Okay 4.0
Okay 4.0
Okay 4.0
(ii) On a VLSM network, which is the most optimal subnet mask that should be
used on point-to-point WAN links in order to reduce the waste of IP
addresses? Justify your choice.
/30 or subnet mask 255.255.255.252
(iii)Compute the number of subnets and host which can be provided by the
network address 172.16.0.0/19.
This is class B network (16 bits for network)
Extended bits to reach 19 is 3 (19-16=3)
Number of subnets= 23
Number bits reserved for hosts=32-19=13
Number of host =213-2=8190
8 subnets, 8,190 hosts each
(3 for derivation and 1 for the answer)
(iv) Briefly explain the AIMD approach of TCP congestion control.
Additive increase
increase sending rate by 1 maximum segment size every RTT until loss
detected
Multiplicative decrease
sending rate is
Cut in half on loss detected by triple duplicate ACK (TCP Reno)
Cut to 1 MSS (maximum segment size) when loss detected by timeout
(ii) By using the table for block sizes and chart that starts with highest block
size subnet, and by showing all the steps subnet the given network into
department networks and WAN links.
We start with a block with the requirements of many hosts; in this case
the Production department.
a. This is subnetting of class C address; 196.210.10.0/24
b. For class C, subnetting is for fourth octet
c. 70 Hosts for Production department,
d. Minimum number bits required for hosts=7
e. We can only have borrow 1(8-7) bit form host part for the network
f. The subnet mask will be /25 or 255.255.255.128.
g. Block size will be 128.
h. Reserved network block=196.210.10.0-196.210.10.127
i. Remaining block for other departments=196.201.10.128/25
______________________________________________________________
___________________________________________________________
Last we subnet the IP address with /30 to get network IDs for WAN links
connecting the departments.
a. With / 30, we borrow 30 bits from the host part.
b. The subnet number will be 252.
c. The block size will be 256 - 252 = 4.
Page 3 of 7
Receiver controls sender, so sender won’t overflow receiver’s buffer by
transmitting too much, too fast
TCP receiver “advertises” free buffer space in rwnd field in TCP header
• RcvBuffer size set via socket options (typical default is 4096
bytes)
• many operating systems autoadjust RcvBuffer
sender limits amount of unACKed (“in-flight”) data to received rwnd
guarantees receive buffer will not overflow
Field:
Receive Window size
(v) Which among the elements of network management is responsible for control
of user access to network resources through charges.
Accounting Management
(vi) Summarise the application of SNMP traps used in devices such as routers and
network switches.
SNMP Traps are the alert messages sent from a remote SNMP-enabled
device (an agent) to a central collector, the “SNMP manager reporting an event
occurred in an agent.” For instance, a Trap might report an event of overheating
in a machine
(b) Figure 1 represent an enterprise network spread across three building, each
building with one router and an ethernet switch connecting users in different
departments. The company has been given a network 192.168.55.0. Design the
optimal IP plan and allocate optimal subnetworks for all LANs and routers
interconnection. The remaining IPs should be reserved for future uses.
We start with a block with the requirements of many hosts; in this case
the 90 hosts.
Page 4 of 7
a. This is subnetting of class C address; 192.168.55.0/24
b. For class C, subnetting is for fourth octet
c. For 90 hosts, Minimum number bits required for hosts=7
d. We can only have borrow 1(8-7) bit form host part for the network
e. The subnet mask will be /25 or 255.255.255.128.
f. Block size will be 128.
g. Reserved network block=192.168.55.0-192.168.55.127
h. Any usable IPs(except first and last) can be allocated to router
interface
i. Remaining block for other departments=192.168.55.128/25
______________________________________________________________
3(a (i) You are given the IP Address of 193.103.20.0 /24 and need 50 Subnets.
) Derive the number of hosts per network, and totalnumber of networks that
will be obtained once subnetted?
