NET 256 Assignment
NET 256 Assignment
Name: ________________________________
ID: ________________________________
Instructions:
a. Answer all the questions
b. Answers should be paraphrased with your own words
c. Copy answers are not accepted
d. Answers should be related to the question
e. Due Date: Saturday, April 15, 2023
f. Late submission will lose 25% of the total grade of the assignment
g. References:
1. Slides and Additional resources posted on BlackBoard
2. Selected readings of the textbook
h. Reference external resources
Intranet: It’s a private network owned and controlled by specific organization. And it’s not allowed
for any one to entre the network without valid password and username. Also it is a tool for sharing
information throughout the organization.
Extranet is owned by either a single or a many organization. is a tool for sharing information
between the internal members and external members.
2. Consider sending a packet from a source host to a destination host over a fixed route. List the delay
components in the end-to-end delay with a brief explanation of each. Which of these delays are
constant and which are variable?
computer network models are responsible for establishing a connection among the sender and
receiver and transmitting the data in a smooth manner respectively. There are two computer
network models. OSI Model and TCP/IP Model on which the whole data communication process
relies.
OSI stands for “Open System Interconnection” .OSI model having a layered architecture, allows
easy data communication as each layer has predefined structured and functionalities. It Consists of
7 layers:
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
TCP/IP stands for Transmission Control Protocol with the help of which, protocol implementation over
the network can be achieved. The TCP/IP model also has a layered architecture which allows easy data
communication along with the facility of integrating multiple protocols. The layout remains similar to
OSI Model but the number of layer, their functionalities and properties got changed.
2. Recall that TCP can be enhanced with TLS to provide process-to-process security services,
including encryption. Does TLS operate at the transport layer or the application layer? If the
application developer wants TCP to be enhanced with TLS, what does the developer have to do?
SSL operates at the application layer. The SSL socket takes unencrypted data from the application
layer, encrypts it and then passes it to the TCP socket. If the application developer wants TCP to be
enhanced with SSL, she has to include the SSL code in the application.
2. Suppose Client X initiates a SSH session with Server Z. At about the same time, Client Y also
initiates a SSH session with Server Z. Provide possible source and destination port numbers for the
below segments, assuming that port number 1905 is assigned to the client process on Client X, and
port number 3011 is assigned to the client process on Client Y.
Note: SSH service is accessible on port 22
e. If X and Y are different hosts, is it possible that the source port number in the segments
from X to Z is the same as that from Y to Z? Explain.
Yes, they are different hosts so there is no relation between there port number
f. If X and Y are Same hosts, is it possible that the source port number in the segments from
X to Z is the same as that from Y to Z? Explain.
No, once the port number taken by protocol, no one can use it . it called
c. When a large datagram is fragmented into multiple smaller datagrams, where are these
smaller datagrams reassembled? Explain.
Datagrams are reassembled at the destination, before being passed to the transport layer.
Determine the next hop/outgoing interface for each of those packets. Destination 1 is solved for
you as an example. Complete a similar table as below for Destinations 2, 3 and 4, showing and
verifying your worked answers in the space below.
There is no matching with any route, so the packet will pass through the default route using router 2
The first 22 bit mean that the ip is 145.46.52.0/22, so there is no matching with any ip so it pass through
the default route
Route 3 has subnet mask /22 that means it has 1024 IP, so the IP 170.53.40.7/24 can be reached through
route 3 using router 1
Route 3 matched with the destination with the first 24 bit
The first 24 bit mean that the ip is 176.53.40.0/24 so there is matching with the route 3 ip so it pass
through route 3
Route 1 has subnet mask /21 so it has 2048 IP not including the destination
Router 2 has subnet mask /20 so it has 4096 IP not including the destination
There is no matching with any route, so the packet will pass through the default route using router 2
The first 21 bit mean that the ip is 170.46.64.0/21 so there is no matching with any route, so it
pass through the default route using router 2.