0% found this document useful (0 votes)
10 views15 pages

Okay 4.0

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 15

1(a (i) Write down the IP address that an administrator can ping when testing the IP

) stack of the local host.


127.0.0.1

(ii) On a VLSM network, which is the most optimal subnet mask that should be
used on point-to-point WAN links in order to reduce the waste of IP
addresses? Justify your choice.
/30 or subnet mask 255.255.255.252
(iii)Compute the number of subnets and host which can be provided by the
network address 172.16.0.0/19.
This is class B network (16 bits for network)
Extended bits to reach 19 is 3 (19-16=3)
Number of subnets= 23
Number bits reserved for hosts=32-19=13
Number of host =213-2=8190
8 subnets, 8,190 hosts each
(3 for derivation and 1 for the answer)
(iv) Briefly explain the AIMD approach of TCP congestion control.

 AIMD (Additive increase, Multiplicative decrease )


approach:
senders canincrease sending rate until packet loss (congestion) occurs,
then decrease sending rate on loss event

Additive increase
 increase sending rate by 1 maximum segment size every RTT until loss
detected
Multiplicative decrease
 sending rate is
 Cut in half on loss detected by triple duplicate ACK (TCP Reno)
 Cut to 1 MSS (maximum segment size) when loss detected by timeout

(v) Brief explain the key elements of network management system.

Management station (Manager)-Central point , interface to human managing the


network Agent -agent SW sitting on the manageable network elemets
Network management protocol-link between station and agent
Management Information Base(MIB)-Representation of network resources as
objects
(b) Suppose you are contracted to design a subnetted network for an organization
with the following requirements:
a) The organization has three departments namely Production, Sales and
Administration.
b) Production has 70, Sales has 48 computers, and Administration 28
computers.
c) All departments are interconnected via WAN links.
Page 1 of 7
d) The organization purchased a public IP address of 196.210.10.0/24 from
an ISP.
Having knowledge of Variable Length Subnetting and IP addressing, perform
each of the following tasks to fulfil an organization setup and requirements:
(i) Sketch the organizational network topology that connects all of the three
mentioned departments.

(ii) By using the table for block sizes and chart that starts with highest block
size subnet, and by showing all the steps subnet the given network into
department networks and WAN links.

We start with a block with the requirements of many hosts; in this case
the Production department.
a. This is subnetting of class C address; 196.210.10.0/24
b. For class C, subnetting is for fourth octet
c. 70 Hosts for Production department,
d. Minimum number bits required for hosts=7
e. We can only have borrow 1(8-7) bit form host part for the network
f. The subnet mask will be /25 or 255.255.255.128.
g. Block size will be 128.
h. Reserved network block=196.210.10.0-196.210.10.127
i. Remaining block for other departments=196.201.10.128/25

______________________________________________________________

Next we subnet IP by creating Subnets for Sales


(i) 48 Hosts for Production department,
(ii) Minimum number bits required for hosts=6
(iii)We can only have borrow 1(7-6) extra bit from remaining block host part
for the network
(iv) The subnet mask will be /26 or 255.255.255.192.
(v) Block size will be 64.
(vi) Reserved network block=196.210.10.128-192.210.10.191
(vii) Remaining block for other department=196.201.10.192/26
___________________________________________________

Then we subnet the Production department subnet.


(i) 28 Hosts for Production department,
(ii) Minimum number bits required for hosts=5
We can only have borrow 1(6-5) extra bit from remaining block host part
Page 2 of 7
for the network
(iii)The subnet mask will be /27 or 255.255.255.224.
(iv) Block size will be 32.
(v) Reserved network block=196.210.10.192-192.210.10.223
(vi) Remaining block for other Uses=196.201.10.224/26

___________________________________________________________

Last we subnet the IP address with /30 to get network IDs for WAN links
connecting the departments.
a. With / 30, we borrow 30 bits from the host part.
b. The subnet number will be 252.
c. The block size will be 256 - 252 = 4.