50 subnets, needs atleast 6 extra network bits
Remaining bits for hosts will be (8-6)=2
Number of Hosts=22-2=2
Number of Networks=26=64
Closing a connection:
client closes socket:clientSocket.close();
Step 1: client end system sends TCP FIN control segment to server
Step 2: server receives FIN, replies with ACK. Closes connection, sends FIN.
Step 3: client receives FIN, replies with ACK.
• Enters “timed wait” - will respond with ACK to received FINs
Step 4: server, receives ACK. Connection closed.
Note: with small modification, can handle simultaneous FINs.
(iii)Name and explain the role of two basic parts that makes the URLs.
Protocol (Transport protocol) and the domain name (Network the server is
hosted)
4(a (i) Your company has been given the IP Address of 199.2.1.0 /24. You plan to
) put each of the 5 floors in your building on its own subnet. Derive the IP
ranges of for each flow and reserved one if exists.
Page 7 of 7
Figure 2: TCP Segment
Page 8 of 7
SNMPv1=Defines limited, easily implementable MIB
Limited functionally, lack of security
(iv) Explain the meaning and give the fundamental difference between POP3,
SMTP and IMAP.
POP3
Post Office Protocol
Standard email protocol, used to receive email from remote server.
Emails are downloaded to local computer and removed from server.
Does not allow email access from multiple clients since the email is removed
from server.
IMAP
Protocol used to access email from the server.
Allows simultaneous access my multiple clients
SMTP is a
Simple mail transfer Protocol, used for sending email message between end user
and Mail Server or server and server.
SMTP is push protocol.
application
Page 9 of 7
5(a (i) You are given a challenge to subnet the Address 150.20.0.0 into networks
) supporting 500 hosts each. What will be a subnet mask and the IP Address
Range of the first Network?
(ii) Briefly explain the circumstances that will make UDP preferred to TCP?
When latency or delay can not be tolerated at all, eg: real time applications
like voice conferencing etc
(iii)Briefly explain the meaning of reliable data transfer characteristic of TCP and
mechanism used by the reliable data trensfer protocol to detect and deal with
erronious channels and packet loss.
(iv) With the help of diagram, distinguish in between the various components of
SNMP protocol stack. In particular include all layers included at both ends
Page 10 of 7
and across the network.
(v) In Figure 3, Switches A, B, and C are trunked together and have been
properly configured for VTP. Switch C receives VLAN information from the
VTP server Switch A, but Switch B does not receive any VLAN information.
What is the most probable cause of this behaviour?
Figure 3: LAN
6 (i) Subnet the IP Address 210.30.12.0, so there are 60 Hosts in each network.
What are the Broadcast Addresses of each Network?
(iii)With the help of diagram, mention and explain the transport layer services
and protocols used.
Page 11 of 7
(iv) Briefly explain how multiplexing and de-multiplexing works as far as
transport layer services are concerned.
application
Page 12 of 7
(ii) Derive an optimal IP plan, and allocate the subnets to the three subsections.
Given network is 192.168.10.0/24
Programmers:8
Analyst : 6
Managers: 3
The optimal IP plan should accommodate the largest # of users, 8 in this case.
Minimum number of bits will be 4. (not 3 because usable Ips will be 6)
4 bits can be used to extend network bits, and a total of 16 subnetworks can be
obtained
Network bits will be 28 or /28 or 255.255.255.240
Subnetworks will be
192.168.10.0/28 for Programmers
192.168.10.16/28 for Analyst
192.168.10.32/28 for Managers
Page 13 of 7
■ S2# configure terminal - To enter global
configuration mode
■ S2(config) # vlan VLAN 2 – To configure S2 with
Vlan for programmers
■ S2 (config-vlan) # name programmers
■ S1 # exit
○ To assign vlan 2 to switch ports (let’s assume they are
assigned to ports fa0/0 to fa0/1)
■ S2# configure terminal
■ S2(config) # interface fa0/0 – fa0/1
■ S1(config-f)# switchport access vlan VLAN 2
_____________________________________________________
___________________________________________________
(iv) Write commands to show which switch ports have been added to each of the
VLAN created.
Page 15 of 7