0 0 0 1 . 1 1 0 1 0 1 0 0 . 0 1 0 1 1 0 0 1 . 0 1 1 0 1 1 1 1
1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 0 0 . 0 0 0 0 0 0 0 0
0 0 0 1 0 0 0 1 . 1 1 0 1 0 1 0 0 . 0 1 0 1 1 0 0 0 . 0 0 0 0 0 0 0 0
Question 3:
Consider the diagram below. Which of the two central routers (R1) and
(R2) is more critical for network operations and why?
Based in the diagram, we should consider both routers as critical to perform
routing operations such as task to determinate the best path to send an
incoming packet based on a routing table that contains the mapping from the
network and host address that is made using routing algorithms (Fairhust. 2001)
(Martin. 2002)). The reason is because through R1 and R2 any hot that is located
inside the network is able to reach other host in the networks N1, N2, N3, N4, N5
and N6. However, through R1 any packet is able to access more networks such
as N1 can be reached by using router A, N2 can be reached by using router B, N3
can be reached by using router C, N4 can be reached by using router D and N5
can be reached by using routers C and E; however through R2 N3 can be
reached by using routers E and C, N4 can be reached by using router D, N5 can
be reached by using router E and N6 can be reached by using router F. So, in
terms of accessibility the router R1 is more critical than R2.
Question 4:
As it was explained in the question one the packets are fragmented in order to
make the packets more manageable. This process could happen more than once
depends on the routers and their capacities. Once all the packets are arrived to
the destination, they are reassembled (Hampton, Donahue, Castanho. 2001).
This is one of the reasons because the reassembly is done at the destination.
According to Uruth the packets could choose different routes or paths in order to
get the destination node in the most efficient way. However this means that the
packets may arrive to the destination node in different order than they suppose
to be assembled. This problem affects more to voice or video than other kinds of
data such as e-mails (NetworkWorld, 2007). Other problem could be the loss of
certain data. However a protocol such as TCP/IP takes care of this concern.
Question 5:
Compare and Contrast DHCP and the ICMP messages that were
previously used for startup configuration. What are the advantages of
DHCP that caused to be the popular solution?
DHCP as well called as Dynamic Host Configuration Protocol is based on the
Bootstrap protocol BOOTP with an additional capability such as dynamic
allocation of network addresses that can be reusable (Droms. 1997). Unlike ICM
messages which are used to report different kind of errors in the process of the
datagram; this report is carried out between the router/host source (sender) and
router/host destination (receiver). This communication is possible by using the IP
support (Postel. 1981).
It is possible to note that the main purpose of these two protocols are totally
different however they need each other, because ICMP could not be able to send
any error message to any host if it does not have a valid IP address. In the same
way DHCP needs the services of ICMP messages in order to know if the assigned
IP addresses are working correctly or not.
The figure 3 and 4 show that ICMP message is much simple and has less number
of fields than DHCP message.
There are different types of error messages. These errors will be show in the
following figure
It is need to note that ICMP also has vulnerabilities. These vulnerabilities are:
The ICMP message could be used to produce a Denial of Service attack and Man
in the Middle attack. This is because to the lack of authentication field in the
message format (Streve and Perkins. 2010).
A fake error message reply could cause problems in the network by not providing
the services to the “unreachable address” (Streve and Perkins. 2010 ).
On the other hand DHCP as well hast its own advantages such as
• DHCP servers are able to decide which workstations can use dynamic
addresses according with their MAC addresses.
Corner, D. 2010. One Byte at a Time: Bootstrapping with BOOTP and DHCP.
Cisco Systems. Retrieved March 26, 2010 from:
www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_5-2/dhcp.html
Kozierok, C. 2005. Circuit Switching and Packet Switching Networks. The TCP/IP Guide.
Retrieved March23, 2010. From:
http://www.tcpipguide.com/free/t_CircuitSwitchingandPacketSwitchingNetworks.ht
m
Postel, J. 1981. Internet Control Message Protocol. Request for Comments 792.
Network Working Group. ISI. Retrieved March 25, 2010 from: http://www.rfc-
editor.org/rfc/rfc792.txt
Uruth, N. N.D. Circuit Switching Vs. Packet Switching. About.com:Voice Over IP.
Retrieved March 24, 2010 from:
http://voip.about.com/od/voipbasics/a/switchingtypes.htm