Department Subnet Subnet number Block size

Production /25 128 128

Sales /26 192 64

Administratio /27 224 32


n

WAN Links /30 252 4


2(a (i) Which two of the following statements describe the IP address 10.16.3.65/23?
) a. The subnet address is 10.16.3.0 255.255.254.0.
b. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
c. The last valid host address in the subnet is 10.16.2.254
255.255.254.0.
d. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
(b) and (d)
(ii) Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which
of the following can be valid host IDs on the LAN interface attached to the
router?
a. 172.16.1.100
b. 172.16.1.198
c. 172.16.2.255
d. 172.16.3.0
© and (d)
(iii)Mention two transport-layer protocols which can be used to facilitate
communication with a DNS server and a Web server on your UNIX system.
TCP and UDP
(iv) Briefly explain the circumstances a TCP flow control will be triggered, and
mechanism the TCP take as flow control. Mention the field in the TCP header
responsible for flow control.
Flow control is triggered when
Network layer delivers data faster than application layer removes data from
socket buffers?
Mechanism

Page 3 of 7
Receiver controls sender, so sender won’t overflow receiver’s buffer by
transmitting too much, too fast

 TCP receiver “advertises” free buffer space in rwnd field in TCP header
• RcvBuffer size set via socket options (typical default is 4096
bytes)
• many operating systems autoadjust RcvBuffer
 sender limits amount of unACKed (“in-flight”) data to received rwnd
 guarantees receive buffer will not overflow
Field:
Receive Window size

(v) Which among the elements of network management is responsible for control
of user access to network resources through charges.
Accounting Management
(vi) Summarise the application of SNMP traps used in devices such as routers and
network switches.
SNMP Traps are the alert messages sent from a remote SNMP-enabled
device (an agent) to a central collector, the “SNMP manager reporting an event
occurred in an agent.” For instance, a Trap might report an event of overheating
in a machine

(b) Figure 1 represent an enterprise network spread across three building, each
building with one router and an ethernet switch connecting users in different
departments. The company has been given a network 192.168.55.0. Design the
optimal IP plan and allocate optimal subnetworks for all LANs and routers
interconnection. The remaining IPs should be reserved for future uses.

Figure 1: Campus Network

Same approach as scenario Question #2

We start with a block with the requirements of many hosts; in this case
the 90 hosts.
Page 4 of 7
a. This is subnetting of class C address; 192.168.55.0/24
b. For class C, subnetting is for fourth octet
c. For 90 hosts, Minimum number bits required for hosts=7
d. We can only have borrow 1(8-7) bit form host part for the network
e. The subnet mask will be /25 or 255.255.255.128.
f. Block size will be 128.
g. Reserved network block=192.168.55.0-192.168.55.127
h. Any usable IPs(except first and last) can be allocated to router
interface
i. Remaining block for other departments=192.168.55.128/25

______________________________________________________________

Next network with 23 hosts


(i) Minimum number bits required for hosts=5
(ii) We can only have borrow 2(7-5) extra bit from remaining block host part
for the network
(iii)The subnet mask will be /27 or 255.255.255.224.
(iv) Block size will be 32.
(v) Reserved network block=192.168.55.128-192.168.55.159
(vi) Remaining blocks for other usage=192.168.55.160/27,
192.168.55.192/27
192.168.55.226/27
___________________________________________________

Next network with 7 hosts


(i) Minimum number bits required for hosts=3
(ii) We can only have borrow 2(5-3) extra bit from remaining block host part
for the network
(iii)The subnet mask will be /29 or 255.255.255.248.
(iv) Block size will be 8.
(v) Pick the first remaining reserved blocks (192.168.55.160/27) and subnet
it further.
(vi) Reserved network block=192.168.55.160-192.168.55.167
(vii) Remaining blocks for other usage=192.168.55.168/29,
192.168.55.176/29, 192.168.55.184/29
These can be used for P2P links between routers
Note: The choise of which block to reserve (first or second or last ) is planner’s
cjoice, its just best practice to start with first.

