Info 465, Assign2
Prof. Dr. H. Marzi
1. Question 5.2: What tasks are p
erformed by the transport layer?
Ans: Ensure that data is exchanged reliably; that is transmitting data to the
destination application where they
should arrive in the same order in which they were sent.
Question 5.7: There are several protocol models that have been developed. Examples of these include
SNA, Appletalk, OSI, and TCP/IP as well as more general models such as thre
layer models. Wh
actually used for communications that travel over the Internet?
Question 5.8: What are some advantages of layering as seen in the TCP/IP architecture?
being able to
a certain task to transfer data
allows for increase in reliability.
as it promotes standards
One layer can be modified without affecting other layers
r in data transfer processes
Question 5.11: Compare the address
space between IPv4 and IPv6. How many bits are used in each?
IPv4 = 2
Addresses (32 bits used)
IPv6 = 2
Addresses (128 bits used)
A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer,
which appends another 160 bits of header. This is then transmitted through two networks, each of which uses a
bit packet header. The destination network has a
maximum packet size of 800 bits. How many bits,
including headers, are delivered to the network layer protocol at the destination?
(160 + 160 + 24 + 24)
Packet Size Received(
elivered: 800 + 800 + 800 + 572 = 2972bits
ure 5.8 shows the protocols that
operate directly on top of IP. Ping is a program used to
test connectivity between machines and is available on all operating systems. Which
does Ping use and what does the payload data consist of? Hint: You can use Ethereal to help you determine the
ICMP = Internet Control Message Protocol
Type of Message
What other programs are built into your operating system to help you troubleshoot or
provide feedback about your connectivity.
: Sends ICMP Echo Request messages to verify that TCP/IP is configured correctly and that
host is available.
: Displays current TCP/IP network configuration values, updates, or releases, Dynamic Host
Configuration Protocol (DHCP) allocated leases, and display, register, or flush Domain Name System (DNS)
: Displays the status of current NetBIOS over TCP/IP connections, updates the NetBIOS name cache,
and displays the registered names and scope ID.
: Displays a path of a TCP/IP host and packet losses at each router a
long the way.
: IP routing table and adds or deletes IP routes
This is the p
ath of TCP/IP
Question 8.1: Describe the five classes of Internet addresses.
has a few networks, each with many hosts.
Has a medium number of networks, each with a medium number of hosts
any networks, each with a few hosts
One network with a group of hosts.
One network serving a number of hosts
Question 8.3: What is the
purpose of the subnet mask?
It used to determine the destination address of a datagram, as to either a particular host or LAN in an extended
It is also employed by hosts to help make routing decisions.
2: What is the purpose of a
It is used to classify differentiated services.
Question 8.13: List and briefly explain the
five main functions of DS traffic
i) Classfier: s
eparates submitted packets into different classes, only on the basis
of the DS
codepoint or on
the packet header, or even the
ii) Meter: Measures submitted traffic for conformance to a profile, by determining
whether a given packet stream class is within or exceeds the service level guarantee
d for that class.
iii) Marker: Re
marks packets with a different codepoint as needed for either best effort handling, or at the
boundary between two DS domains.
iv) Shaper: Delays packets
as necessary to ensure that the packet stream in a given class
does not exceed the
traffic rate specified in the profile for that class.
: Drops packets when the rate of packets of a given class exceeds that sp
ecified in the profile for that
Given a network address of 192.168.100.0 and a subnet mask of 255.255.255.192,
a. How many subnets are created?
If 192 = 11000001,
b. How many hosts are there per subnet?
31 hosts per subnet
2. Problem 8.6:
Given a company with six individual departments and each department having ten
computers or networked devices, what mask could be applied to the company
to provide the
subnetting necessary to divide up the network equally?
1010 (1010 = 10)