0% found this document useful (0 votes)
44 views16 pages

Lesson Review: Network Layer Data Plan: Chitkara

The document provides a lesson review on the Network Layer in computer networking, highlighting its key functions of routing and forwarding, as well as the importance of IP addressing and subnetting. It discusses the transition from IPv4 to IPv6 and emphasizes hands-on learning through tools like Cisco Packet Tracer. The review also includes reflections on learning outcomes and practical applications in network configuration and management.

Uploaded by

bhuwank301
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views16 pages

Lesson Review: Network Layer Data Plan: Chitkara

The document provides a lesson review on the Network Layer in computer networking, highlighting its key functions of routing and forwarding, as well as the importance of IP addressing and subnetting. It discusses the transition from IPv4 to IPv6 and emphasizes hands-on learning through tools like Cisco Packet Tracer. The review also includes reflections on learning outcomes and practical applications in network configuration and management.

Uploaded by

bhuwank301
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Chitkara

Network and Communication 2025


OnTrack Submission

Lesson Review: Network Layer Data Plan

Submitted By:
Bhuwan Kumar Tutor:
2310994771 Dr. Sonam Aggarwal
2025/03/22 21:08

Outcome Weight
Layers of Abstraction ♦♦
Interact with Networks ♦♦
Networking Tools ♦♦
Analysing real network issues ♦♦
.

March 22, 2025

Produced by Doubtfire
SIT202– Computer Networks and Communication
Task 6.1P: Lesson Review
Name-Bhuwan Roll no-2310994771
Module Summary
Summary-
The Network Layer plays a vital role in computer networking by facilitating
communication between hosts across various networks. It primarily focuses on
two key functions: routing and forwarding. Routing identifies the optimal path
for data packets from the source to the destination, while forwarding transfers
packets from an input port to the correct output port within a router. Unlike
the transport and application layers, which function solely on end systems, the
network layer is integral to network devices such as routers, making it crucial
for internet connectivity. Routers utilize a combination of input ports, switching
fabric, output ports, and a routing processor to efficiently direct packets to
their destinations, reducing congestion and packet loss.
A core element of the network layer is IP addressing and subnetting. While
IPv4, with its 32-bit addresses, remains prevalent, it is gradually being
supplanted by IPv6, which offers 128-bit addresses to support the increasing
number of internet-connected devices. CIDR notation enhances IP address
allocation by allowing variable-length subnet masks. For example, a subnet
designated as 192.168.40.128/26 can support 64 host addresses. Furthermore,
IPv4 allows for datagram fragmentation, enabling packets to be divided into
smaller segments for transmission through networks with varying maximum
transmission sizes. In contrast, IPv6 removes fragmentation and introduces a
fixed-length 40-byte header for greater efficiency. As IPv6 adoption is still in
progress globally, transition methods like tunnelling and dual-stack routers are
employed to maintain compatibility between IPv4 and IPv6 networks.
To solidify these concepts, hands-on learning is encouraged through tools like
Cisco Packet Tracer, which enables users to simulate network configurations,
set up routers, and observe packet transmission. This practical approach is
essential for grasping how data traverses’ networks, laying the groundwork for
further understanding.
Reflecting on the content -

1. What is the most important thing you learned in this module?


Ans-The most important thing I learned is how the network layer handles
routing and forwarding to ensure smooth data transmission. I also
understood IP addressing, subnetting, IPv4 fragmentation, and the
transition to IPv6, which are crucial for managing networks efficiently.

2. How does this relate to what you already know?


Ans- Before taking this module, I was aware that IP addresses facilitate
communication between devices. However, I now grasp how routers
manage and direct packets through routing algorithms. Additionally,
learning about subnetting and CIDR notation has enhanced my
understanding of how networks are structured.

3. Why do you think your course team wants you to learn the content of
this module?
Ans- This module is crucial as networking plays a vital role in today's
technology landscape. Grasping how data travels through networks aids in
effective network management, troubleshooting, and enhancing security.
Additionally, it equips us for practical tasks such as setting up routers with
Cisco Packet Tracer and prepares us for future careers in networking and
cloud computing.
Evidence of learning

D2L Question-
Ques1.Consider we have a network with a subnet along with prefix 192.168.40.128/26. Can you
list down two IP addresses that can be assigned to two PCs connected to this network?

