NT2640.U3.AS1.IP Subnetting Assignment IP Subnetting Overview: As part of your assigned readings and material covered in your class lecture, you have learned about IP subnetting including the math involved. For this assignment, you will answer questions relating to IP subnetting. Resources: Textbook Lecture materials and notes Deliverables Answer the questions in the following section. Turn in your responses to your instructor. Be sure to show your work, meaning your steps to convert binary to decimal, etc.
NT2640 Unit 2 Assignment 1 1. What organization has been given the responsibility for assigning protocol numbers? * Internet Assigned Numbers Authority (IANA) 2. Determine the protocol numbers for the protocol names: Protocol | Number | IPv4 | 4 | IPv6 | 41 | TCP | 6 | UDP | 17 | ICMP | 1 | VRRP | 112 | IPSEC ESP | 50 | L2TP | 115 | OSPF | 89 | EIGRP | 88 | 3. Determine the correct ICMP type based on the description provided: ICMP Message Description | Type | Code | Echo | 8 | | Echo Reply | 0 | | Time Exceeded | 11 | | Port Unreachable | 3 | 3 | Fragmentation Needed | 3 | 4 | 4.
a) write memory b) copy tftp startup-config c) configure terminal d) copy running-config tftp 9. Which one of the following is a private IP networks, classified by RFC1918? a) 188.8.131.52 b) 184.108.40.206 c) 127.0.0.0 d) 192.168.254.0 10. Which Microsoft Windows IP networking command will display the status of current TCP connections? a) netstat -an b) ipconfig /tcp c) nslookup d) tracert 11.
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? * c. Net view 29. To view eDirectory information on a NetWare 5.1 server, which of the following tools should you use? * d. Novell Client 30. The Nbtstat command is used to enumerate *nix systems.
Is there a firewall configured on your computer, is your firewall block ing ports, if you turn off the firewall does it resolve your problem? If not move onto the Network Layer; can you ping your default gateway, are your IP settings correct, can you trace a well-known IP/DNS address/URL, and finally has your network adaptor b een assigned an APIPA address? You then move to the data link layer. Is the light lit on your network interface card, is your NIC inserted/installed correctly, is the NIC d isabled in the device 4.4 review 1. The divide-and-conquer
Step 2: If ARP resolution is not there in local cache, the source machine will generate an Address Resolution Protocol (ARP) request message, it puts its own data link layer address as the Sender Hardware Address and its own IPv4 Address as the Sender Protocol Address. It fills the destination IPv4 Address as the Target Protocol Address. The Target Hardware Address will be left blank, since the machine is trying to find that. Step 3: The source broadcast the Address Resolution Protocol (ARP) request message to the local network. Step 4: The message is received by each device on the LAN since it is a broadcast.
In telecom closet 2, from the punch down block, to the switches, to the wall plates, and on to the offices workstation, plus one shared printer, cabling will change to Cat 5e UTP, using 1000 Base-T technology, achieving a throughput of 1000Mbps. A safety feature on Ethernet Lans, is its access method, CSMA/CD. CSMA/CD, means that your NIC checks the network to make sure it is not busy before transmitting, if two nodes do transmit at the same time having a collision, it will send out packets to inform other nodes of a data collision, then the NIC waits for the network to be inactive before retransmitting. On the