0% found this document useful (0 votes)
139 views10 pages

Ict 120 - Task 2 Individual Assessment

The document discusses IP addressing and subnetting. It provides answers to four questions related to determining network IDs, subnet masks, host ranges, and the role of routers. Specific examples and explanations are given for IP address 192.168.4.0/24 and 10.50.229.66/23 to illustrate the concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views10 pages

Ict 120 - Task 2 Individual Assessment

The document discusses IP addressing and subnetting. It provides answers to four questions related to determining network IDs, subnet masks, host ranges, and the role of routers. Specific examples and explanations are given for IP address 192.168.4.0/24 and 10.50.229.66/23 to illustrate the concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

ICT 120 –TASK 2 INDIVIDUAL ASSESSMENT

Table of Contents
Introduction...............................................................................................................................3

Answer to Q1..............................................................................................................................3

Answer to Q2..............................................................................................................................5

Answer to Q3..............................................................................................................................5

Answer to Q4..............................................................................................................................7

Conclusion..................................................................................................................................8

Reference List...........................................................................................................................10

Page 2
Introduction

A number label for a device connected to a computer network which uses an Internet
Protocol is an Internet Protocol address. A host or network interface identifier and location
addressing are presented with two key features of an IP address. The IP is a protocol or
series of guidelines for transmitting and handling data packets to ensure that they are able
to pass across the networks to meet the right destination. Internet-crossing data is split into
smaller bits, known as packets. Two key functions are provided to an IP address: host or
network interfaces ID and information system.

Answer to Q1

For the IP address 192.168.4.0 and Net mask 24, there should be some relevant process to
determine the Network ID, Subnet mask or Host ID rang and many more things (Friedman et
al. 2018).

For subnet range

Borrow the 2bits of the address, like

A A B B B B B B

Number subnet = 22=4

Which means it stands for 00000100

And for subnet mask, 2bit is equal to 192 (128+64) = 11000000

Hosts and Subnets

Two bits steal

A A B B B B B B

Subnet Number = 22 = four.

= 2 bits = 128 + 64 = 192 Subnet Mask

Hosts set = 26 = 64

Usable Range

ID of Network

0-63

Page 3
64 – 127

65 – 127 65-126 [Usable range]

128-129 129-190 [Usable range]

192 – 255 Transmitted

For the specification of Intelli Publishing mentioned the network ID 192.168.4.0 with net
mask 24

The address is: 192.168.4.0 11000000.10101000.00000100.00000000

Netmask: 255.255.255.0 which means it is by default 24


111111.111111.111111.00000000

Wildcard: 0.0.0.255 000000.000000.000000.11111111

Network: 192.168.4.0 the initial 110 denotes that it is class C network category.

Broadcast: 192.168.4.1

Hostmin: 192.168.4.1

HostMax: 192.168.4.254

Host: 254 (Internet type: Private)

By using this given case scenario, the best way to explain the sub netting process is to
calculate it (Panda and Agrawal 2019). The default subnet mask is 255.255.255.0 for Intelli
publishing, e.g.it has an address for the 192.168.4.0 network. It is necessary that sub netting
is carried out, so that we can build as many subsets as possible in each subnet with 30 hosts.
The first step is to decide how many bits we have to borrow from the host component so
that the minimum requirement of 30 hosts per subnet is met. Using the same formula,

2n-2

It can measure exactly how many bits are required to have 30 host addresses in any subnet.
In the host addressing scheme the remaining 25 -2=30, so 5 bits at least must be usable for
generating subset addresses (Vegoda 2017). The -2 represents the sub network address and
the transmitting address which cannot be allocated to hosts in the formula for two
individuals. The core network 192.168.116.0/24 has eight bits, we reserve five bits for the
current host component and the other three bits are now used to build sub networks.

Using this method to build and implement:

2n = subnet number

Where exponent n is host component borrowed bits.

So it can create 23 = 8 subnets in this case.

Page 4
Our second stage is the estimation of the current subnet mask, which is 255.255.255.0 or
1111111111111.111111.000000 binary for our previous subnet mask. Our new subnet mask
will be 11111111111.11111.11111111.1111111.111.0000 when translated to decimal
notation as we have borrowed three bits from the host segment. The third step is to
evaluate the relatively basic subnet multiplier. The last “non-zero octet of the subnet mask”
is clearly to be deleted from 256 (Unbehagen 2016). But our subnet multiplier is 256-224 =
32 in this case. In the next section, we can use the subnet multiplier.