Ans- The subnet 192.168.40.128/26 has a total of 64 IP addresses (from 192.168.40.128 to


192.168.40.191).

Reserved Addresses:

• 192.168.40.128 → Network Address (Cannot be used)

• 192.168.40.191 → Broadcast Address (Cannot be used)

Usable IP Range:

• 192.168.40.129 to 192.168.40.190

Two Valid IPs for PCs:

192.168.40.130
192.168.40.135

Que2.When you are working in Cisco Packet Tracer, can you show all the port labels in your logical
workspace?

PortLabels(Fa0/1)

PortLabels(Fa0)
Active class 6
Activity 1
Ques1Examine the IP datagram’s header. Can you identify the IP address of your device
and the IP address of the destination host?
Ans-

IP is 10.50.0.240 and the destination IP is 13.107.42.16.

Que2. By examine the IP header, can you identify the transport layer protocol used? Does
this match with the transport layer protocol listed in in the packet details window?

Ans-

From the image, the protocol used is TCP (Protocol: 6), which matches with the packet
details.
Que3. What is the size of IP header in Bytes? What is the size of the payload (in Bytes) of
this IP datagram? How did you calculate the size of the payload?
Ans-

The header length is 20 bytes, and the total length is 52 bytes.


Payload size = 52 - 20 = 32 bytes.

Que4. Can you check whether this IP datagram is fragmented or not? Explain your answer.

Ans-

The Don't Fragment flag is set (1), so the packet is NOT fragmented.

Que5. Examine other important fields in the IP header.


Ans- Here are the key fields in the IP Header and their values from the Wireshark capture:

1. Version (IPv4 or IPv6)


• Value: 4
• Explanation: Indicates that this is an IPv4 packet.

2. Header Length
• Value: 20 bytes
• Explanation: Specifies the size of the IP header.

3. Differentiated Services Field (DSCP & ECN)


• Value: 0x00 (DSCP: CS0, ECN: Not-ECT)
• Explanation: Used for Quality of Service (QoS). The value here means no special
priority.

4. Total Length
• Value: 52 bytes
• Explanation: The entire size of the IP packet, including the header and payload.

5. dentification
• Value: 0xdbd9 (56761)
• Explanation: A unique number assigned to this packet, used for fragmentation and
reassembly.

6. Flags
• Value: 010
• Breakdown:
o Bit 0 (Reserved): 0 (Always 0)
o Bit 1 (DF - Don't Fragment): 1 (Packet must not be fragmented)
o Bit 2 (MF - More Fragments): 0 (Not fragmented)

7. Fragment Offset
• Value: 0
• Explanation: Since this is not a fragmented packet, the offset is 0.

8. Time to Live (TTL)


• Value: 128
• Explanation: The maximum number of hops this packet can take before being
discarded.

9. Protocol
• Value: 6 (TCP)
• Explanation: Indicates that this packet is using the Transmission Control Protocol
(TCP).
10. Header Checksum
• Value: 0xad6d (Validation Disabled)
• Explanation: Used for error-checking the header, but Wireshark reports validation as
disabled.

11. Source IP Address


• Value: 10.50.0.240
• Explanation: This is the sender's IP address (your device).

12. Destination IP Address


• Value: 13.107.42.16
• Explanation: This is the receiver's IP address (destination host).

Que6. Now, conduct a similar analysis using a different type of packet (if you have used
HTTP before, now you can use DNS) and compare the findings.

Ans-
To conduct a similar analysis, I selected a DNS packet instead of an HTTP packet. Below are
the key findings:
1. Protocol: DNS uses UDP (Protocol 17), whereas HTTP uses TCP (Protocol 6).
2. Source & Destination IP: The source IP remains 10.50.0.240 (my device), but the
destination changes to a DNS server (e.g., 172.16.20.28) instead of a web server.
3. Header Size: The IP header size in DNS is smaller (8 bytes) compared to HTTP (20
bytes) due to UDP's lightweight nature.
4. Fragmentation: DNS packets may be fragmented depending on size, whereas HTTP
packets using TCP typically have the "Don't Fragment" (DF) flag set.
5. TTL (Time to Live): The DNS packet had a lower TTL (e.g., 64) compared to the HTTP
packet (128), indicating different routing behaviors.

Activity 2
Que1. Assume you are sending a present to a friend in another country.
Can you list the various places and steps that your parcel would go in the
postal system before it reaches your friend?
Ans- When sending a parcel to a friend in another country, it typically
follows these steps:
1. Drop off the parcel at a local post office.
2. The parcel is sorted at a regional postal center.
3. It is transported to an international shipping hub.
4. The parcel is sent via air/sea transport to the destination country.
5. It arrives at a customs office for inspection.
6. The parcel is handed over to the destination country’s postal service.
7. It is sent to a regional sorting center.
8. Finally, a local post office delivers it to the recipient.
Que2. How this analogous to a situation where you want to send a message
to a friend in another country over the computer networks?
Ans- Sending a message over a network is similar to postal delivery:
• The sender’s device (local post office) prepares the data packet.
• The packet is routed through the network (regional postal centers).
• It crosses international gateways (like customs).
• It is received by the recipient’s ISP (destination country’s postal service).
• Finally, it is delivered to the recipient’s device.
Just like postal tracking numbers, IP addresses ensure proper delivery.

Que3. Assume we need to build the following network with two LANs. Each
group member has a role to play. One group member can be the router and
four other group members could be PCs. Each device needs to set their own
network configuration. The Router needs to set its interfaces/port and PCs
need to set it IP address and gateways to be able to make a communication
between two LANs.
Ans- Building a Network with Two LANs
In this setup, we will configure a network with two LANs connected via a
router. Each group member will play a role, either as a router or a PC, and set
up their respective network configurations.
Roles and Responsibilities
1. Router (Group Member 1 - Acts as a Gateway)
o The router connects LAN 1 and LAN 2 to enable communication.
o It has two interfaces, one for each LAN.
o Configuration:
▪ Interface 1 (LAN 1): 192.168.1.1/24
▪ Interface 2 (LAN 2): 192.168.2.1/24
▪ Enables routing between LANs
2. PC1 (Group Member 2 - LAN 1)
o IP Address: 192.168.1.10/24
o Default Gateway: 192.168.1.1
3. PC2 (Group Member 3 - LAN 1)
o IP Address: 192.168.1.11/24
o Default Gateway: 192.168.1.1
4. PC3 (Group Member 4 - LAN 2)
o IP Address: 192.168.2.20/24
o Default Gateway: 192.168.2.1
5. PC4 (Group Member 5 - LAN 2)
o IP Address: 192.168.2.21/24
o Default Gateway: 192.168.2.1

How Communication Works


1. If PC1 (192.168.1.10) wants to send a message to PC3 (192.168.2.20), it
first checks if the destination IP is in the same subnet.
2. Since PC3 belongs to a different subnet, PC1 forwards the packet to the
default gateway (Router at 192.168.1.1).
3. The router receives the packet and forwards it to 192.168.2.1 (its
interface for LAN 2).
4. The packet is then delivered to PC3 (192.168.2.20).
5. PC3 can respond using the same route.
Que 4. Assume PC1 needs to send a packet to PC3, discuss the steps that
packet needs to go through to reach to PC3.
Ans-

Steps for PC1 to Send a Packet to PC3:


1. PC1 Checks Destination: Since PC3 is on a different subnet
(192.168.1.0/24), PC1 sends the packet to its default gateway (Router:
10.1.1.1).
2. PC1 Sends Packet to Router: If PC1 doesn’t have the router’s MAC address,
it sends an ARP request. The router replies, and PC1 sends the packet via
Switch 1.
3. Router Processes the Packet: The router checks the destination IP, sees it
belongs to LAN 192.168.1.0/24, and forwards it to the correct interface
(192.168.1.1).
4. Router Sends Packet to PC3: If needed, the router sends an ARP request to
get PC3’s MAC address. Once received, it forwards the packet via Switch 2.
5. PC3 Receives the Packet: PC3 processes the packet and responds if
necessary.
Activity 3

1. Implement the above-mentioned network in Cisco Packet Tracer. You need


to determine the IP addresses of all PCs depending on the LAN that they
belong to (you have done this in Activity 2).
2. Once all the devices are configured and connected properly, verify the
connectivity using command prompt “ping” in one of the PCs (ex: if PC3’s IP
address is 192.168.1.5 then from PC1’s command prompt we can type “ping
192.168.1.5” to verify the connection)
3. Use the simulation mode to verify the steps that you have discussed in
Activity 2 Step 4.
4. Make sure to take screenshots that you can use for task submissions.
Ans-
Ping-
Simulation Panel-

You might also like