Answer a)
IPv4 is a 32 bit ipaddressing system, so it is 2^32 = 4,294,967,296
Ipv6 is 64 bit ip addressing system, so it contains more ip address than ipv4.
Answer b)
Routing table are used to determine the packet transfer.
Answer c)
Source -->128.100.11.2(H)
--->128.100.11.3(R1)---->128.100.12.3(R1)---->HOP
128.100.12.254(R2)--->128.100.13.3(R2)---->128.100.13.1(H)--->destination
As the destination network packet is different from source network, so first it transmit to the router of the source network, then from the routing table router checks which network it can connect the packe, so it transmit to it next hop and from there it reaches to the destination.
Answer d)
When a packet is send in 127.0.0.1, when tcpip checks the packet it automatically returns back to the host again instead of sending to any destination. If a router or gateway get any packet with 127.0.0.1 destination it discard the packet.
127.0.0.1 is a loopback address, this ip address is used for testing purpose.Or referring the self machine with a ip address because this ip address is common to all machines in the network.
a. How many possible IP addresses are there in IPv4? (Ignore any reserved or special addresses...
Fill in the blank The number of possible hosts in the subnet whose subnet mask is 136.76.29.0/22 is ______ . _________________ is the mechanism where an IPv6 packet is sent over an IPv4 network of routers and links. . Most of the link layer is implemented in a ________________________ . ________________________ refers to the ability of the receiver to both detect and correct errors. . The IP address to MAC address translation is provided by ________________________ . The MAC address...
2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...
PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers in the Examination Answer Booklet. Each question is worth 1.5 marks (14 x 1.5 = 21 marks). Question 1 An organisation has been granted a block of addresses with the mask /22. If the organisation creates 8 equal-sized subnets, how many addresses (including the special addresses) are available in each subnet? Show your calculations. Question 2 Give an example of a valid classful address...
EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...