Acn Assignment final
Acn Assignment final
Ans.
2. What is fragmentation?
Ans. IP fragmentation is an Internet Protocol (IP) process that breaks packets into
smaller pieces (fragments), so that the resulting pieces can pass through a link
with a smaller maximum transmission unit (MTU) than the original packet size.
The fragments are reassembled by the receiving host.
3. Name different Network Layer Protocols.
b) Actual data
A)
B.)
6. Compare ipv4 and IPv6
Ans.
IPV4 IPV6
IPv4 has 32-bit address length IPv6 has 128-bit address length
In IPv4 end to end connection integrity In IPv6 end to end connection integrity
is Unachievable is Achievable
It can generate 4.29×109 address space Address space of IPv6 is quite large it
can produce 3.4×1038 address space
IPv4 has header of 20-60 bytes. IPv6 has header of 40 bytes fixed
Ans.
The lack of address space the number of different devices connected to the
internet grows exponentially and the size of the address space is quickly
depleted.
Weak protocol extensibility - the insufficient size of the ipv4 header , which
does not accommodate the required number of additional parameters.
Scarcity of ipv4 addresses - the ipv4 addressIng system uses 32 bit address
space .This 32 bit address space is further classified into usable A , B and C
classes. 32 bit address space a loss for or 4,294,967,296 ipv4 addresses , but
the previous and current ipv4 address.
A 0 0.0.0.0 127.255.255.255
B 10 128.0.0.0 191.255.255.255
ICMP creates and sends messages to the source IP address indicating that a
gateway to the Internet that a router, service or host cannot be reached for packet
delivery. Any IP network device has the capability to send, receive or process
ICMP messages.
ANS:
Routers between the source and recipients duplicate data packets and forward
multiple copies wherever the path to recipients diverges. Group membership
information is used to calculate the best routers at which to duplicate the packets in
the data stream to optimize the use of the network.
A source host sends data to a multicast group by simply setting the destination IP
address of the datagram to be the multicast group address. Any host can become a
source and send data to a multicast group. Sources do not need to register in any
way before they can begin sending data to a group, and do not need to be members
of the group themselves.
ANS: The Ping utility is an online free tool that helps you to verify if a
domain/server is operating and network accessible. This Ping tool uses the Internet
Control Message Protocol (ICMP) Echo function as detailed in RFC 792. A small
packet will be sent through the network to a given IP address (IPv4) or host name.
This packet contains 64 bytes - 56 data bytes and 8 bytes of protocol reader
information. The device that sent the packet then waits and listens for a return
packet. If the connections are good and the target domain/server is up, a good
return packet will be received. Ping can also tell the user the number of hops
between two targets and the amount of time it takes for a packet to make the
complete trip. In addition, this tool can also be used to resolve the host name to an
IP address. Instead of enter the IP address you can enter the host name for pinging.
ANS: The traceroute command uses ICMP Time Exceeded messages to trace a
network route. As discussed during IP, the Time to Live field is used to avoid
routing loops, every time a packet passes through a router, the router decrements
the TTL field. If the TTL reaches zero, the router drops the packet and sends an
ICMP Time Exceeded message to the original sender.
Traceroute takes advantage of this TTL feature in a clever way. Assume a client is
four hops away from a server, the client sends a packet to the server with a TTL of
1. The router A decrements the TTL to 0, drops the packet, and sends an ICMP
Time Exceeded message to the client. Router A is now identified.
The client then sends a packet with a TTL of 2 to the server. Router A decrements
the TTL to 1 and passes the packet to router B. Router B decrements the TTL to 0,
drops it, and sends an ICMP Time Exceeded message to the client. Router B is
now identified. This process continues until the server is reached, as shown in
Figure 5.10, identifying all routers along the route.
Most traceroute clients (such as UNIX and Cisco) send UDP packets outbound.
The outbound packets will be dropped, so the protocol does not matter. The
Windows tracert client sends ICMP packets outbound; Figure 5.11 shows
Windows tracert output for a route to www.syngress.com. Both client types usually
send three packets for each hop
The number of wireless devices for voice or data is projected to surpass the
number of fixed devices. Mobile data communication will likely emerge as the
technology supporting most communication including voice and video. Mobile
data communication will be pervasive in cellular systems such as 3G and in
wireless LAN such as 802.11, and will extend into satellite communication.
Though mobility may be enabled by link-layer technologies, data crossing
networks or different link layers is still a problem. The solution to this problem is a
standards-based protocol, Mobile IP.
15) Explain the Virtual Private Network (VPN) in detail with an appropriate
diagram.
ANS: A VPN creates a secure connection between your device (for example your
computer or Smartphone) and the internet. When going online, we all have a
unique IP address. You could compare this address to a phone number or home
address, but for your computer or Smartphone, your IP address is a personal
identification code for your internet connection. It reveals your location and is tied
to the person paying your internet provider. With your IP address, you’re
recognizable and traceable online, no matter what you’re doing. That is, unless you
use a VPN.
A VPN won’t always be able to cover all your online tracks; there are other
methods that could result in uncovering your online identity. Techniques that use
WebRTC leaks and browser fingerprinting could still collect data about you. Even
so, a VPN will protect your privacy very well in most cases.
As mentioned before, VPN stands for Virtual Private Network. This private
network allows you to send your data traffic via an encrypted, secure connection to
an external server. From there, the traffic will be sent on to the internet. Because of
this, the IP address shown to the internet will be changed.