Network Management Assignment
Network Management Assignment
Q.6. Discuss the term subnet addressing, subnet mask with the help of an example.
Subnet Addressing and Subnet Mask: Explained with Example
Definition:
Subnet Addressing involves dividing a single large network into smaller, manageable
subnetworks (subnets). Each subnet operates as a separate network, with its own range of IP
addresses and subnet mask.
Subnet Mask is a 32-bit number used in conjunction with an IP address to divide the address
into network and host portions. It defines which portion of the IP address belongs to the
network and which portion belongs to the host.
Example:
Let's consider an organization with the following network details:
IP Address: 192.168.1.0
Subnet Mask: 255.255.255.0
Subnet Mask Interpretation:
Binary Representation:
IP Address: 11000000.10101000.00000001.00000000
Subnet Mask: 11111111.11111111.11111111.00000000
Subnet Mask Analysis:
The subnet mask consists of 24 bits set to 1 followed by 8 bits set to 0.
This indicates that the first 24 bits (or 3 octets) of the IP address belong to the
network portion, and the last 8 bits (or 1 octet) belong to the host portion.
Subnet Addressing:
Subnetting Process:
By using the subnet mask, the network administrator can divide the IP address range
into smaller subnets.
In this example, with a subnet mask of 255.255.255.0, the first three octets are
dedicated to the network, and the last octet is available for hosts.
Subnet Calculation:
The subnetting process involves borrowing bits from the host portion of the IP
address to create subnets.
For instance, if we borrow 3 bits from the host portion, we can create 2^3 = 8 subnets.
Subnet Address Example:
Original IP Address: 192.168.1.0 (Network Address)
Subnet Mask: 255.255.255.0
Subnetting:
Borrowing 3 bits for subnetting creates 8 subnets.
Each subnet will have a subnet mask with an additional bit set to 1, such as
255.255.255.128.
Subnet Addresses:
Subnet 1: 192.168.1.0/25
Subnet 2: 192.168.1.128/25
Subnet 3: 192.168.1.0/26
Subnet 4: 192.168.1.64/26
Subnet 5: 192.168.1.128/26
Subnet 6: 192.168.1.192/26
Subnet 7: 192.168.1.0/27
Subnet 8: 192.168.1.32/27
Summary:
Subnet Addressing involves dividing a network into smaller subnetworks to improve
efficiency and security.
Subnet Mask defines the division between network and host portions of an IP address.
Using an example with IP address 192.168.1.0 and subnet mask 255.255.255.0, we
demonstrated how subnetting works to create multiple subnets and their respective subnet
addresses.
Subnetting allows organizations to efficiently manage their network resources by logically
segmenting the network into smaller units, improving security, and optimizing network performance.
Q.7. Illustrate the significance of layered architecture? Explain the OSI layered architecture with a
neat sketch.
Significance of Layered Architecture
Layered architecture in networking refers to organizing the functionality of a network into distinct
layers, with each layer responsible for specific tasks. This approach offers several benefits:
1. Modularity: Layers can be developed, tested, and modified independently, promoting
modular design and easier maintenance.
2. Abstraction: Each layer hides the complexities of lower layers, allowing developers to focus
on specific functionalities without needing to understand the entire system.
3. Interoperability: Clear interfaces between layers facilitate interoperability between different
systems and vendors, enabling components to work together seamlessly.
4. Scalability: Layers can be added or modified to accommodate changes in technology or
network requirements, providing scalability and flexibility.
5. Fault Isolation: Problems in one layer typically do not affect other layers, making it easier to
identify and isolate faults for troubleshooting.
6. Standardization: Layered architectures often adhere to standard protocols and interfaces,
promoting compatibility and ease of integration.
OSI Layered Architecture
The OSI (Open Systems Interconnection) model is a conceptual framework that defines the functions
of a networking system. It consists of seven layers, each responsible for specific tasks. Here's an
overview of each layer:
1. Physical Layer (Layer 1):
Responsible for transmitting raw data bits over a physical medium.
Concerned with characteristics such as voltage levels, cable types, and data rates.
2. Data Link Layer (Layer 2):
Handles the reliable transmission of data frames between adjacent nodes on the same
network segment.
Provides error detection and correction, as well as flow control.
3. Network Layer (Layer 3):
Manages the routing of data packets between different networks.
Determines the optimal path for packet delivery and handles addressing and logical
network topology.
4. Transport Layer (Layer 4):
Ensures end-to-end reliable data delivery between hosts.
Provides mechanisms for segmentation, error recovery, flow control, and reassembly
of data.
5. Session Layer (Layer 5):
Establishes, maintains, and terminates connections between applications.
Manages session synchronization, checkpointing, and recovery.
6. Presentation Layer (Layer 6):
Translates, encrypts, or compresses data to be exchanged between different formats or
encodings.
Handles data compression, encryption, and data format conversions.
7. Application Layer (Layer 7):
Provides network services directly to end-user applications.
Supports user-facing functionalities such as email, file transfer, and web browsing.
Assignment 4
Q.1. What will be the administrative distance of OSPF route?
The administrative distance of OSPF routes is typically 110.
Administrative distance (AD) is a metric used by routers to determine the trustworthiness of routing
information received from various sources. Lower values indicate more reliable or preferred routes. In
OSPF, the administrative distance is set to 110 by default. This means that OSPF routes are considered
more trustworthy than routes learned from other routing protocols like RIP (120) or EIGRP (90).
Q.6. Explain the different error reporting messages and query messages of ICMP.
ICMP (Internet Control Message Protocol) includes various error reporting messages and query
messages used for communication between network devices. These messages help diagnose and
troubleshoot network issues. Here are the main types:
Error Reporting Messages:
1. Destination Unreachable (Type 3):
Indicates that a packet cannot be delivered to its intended destination.
Subcodes specify the reason for the unreachable condition (e.g., network unreachable,
host unreachable, port unreachable).
2. Source Quench (Type 4):
Sent by routers to inform the sender to reduce the rate of packets being sent.
Helps prevent network congestion by throttling the flow of traffic.
3. Time Exceeded (Type 11):
Indicates that a packet has exceeded its time-to-live (TTL) or hop limit.
Generated by routers when TTL reaches zero or when a fragment's TTL expires
during reassembly.
4. Parameter Problem (Type 12):
Indicates a problem with the header or parameters of an IP packet.
Includes an ICMP pointer field to specify the location of the error within the packet.
Query Messages:
1. Echo Request (Type 8) / Echo Reply (Type 0):
Used for diagnostic purposes to check if a host is reachable and measure round-trip
time (ping).
Echo request is sent by a sender, and the recipient responds with an echo reply
containing the same data.
2. Timestamp Request (Type 13) / Timestamp Reply (Type 14):
Used to request and provide timestamps from a recipient.
The sender includes its timestamp in the request, and the recipient echoes it back in
the reply.
3. Information Request (Type 15) / Information Reply (Type 16):
Deprecated message types historically used to request and provide information about
a host.
Replaced by more secure alternatives due to security concerns.
4. Address Mask Request (Type 17) / Address Mask Reply (Type 18):
Used to request and provide subnet masks of a recipient.
The sender includes its IP address in the request, and the recipient replies with its
subnet mask.
These ICMP messages play a vital role in network troubleshooting and diagnostics, allowing network
devices to communicate information about network conditions, error conditions, and diagnostic
results. They help network administrators identify and resolve issues to ensure the efficient operation
of IP networks.