Answer the following questions with citing references :-
1. What are the 3 private IP address ranges for IPv4? How many usable IP addresses does each range have?
2. What is the purpose of private IP addresses (sometimes incorrectly called non-routable IP addresses)? How are they used?
3. What are the components of MAC addresses? How are MAC addresses assigned?
4. What is a layer 3 / multilayer ethernet switch? How does it differ from a traditional switch? Why does the name "layer 3 switch" seem somewhat odd at first glance?
1. 3 private IP address ranges
2. We need private IP because the total amount public IP addresses quickly grow too big . The total number available is 3000 million addresses after taking out the reserved ranges. You can probably imagine that this easily outstrips the number of devices that need to connect to the Internet.so to overcome this we have private IP address which works behind a single public IP.
3. Media Access Control address is a universal number assigned to devices which is connected to a network, and also we can referred as physical address. MAC addresses are 6-byte (48-bits) in length.The first 3-bytes are ID number of the manufacturer, which is assigned by an ISP . The second 3-bytes are serial number assigned by the manufacturer.
Before a manufacturer can build products that connects to network , it must ask the IEEE to assign the manufacturer a universally unique 3-byte code, called the organizationally unique identifier (OUI). then the manufacturer usually give a number called network interface controller (NIC) by combining OUI and NIC ,MAC forms.
4. Layer 3 switch is capable of having IP addresses and doing routing. For extra-VLAN communication, it uses the IP routing table. For intra-VLAN communication, it uses the MAC address table.but other switches like Layer 2 uses only MAC addresses to switch the packets from a port to the destination port.Layer 3 switches is widely used to improve network routing performance on large local area networks
Answer the following questions with citing references :- 1. What are the 3 private IP address...
Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, for questions #1, #2 and #3. For each device, both its Internet Protocol (IP) address and its MAC address (also called the Physical address or the Ethernet address) are shown. The Subnet Mask used by all devices is 255.255.255.192 (which is same as prefix length “/26”). (5 points) Assuming that Client #1 sent a packet to Client #3 and then Client #3 sent a packet...
2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...
Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...
Addressing Table MAC Address Switch Interface Interface Device 0001.6458.2501 GO/1 Gg0/0 N/A Router0 SOO/0 N/A O0EO.F7B1.8901 GO/D G0/1 Router1 S0/0/0 N/A N/A 0060.2F84.4AB6 Wireless FO/2 10.10.10.2 0060.4706.572B Wireless FO/2 10.10.10.3 000C.85CC. 1DA7 FO FO/1 172.16.31.2 0060.7036.2849 FO FO/2 172.16.31.3 0002.1640.8D75 GO FO/3 172.16.31.4 Part 1: Examine an ARP Request Task 1: Generate ARP requests by pinging 172.16.31.3 from 172.16.31 2 Click 172.16.31.2 and open the Command Prompt. Enter the arp -d command to clear the ARP table. Enter Simulation mode...
1. Change the IP multicast address 233.50.18.2 to Ethernet multicast addresses. . 2. Answer the following question about client-server programs: a. Which program is running on the local machine b. Which program is running on the remote machine (client or server)? c. Which program is an infinitive program (client or server)? d. Which program is a finite program (client or server)? . 3. The following is a dump of a UDP header in hexadecimal format: CB820045007C12B2 a. What is the...
(1) Computer hosts usually have two addresses, an Internet Protocol (IP) address and an Ethernet Media Access Control (MAC) address. For the benefit of humans, the IP address is normally represented as a dotted decimal notation, such as 192.168.10.2. Each of the decimal octets in the address or a mask can be converted to 8 binary bits. Remember that the computer only understands binary bits. If all 4 octets were converted to binary, how many bits would there be? (2)...
1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...
Networking This week we focus on introducing Networking & Terminologies. Answer the following Questions? 1. What is a Network? outline the two network media you know? 2. Why do we setup a network? 3. What does ISO do? 4. Name the various network typologies you learned about in class? 5. What doe LAN stand for? Practical you did in class? · What command did you use to get your IP address? o What command did you use to get your...
CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...