Answer to Q2

In this situation where the host 10.50.229.66/23 then it is clear that the Net mask is 23 and
there will be some specification to determine the Network ID.

If IP address = 10.50.229.66(convert this host into binary form)

= 00001010.00110010.11100101.10000001

Subnet mask = 11111111.11111111.11111111.01000010

Bit Wise AND = 11000001.00000001.00000010.10000000

Therefore, Network ID = 10.50.228.0 where the Net mask will be remain same 23

And that’s for the binary representation will be 00001010.00110010.1110010 0.00000000,


where the initial 0 is denoted the Class A network.

The IP address is 10.50.229.66 and the subnet mask is 23. The /23 fits the 255.255.255.0
subnet mask (Christenson. and Venuto 2017). The IP address consists of 4 decimal positions
– known as octets – surrounded by triangles. There are 8 bits in one octet, so IPv4 is a 32-bit
address. A number between 0 and 255 can be used for each bit. The whole last octet is host
bits in this scenario. Thus, the transmitted address in this case will be 10.50.229.255 – such
that all host bits at 1.

Broadcast 10.50.229.255 where the decimal representation will be


00001010.00110010.1110010 1.11111111

Minimum host in this network 10.50.228.1 Binary representation


00001010.00110010.1110010 1.11111110

And the Maximum host in this network will be 10.50.229.254; the broadcast capacity is 255
so the minimum hosting network will be start from 1 and ends with 254 (Melick et al. 2018).
The total is equal to the actual broadcast.

This will be the actual scenario which is given by the network technician. In this case it is
determine the new network will the Class A category where the broadcast and host number
will be upgraded and it will provide a bigger service in the Intelli Publishing.

Page 5
Answer to Q3

The method of sub netting splits one network into some divided small amount of networks.
The smaller networks are generally called sub networks and a single segment (more
frequently called a subnet) is a subnet. Subnet is a subnet. Could machine linked to a subnet
share the same part of an IP address (Ranta 2019). The exchanged knowledge is called a
routing prefix, and the Routing Prefix is called a subnet mask in IPV4 (Internet Protocol
Version 4). The subnet mask is a "quad-dotted decimal graphic."

For the specified network design of 172.31.0.0 ID, with consists of 1000 subnets, then in this
case the Net mask will be 255.255.254.0 where the binary formation of this classified
network will be 10101100.00011111.0000000 0.00000000. The network ID started with 10
which denotes it is classified in class B.

Figure 1: The Subnet specification for Class B Network ID

(Source: cloudaccess.net, 2018)

Because this is the class B network so the Network ID will be 16 bit and the subnet is 1000 in
this designed network, so there will be 2 10 which will be determined the destination subnets
in this system (Kaplinger et al. 2017). First number is Network identifier, and last number is
the transmitting identifier of any subnet that cannot be delegated to either host. The

Page 6
number of sub nets and hosts the network architecture required does not come with the
same number of sub networks. The next higher number is to be sought.

Answer to Q4
A router is a network system that transmits data packets through computer networks. Two
or three separate networks are normally linked to this system. When a router port is
reached with a data packet, the router reads packet address information to decide the path
to be attached to the packet. For one, by connecting your LAN to the Internet, a router gives
to the Internet access (Bajaria et al. 2020). When the packet enters a router, the Domain
name of the packet received is checked and route decisions should be made if necessary.
Routers employ routing information to specify which packet interface is sent. All routes
described for the routes are listed in a table. Any router has a special routing table located
in the RAM of the system.

Figure 2: Routing table

(Source: geeksforgeeks.org, 2018)

The default gateway setup entry is a network endpoint of 0.0.0.0 with a network mask of
0.0.0.0. The default Subnet Mask is 255.255.255.255.

The routing table provides the requisite information to send a packet to its destination in
the best possible way. -- Packet includes origin and destination information. The routing
table gives the computer instructions to deliver the packet on the network path.

The following entries are made for each entry in the routing table:

Network ID:

A route-related network ID or end point

Mask of the Subnet:

The mask used for matching an IP address of destination with a network Name.

Near Hop: Next Hop

The IP address the packet is sent to

API output:

The packet can go out to the destination network via outgoing interface.

Page 7
PHILDRE:

The minimum number of hops (routers crossed) to a network ID should be suggested as a


standard use of this metric.

To Ping a web server through a switch from the computer, it can be done through some
process and the process will determine with the system’s Network ID, host and many more
things. A 0.0.0 network endpoint with netmask of 0.0.0 is the entry corresponding to the
regular gateway setup. The defaunet Subnet Mask the ping command sends data packets to
a particular network IP address, which then helps you to know how long the data is
expected to send and to receive a response. It is a helpful tool to easily monitor the
network's different points.

The Windows command prompt will be used in this case. However, the Ping command can
also be used in Windows PowerShell, the macOS or the Linux distro terminal programme. If
the real instruction is used, wherever it does the same way.

Tap Windows+R on Windows. Type "cmd" into the search box and press Enter in the Run
browser.

Press "ping" mostly with URL or IP address users choose to ping on either the screen, then
select Enter. In the following photo, we are having a regular answer to www.google.com.

The response displays the URL, the IP address and the packet size you send on the first line,
you are pinging (Tatlicioglu et al. 2018). Over the next four sections you will find the answer
period (in milliseconds) for the answer and the time to live (TTL), which is a time needed to
deactivate the packet. The next four lines represent the responses from each specific
packet.

Below is a list of the number of packets sent through collected and the low, median and
standard responsiveness.

We can also use your IP address to ping the router in the following picture on our local
network. The system gets a standard answer from it as well.

It helps you aware that when the ping tool does not receive a reaction from any system you
ping, too.

And ping is the easiest way to do it. Naturally, like most controls, certain specialised buttons
can be used to make things shift a little. For starters, before you stop the command you can
hold a target ping, specify the number of times it needs ping, specify how many times the
command requires ping and more. But without any very basic kinds of troubleshooting, you
won't have to think about these sophisticated switches.

Traceroute is a tool for diagnostics that shows a packet's direction and transit delays from
your computer to a local or Internet IP address or DNS name. It starts to break down
increasing hop on a packet path, shown IP and DNS information for each hop from source to
destination.

Page 8
Conclusion
It is concluded that this discussion on the Intelli Publishing was the main focus and for this
organization the network configuration is the main challenge in this case. The relation of
host, IP address, and broadcast is thoroughly discussed and evaluated with the calculation.
The IP is a protocol or series of guidelines for transmitting and handling data packets to
ensure that they are able to pass across the networks to meet the right destination.
Internet-crossing data is split into smaller bits, known as packets. Two key functions are
provided to an IP address: host or network interfaces ID and information system.

Page 9
Reference List
Friedman, R.B., Parekh, S.M., Tibrewala, N.K. and Lutch, B., Digital Envoy Inc, 2018. Method
and system for generating IP address profiles. U.S. Patent 9,900,284.
Panda, P.K. and Agrawal, D., Juniper Networks Inc, 2019. Establishing a connection to
multiple network devices using a single internet protocol (IP) address. U.S. Patent
10,270,692.
Vegoda, L., 2017. Updates to the Special-Purpose IP Address Registries.
Unbehagen, P., Allan, D. and Bragg, N., RPX Clearinghouse LLC, 2016. IP forwarding across a
link state protocol controlled ethernet network. U.S. Patent 9,432,213.
Christenson, D.A. and Venuto, J., International Business Machines Corp, 2017. Duplicate IP
address detection by a DHCP relay agent. U.S. Patent 9,774,487.
Melick, B.D., Snyder, D.M. and Baych, L.D., Lightwaves Systems Inc, 2018. Method for
routing data packets using an IP address based on geo position. U.S. Patent 9,900,734.
Ranta, T.J., Facebook Inc, 2019. Internet Protocol (IP) Address Assignment. U.S. Patent
Application 15/643,371.
Kaplinger, T.E., Lentz, J.L., Mitchell, C.C. and Shook, A.K., International Business Machines
Corp, 2017. Automatically replacing localhost as hostname in URL with fully qualified
domain name or IP address. U.S. Patent 9,565,161.
Bajaria, V., Shah, P., Vijayvargiya, N. and Chang, D., Sense Insights Inc, 2020. De-anonymizing
an anonymous IP address by aggregating events into mappings where each of the mappings
associates an IP address shared by the events with an account. U.S. Patent 10,536,427.
Tatlicioglu, S., Civanlar, S., Balci, M., Lokman, E., Gorkemli, B. and Kaytaz, B., Argela Yazilim
ve Bilisim Teknolojileri San ve Tic AS, 2018. Anonymous communications in software-defined
networks via route hopping and IP address randomization. U.S. Patent 10,084,756.

Page 10

You might also like