3(a (i) You are given the IP Address of 193.103.20.0 /24 and need 50 Subnets.
) Derive the number of hosts per network, and totalnumber of networks that
will be obtained once subnetted?
50 subnets, needs atleast 6 extra network bits
Remaining bits for hosts will be (8-6)=2
Number of Hosts=22-2=2
Number of Networks=26=64

2 Hosts and 64 Subnets


Page 5 of 7
(ii) What information is used by TCP to reassemble and reorder received
segments.
Sequence numbers
(iii)Explain the role of two flags in the TCP header are used in a TCP three-way
handshake to establish connectivity between two network devices?
SYN and ACK
(iv) With the help of diagram, explain the mechanism on how TCP manages
connection establishment and termination.

TCP Connection Management


Three way handshake:
Step 1: client host sends TCP SYN segment to server
• specifies initial seq #
• no data
Step 2: server host receives SYN, replies with SYNACK segment
• server allocates buffers
• specifies server initial seq. #
Step 3: client receives SYNACK, replies with ACK segment, which may contain
data

Closing a connection:
client closes socket:clientSocket.close();
Step 1: client end system sends TCP FIN control segment to server
Step 2: server receives FIN, replies with ACK. Closes connection, sends FIN.
Step 3: client receives FIN, replies with ACK.
• Enters “timed wait” - will respond with ACK to received FINs
Step 4: server, receives ACK. Connection closed.
Note: with small modification, can handle simultaneous FINs.

(v) Briefly explain the key element of network management.


One should provide brief explanation of the following
 Fault Management
 Configuration management
Page 6 of 7
 Performance management
 Accounting management
 Security Management
(b) (i) A network manager has requested that several new VLANs (VLAN 10, 20,
and 30) are allowed to traverse the switch trunk interface. After the command
“switchport trunk allowed VLANs 10,20,30″ is issued, all other existing
VLANs no longer pass traffic over the trunk. Explain the root cause of the
problem and a way to resolve it.

This command replaced all existing VLANs, he should alternatively used


switchport trunk allowed VLANs add 10,20,30
(ii) In switching network, tagging is the mechanism used to identify traffic
traversing the network. Identify and explain two types of traffic that are
always transmitted as untagged frames and give the reason for them not to be
tagged.
traffic that is assigned to the default VLAN
traffic that is assigned to the native VLAN

(iii)Name and explain the role of two basic parts that makes the URLs.

Protocol (Transport protocol) and the domain name (Network the server is
hosted)
4(a (i) Your company has been given the IP Address of 199.2.1.0 /24. You plan to
) put each of the 5 floors in your building on its own subnet. Derive the IP
ranges of for each flow and reserved one if exists.

Required number of Networks=5


Minimum number of extra network bits =3
Subnet Mask will be /27 or 255.255.255.224
Subnets will be
199.2.1.0/27. (199.2.1.0-199.2.1.31)
199.2.1.32/27. (199.2.1.32-199.2.1.63)
199.2.1.64/27. (199.2.1.64-199.2.1.95)
199.2.1.96/27 (199.2.1.96-199.2.1.127)
199.2.1.128/27. (199.2.1.128-199.2.1.159)
199.2.1.160/27, 199.2.1.192/27, 199.2.1.224/27. Will be reserved
(ii) Figure 2 represent fields of a TCP segment. Brief explain the role of each of
them as grouped by the arrows.

Page 7 of 7
Figure 2: TCP Segment

(iii)Explain the evolution of SNMP, while clearly indicating the fundamental


improvement from one version to another.

Page 8 of 7
SNMPv1=Defines limited, easily implementable MIB
Limited functionally, lack of security

SNMPv2=Each player maintains a local MIB, structure defined in standard


At least one system responsible for management (centralized or
distributed), lack of security

SNMP V3=Addresses security issues of SNMP v2 (access control,


authentication etc)

(iv) Explain the meaning and give the fundamental difference between POP3,
SMTP and IMAP.

POP3
Post Office Protocol
Standard email protocol, used to receive email from remote server.
Emails are downloaded to local computer and removed from server.
Does not allow email access from multiple clients since the email is removed
from server.

IMAP
Protocol used to access email from the server.
Allows simultaneous access my multiple clients

SMTP is a
Simple mail transfer Protocol, used for sending email message between end user
and Mail Server or server and server.
SMTP is push protocol.

(v) Briefly explain how multiplexing and de-multiplexing works as far as


transport layer services are concerned.

multiplexing at sender: demultiplexing at receiver:


handle data from multiple use header info to deliver
sockets, add transport header received segments to correct
(later used for demultiplexing) socket

application

application P1 P2 application socket


P3 transport P4
process
transport network transport
network link network
link physical link
physical physical

Transport Layer: 3-16

Page 9 of 7
5(a (i) You are given a challenge to subnet the Address 150.20.0.0 into networks
) supporting 500 hosts each. What will be a subnet mask and the IP Address
Range of the first Network?

This is class B network, 16 bits reserved for network.

Minimum number of bits required for 500 hosts is 9

Number of bits for network will be 32-9 =23 or /23

Subnet Mask will be

Subnet Mask 255.255.254.0, Range 150.20.0.0 - 150.20.1.255

(ii) Briefly explain the circumstances that will make UDP preferred to TCP?
When latency or delay can not be tolerated at all, eg: real time applications
like voice conferencing etc
(iii)Briefly explain the meaning of reliable data transfer characteristic of TCP and
mechanism used by the reliable data trensfer protocol to detect and deal with
erronious channels and packet loss.

TCP ensures data is delivered, there is always acknowledgement for each


packet transfer to ensure delivery.

(iv) With the help of diagram, distinguish in between the various components of
SNMP protocol stack. In particular include all layers included at both ends
Page 10 of 7
and across the network.

(v) In Figure 3, Switches A, B, and C are trunked together and have been
properly configured for VTP. Switch C receives VLAN information from the
VTP server Switch A, but Switch B does not receive any VLAN information.
What is the most probable cause of this behaviour?

Figure 3: LAN

It is configured in a transparent mode


(vi) Explain two major components of configuration management
Reconfiguration and Documentation

6 (i) Subnet the IP Address 210.30.12.0, so there are 60 Hosts in each network.
What are the Broadcast Addresses of each Network?

210.30.12.0 is Class C address, Number of bits for hosts is 8


For 60 hosts, requires minimum of 6 bits
Extended network bits will be 2, and mask will be /26. Or 255.255.255.192
Subnetworks will be
210.30.12.0. 210.30.12.64. 210.30.12.128. and 210.30.12.192
Broadcast addresses are
210.30.12.63, 210.30.12.127, 210.30.12.191, and 210.30.12.255
(ii) What is the maximum number of VLANs that can be assigned to an access
switch port without a voice VLAN. List down commands used to achieve
this?
One VLAN for access ports
Command: Switch port access VLAN X

(iii)With the help of diagram, mention and explain the transport layer services
and protocols used.

Page 11 of 7
(iv) Briefly explain how multiplexing and de-multiplexing works as far as
transport layer services are concerned.

multiplexing at sender: demultiplexing at receiver:


handle data from multiple use header info to deliver
sockets, add transport header received segments to correct
(later used for demultiplexing) socket

application

application P1 P2 application socket


P3 transport P4
process
transport network transport
network link network
link physical link
physical physical

Transport Layer: 3-16

(b) An organization with three subsections, Programmers, Analysts, and Managers


has a network that connects devices in the ground floor and others in the first
floor. The network has two switches that are interconnected together. One switch
named S1 is located on the ground floor while switch S2 is on the first floor.
The organization has 6 Programmers whose PCs are connected to S1, and 2
Programmers whose PCs are connected to S2. 4 Analysts are residing on the first
floor and their PCs are connected to S2, while 2 Analysts sit on the ground floor
and their PCs are connected to S1. All 3 Managers have offices on the first floor
and their PCs are connected to S2. The organizational network is connected to
other networks by a router that is connected to S2. The organization is offered
a network 192.168.10.0/24 by the ISP.
Based on the described scenario, answer the following questions:

(i) By using appropriate networking symbols, sketch the network.

Page 12 of 7
(ii) Derive an optimal IP plan, and allocate the subnets to the three subsections.
Given network is 192.168.10.0/24
Programmers:8
Analyst : 6
Managers: 3
The optimal IP plan should accommodate the largest # of users, 8 in this case.
Minimum number of bits will be 4. (not 3 because usable Ips will be 6)
4 bits can be used to extend network bits, and a total of 16 subnetworks can be
obtained
Network bits will be 28 or /28 or 255.255.255.240
Subnetworks will be
192.168.10.0/28 for Programmers
192.168.10.16/28 for Analyst
192.168.10.32/28 for Managers

192.168.10.48 and others can be reserved

(iii)Write commands to configure VLANs and ensure the three categories of


employees in an organization can communicate within their group. Use
VLAN 2 for Programmers, VLAN 3 for Managers, and VLAN 5 for
Analysts.

● Programmers VLAN Configuration


○ Configuration of VLAN 2 (programmers) at both switches:
■ S1# configure terminal - To enter global configuration
mode
■ S1(config) # vlan VLAN 2 – To configure S1 with Vlan for
programmers
■ S1 # (config-vlan) name programmers
■ S1 # exit
○ To assign VLAN 2 to switch ports (let’s assume they are assigned
to ports fa0/0 to fa0/5)
■ S1# configure terminal
■ S1 (config) #interface fa0/0 – fa0/5
■ S1 (config-f) #switchport access vlan VLAN 2
○ To configure S2 to VLAN 2:

Page 13 of 7
■ S2# configure terminal - To enter global
configuration mode
■ S2(config) # vlan VLAN 2 – To configure S2 with
Vlan for programmers
■ S2 (config-vlan) # name programmers
■ S1 # exit
○ To assign vlan 2 to switch ports (let’s assume they are
assigned to ports fa0/0 to fa0/1)
■ S2# configure terminal
■ S2(config) # interface fa0/0 – fa0/1
■ S1(config-f)# switchport access vlan VLAN 2

_____________________________________________________

● Managers VLAN Configuration


○ Configuration of VLAN 3 (Managers) to switch S2:
■ S2# configure terminal - To enter global configuration
mode
■ S2(config) # vlan VLAN 3 – To configure S3 with Vlan for
Managers
■ S2 # (config-vlan) name Managers
■ S1 # exit
○ To assign VLAN 3 to switch ports (let’s assume they are assigned
to ports fa0/0 to fa0/2)
■ S2# configure terminal
■ S2 (config) #interface fa0/0 – fa0/2
■ S2 (config-f) #switchport access vlan VLAN 3

___________________________________________________

● Analysts VLAN Configuration


○ Configuration of VLAN 5 (Analysts) at both switches:
■ S2# configure terminal - To enter global configuration
mode
■ S2(config) # vlan VLAN 5 – To configure S2 with Vlan for
Analysts
■ S2 # (config-vlan) name Analysts
■ S2 # exit
○ To assign VLAN 5 to switch ports (let’s assume they are assigned
to ports fa0/0 to fa0/3)
■ S2# configure terminal
■ S2 (config) #interface fa0/0 – fa0/3
■ S2 (config-f) #switchport access vlan VLAN 5
○ To configure S1 to VLAN 5:
■ S1# configure terminal - To enter global
configuration mode
■ S1(config) # vlan VLAN 5 – To configure S1 with
Vlan for Analysts
■ S1 (config-vlan) # name Analysts
■ S1 # exit
Page 14 of 7
○ To assign vlan 2 to switch ports (let’s assume they are
assigned to ports fa0/0 to fa0/1)
■ S1# configure terminal
■ S1(config) # interface fa0/0 – fa0/1
■ S1(config-f)# switchport access vlan VLAN 5

For interface connecting between switches use command


Switchport mode trunk
Switchport trunk encapsulation dot1q

(iv) Write commands to show which switch ports have been added to each of the
VLAN created.

Show VLAN brief


(v) Suppose one programmer’s computer is moved and plugged in VLAN 3,
explain the challenges the programmer will face and a reason behind that.

The programmer will not be able to communicate with fellow programmers


since will be in different broadcast domain, instead
He will be able to access managerial information, because it will be
connected to managers VLAN. Organizational managerial issues will be
accessed by one of the employees (programmers).

Page 15 of 7

You might also like