Question

Describe how to use applications and communication protocols in the Transmission Control Protocol/ Internet Protocol (TCP/...

Describe how to use applications and communication protocols in the Transmission Control Protocol/ Internet Protocol (TCP/ IP) suite to design IP addressing and subnetting solutions for variable length subnet masks in your small home network.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Describe how to use applications and communication protocols in the Transmission Control Protocol

Transmission Control Protocol (TCP) is used along with ... maintain a network conversation through which application programs can exchange data. TCP exists in the transport layer with other protocols such as UDP. ... for processing to provide me with relevant information as described in .

The entire Internet Protocol suite -- a set of rules and procedures -- is commonly referred to as TCP/IP, though others are included in the suite. The TCP/IP protocol suite functions as an abstraction layer between internet applications and the routing/switching fabric.

TCP/IP specifies how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed and received at the destination. TCP/IP requires little central management, and it is designed to make networks reliable, with the ability to recover automatically from the failure of any device on the network.

The two main protocols in the Internet Protocol suite serve specific functions. TCP defines how applications can create channels of communication across a network. It also manages how a message is assembled into smaller packets before they are then transmitted over the internet and reassembled in the right order at the destination address.

Internet Protocol (TCP/ IP) suite to design IP addressing and subnetting solutions for variable length subnet masks in your small home network

.Subnetting and subnet masking Subentting is the process of dividing a network into smaller subnetworks, each with its own subnetwork address.

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Additional Information

If definitions are helpful to you, use these vocabulary terms in order to get you started:

  • Address - The unique number ID assigned to one host or interface in a network.

  • Subnet - A portion of a network that shares a particular subnet address.

  • Subnet mask - A 32-bit combination used to describe which portion of an address refers to the subnet and which part refers to the host.

  • Interface - A network connection.

If you have already received your legitimate address(es) from the Internet Network Information Center (InterNIC), you are ready to begin. If you do not plan to connect to the Internet, Cisco strongly suggests that you use reserved address.

Understand IP Addresses

An IP address is an address used in order to uniquely identify a device on an IP network. The address is made up of 32 binary bits, which can be divisible into a network portion and host portion with the help of a subnet mask. The 32 binary bits are broken into four octets (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot). For this reason, an IP address is said to be expressed in dotted decimal format (for example, 172.16.81.100). The value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary.

The solution is to use variable-length subnetting. When variable-length subnetting is employed, the router is supplied with two subnet masks. These masks are applied one after the other. In this situation, the administrator first creates four subnets using the mask 255.255.255.192. The original subnet mask is 255.255.255.0, written in binary as:
11111111.11111111.11111111.00000000 = 255.255.255.0

and the original network IP address was 192.168.3.0, written in binary as:
11000000.10101000.00000011.00000000 = 192.168.3.0

Now, by applying the new subnet mask of 255.255.255.192, written in binary as:
11111111.11111111.11111111.11000000

we have added two bits to the network identifier section (netid) of the original IP address. This allows the administrator to create up to four (22) subnetworks from the original network address. Each of these newly created subnets may hold up to 64 (26) hosts.

Once the new subnet mask is determined, the administrator uses the following to create the subnets required:

  1. The first step is to apply the mask to the original 192.168.3.0 network address. This new mask creates four new subnetworks (subnets). The subnetwork identifiers (subnetid) available to the administrator are:
    192.168.3.0
    192.168.3.64
    192.168.3.128
    192.168.3.192
    Three of the new subnetworks will each contain 60 hosts. When these first three subnetworks are created, our original Class C network, 192.168.3.0, looks like the example in Figure A.
  2. To create two more subnets, a second subnet mask of 255.255.255.224 is applied. This divides the remaining subnet into two separate subnets. With five bits remaining to be used as host identifiers (hostids), each of these new subnets may hold up to 32 (25) hosts.
Add a comment
Know the answer?
Add Answer to:
Describe how to use applications and communication protocols in the Transmission Control Protocol/ Internet Protocol (TCP/...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Use the Internet to research and explore vulnerabilities that are related to TCP/IP (transmission control protocol/Internet...

    Use the Internet to research and explore vulnerabilities that are related to TCP/IP (transmission control protocol/Internet protocol). In a 3–5-paragraph posting, provide the following information: Current vulnerabilities related to TCP/IP Countermeasures that address the vulnerabilities Recommended products for addressing TCP/IP vulnerabilities If you have experience with TCP/IP, include your own experience and recommendations in this posting.

  • 1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop...

    1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next.Immersive Reader (10 Points) network data link transport physical 2.As frequency increases, the period ________.Immersive Reader (10 Points) increases none of the choices are correct decreases remains the same 3.Data can flow only in both direction all of the times in a _________ mode.Immersive Reader (10 Points) none of the choices are correct half-duplex simplex full-duplex 4.For a ______ channel, the...

  • The most common protocol in use is TCP/IP, which is a group of protocols that functions...

    The most common protocol in use is TCP/IP, which is a group of protocols that functions together to permit __________ communication. telephone email LAN web-based __________ is a type of network software that allows administrators to define the location of data storage in a network and determine user access to that data. Wired software User management software Application software File management software Which of the following describes extranet? A private LAN only accessible to those with permissions A LAN that...

  • How many bits are reserved for the Transmission Control Protocol (TCP) flags?

    How many bits are reserved for the Transmission Control Protocol (TCP) flags?

  • (a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe...

    (a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe briefly the multiplexing services provided by the network-layer of the protocol suite. TCP/IP protocol suite. How can the multiplexed TCP and UDP packets be (4 marks) (c) Describe briefly the impact of congestion on packet delay and throughput. Describe (6 marks) (d) Fig. Q1 shows a network adopting the virtual-circuit approach to transmit demultiplexed at the destination? the strategy used in the Internet to...

  • Homework. Answered Which is not true of the Transmission Control Protocol (TCP)? Multiple answers: You can...

    Homework. Answered Which is not true of the Transmission Control Protocol (TCP)? Multiple answers: You can select more than one option O A it supports full duplex communication o B it has graceful connection shutdown O с its connections are logical D it uses the message paradigm E it is an end-to-end protocol O F None of the above Answered Change your responses to resubmit Match the NIST Framework Category with the Task Premise Response Drag and drop to match...

  • How doe subnetting segments a network to enable better communication. How do you calculate IPv4 subnets...

    How doe subnetting segments a network to enable better communication. How do you calculate IPv4 subnets for a /24 prefix. How do you calculate IPv4 subnets for a /16 and /8 prefix.. How do you create a flexible addressing scheme using variable length subnet masking (VLSM).

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • Choose two applications from the list below. You should make your selections so that you are able...

    Choose two applications from the list below. You should make your selections so that you are able to describe both points of similarity and points of difference when answering the questions that follow. • Electronic file transfer • Electronic mail • Bit-torrent • Internet Relay Chat (IRC) • The Domain Name System (DNS) • IP Telephony (VoIP, not Skype or Facetime, etc.) • Real-time streaming (Not web-based solutions such as Youtube, Facebook, Instagram, etc.) Answer the following questions about both...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT