Practical - 1 NS RollNo-6
Practical - 1 NS RollNo-6
ping
ipconfig
arp –a
netstat
12
11
10
9
8
7
6
5
4
3
2
1
1
2
3
4
5
6
7
8
9
10
11
Tab 1
To enable screen reader support, press Ctrl+Alt+Z To learn about keyboard shortcuts, press Ctrl+slash
netbios
tracert
hostname
nmap
Reference Videos
Page 1 of 29
https://www.youtube.com/watch?v=nH85pddWWAk
https://www.youtube.com/watch?v=rurs7cdT5cc&t=7shttps://www.youtube.com/watch?v=ykz4oUPWACw
Rubrics: Nicely drafted document with clarity in answers leads to full marks. Otherwise, submission carries proportional marks.
----------------------------------------------------------------------------------------------------------------
Refer to the following scenarios and let’s understand What is an IP Address and Purpose of IP Address.
Scenario : 1
In this first scenario, an envelope is sent from sachana to kathlal. But there was some check point like ahmedabad, kathwada and then the envelope is
delivered to kathlal.
Was there any difficulty faced during sending the envelope from sender to receiver ?
Scenario : 2
Page 2 of 29
In this second scenario, the sender was located at Ahmedabad and wanted to send a file to the receiver who was located at Gandhinagar. But at the time of
sending a file to the receiver, the receiver's machine was powered off. So, can the receiver receive the file from the sender or not?
Was there any difficulty faced during sending the file from sender to receiver? If yes then what would be the solution for it.
Scenario: 3
Question:
Page 3 of 29
Scenario: 4
An IP address also acts like a return address on postal mail. When a letter you've mailed is delivered to the wrong address, you get the letter back if you include
a return address on the envelope. The same holds true for email. When you write to an invalid recipient (such as someone who left their job and no longer has
a company email address) your IP address lets the company’s mail server send you back a bounce message so that you know your email wasn't sent to the right
place.
IP Address Types
Basically, there are two primary types of ip address formats used today.
1. IPv4
2. IPv6
Refer to the following diagrams and let’s understand IPv4 Address Representationq
Page 4 of 29
Refer to the following case-study and let’s understand IPv4 Address Structure.
Page 5 of 29
In this scenario, representing a small office network, each network running on TCP must have a unique number, and every machine on it must have a unique IP
address.
An IPv4 address is a 32-bit hierarchical address that is made up of a network portion and a host portion.
When determining the network portion versus the host portion, you must look at the 32-bit stream.
Page 6 of 29
IPv4 Address Structure using Binary format
To identify the network and host portions of an IPv4 address, the subnet mask is compared to the IPv4 address bit by bit, from left to right.
The actual process used to identify the network and host portions is called ANDing.
A prefix length is a less cumbersome method used to identify a subnet mask address.
The prefix length is the number of bits set to 1 in the subnet mask.
It is written in “slash notation” therefore, count the number of bits in the subnet mask and prepend it with a slash.
Page 7 of 29
Types of IPv4 Addresses: Legacy Classful Addressing
Classful address allocation was replaced with classless addressing which ignores the rules of classes (A, B, C).
Redraw above diagram which includes IP address and MAC address. Take IP address and MAC address as per your knowledge. Insert image below.
Page 8 of 29
PC0
Parameter Value
IP address 192.168.1.1
Default Gateway -
PC1
Parameter Value
IP address 192.168.1.2
Default Gateway -
Ipconfig /all: apply command on command prompt and write parameters and values in the following table.
PC0
Parameter Value
IPv6 Address ::
PC1
Parameter Value
IPv6 Address ::
Arp –a: before ping, write output of command from PC0 and PC1 computers
PC0
Parameter Value
PC1
Parameter Value
Page 9 of 29
Ping from PC0 to PC1 and vice versa and insert snap of output here.
Arp –a: after ping, insert snap (below) of output of command from all computers
------------------------------------------------------------------------------------------------------------
Page 10 of 29
Redraw above diagram which includes IP address and MAC address. Take IP address and MAC address as per your instruction. Insert image below.
PC2
Page 11 of 29
Link local IPV6 Address FE80::260:5CFF:FEA7:56A0
IP address 192.168.2.1
Default Gateway ::
Ipconfig /all: apply command on command prompt and write parameters and values in following table.
PC2
Parameter Value
IP address 192.168.2.1
Default Gateway ::
PC3
Parameter Value
IP address 192.168.2.2
Default Gateway ::
PC4
Parameter Value
IP address 192.168.2.3
Default Gateway ::
PC5
Parameter Value
IP address 192.168.2.4
Page 12 of 29
Default Gateway ::
Arp –a: before ping write/snap of output of command from all computers
Page 13 of 29
Page 14 of 29
Ping from PC0 to PC1 and vice versa and get the output here.
Page 15 of 29
Arp –a: after ping write/snap of output of command from all computers
Page 16 of 29
Netstat: write/snap of output of command from all computers
Page 17 of 29
show ip route: write/snap of output of command from all computers
----------------------------------------------------------------------------------------------------------------
Redraw above diagram which includes IP address and MAC address. Take IP address and MAC address as per your instruction. Insert image below.
Page 18 of 29
Ipconfig: fill following table with output of ipconfig of computer.
PC0
IP address 192.168.3.2
PC1
Parameter Value
IP address 192.168.3.3
Ipconfig /all: apply command on command prompt and write parameters and values in following table
PC0
Parameter Value
Page 19 of 29
IP address 192.168.3.2
PC1
Parameter Value
IP address 192.168.3.3
Arp –a: before ping write/snap of output of command from all computers
Page 20 of 29
Ping from PC0 to PC1 and vice versa and get the output here.
Arp –a: after ping write/snap of output of command from all computers
Page 21 of 29
----------------------------------------------------------------------------------------------------------------
It displays the basic IP, subnet mask, and default gateway configuration of a device.
It provides detailed information, including MAC address, DNS, DHCP status, and IPv6 addresses.
The MAC address is a unique identifier for your NIC. It can be found via ipconfig /all.
Page 22 of 29
Which network is configured? Static and Dynamic
What is my gateway?
The default gateway is the IP address of the router interface connected to the device’s network.
What is a hostname?
What is ARPA?
What is NetBIOS?
Page 23 of 29
Gate Questions :
Traceroute reports a possible route that is taken by packets moving from some host A to some other host B. Which of the following options represents the
By progressively querying routers about the next router on the path to B using ICMP packets, starting with the first router
By requiring each router to append the address to the ICMP packet as it is forwarded to B. The list of all routers en-route to B is returned by B in an ICMP reply
packet
By ensuring that an ICMP reply packet is returned to A by each router en-route to B, in the ascending order of their hop distance from A
Which of the following assertions is FALSE about the Internet Protocol (IP)?
IP packets from the same source to the same destination can take different routes in the network
IP ensures that a packet is discarded if it is unable to reach its destination within a given number of hops
The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Consider three IP networks A, B and C. Host HA in network A sends messages each containing 180 bytes of application data to a host HC in network C. The
This passes through an intermediate network B.The maximum packet size, including 20 byte IP header, in each network is:
A: 1000 bytes
B: 100 bytes
C: 1000 bytes
The network A and B are connected through a 1 Mbps link, while B and C are connected by a 512 Kbps link (bps = bits per second).
Assuming that the packets are correctly delivered, how many bytes, including headers, are delivered to the IP layer at the destination for one application
200
220
240
260
Consider three IP networks A, B and C. Host HA in network A sends messages each containing 180 bytes of application data to a host HC in network C. The
TCP layer prefixes 20 byte header to the message. This passes through an intermediate network B. The maximum packet size, including 20 byte IP header, in
A : 1000 bytes
B : 100 bytes
C : 1000 bytes
The network A and B are connected through a 1 Mbps link, while B and C are connected by a 512 Kbps link (bps = bits per second).
What is the rate at which application data is transferred to host HC? Ignore errors, acknowledgments, and other overheads.
325.5 Kbps
354.5 Kbps
409.6 Kbps
512.0 Kbps
In the IPv4 addressing format, the number of networks allowed under Class C addresses is:
Page 24 of 29
214
227
221
224
In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the
datagram, the sequence numbers of the first and the last bytes of the payload, respectively are:
There are n stations in slotted LAN. Each station attempts to transmit with a probability p in each time slot. What is the probability that ONLY one station
np(1 − p)n−1
(1 − p)n−1
p(1 − p)n−1
1 − (1 − p)n−1
The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?
Default Eth2
On which interface will the router forward packets addressed to destinations 128.75.43.16 and 192.12.17.10 respectively?
An organization has a class B network and wishes to form subnets for 64 departments. The subnet mask would be:
255.255.0.0
255.255.64.0
255.255.128.0
255.255.252.0
Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and netmask 255.255.128.0 .C2 has IP address 203.197.75.201 and
The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of
If a class B network on the Internet has a subnet mask of 255.255.248.0 , what is the maximum number of hosts per subnet?
1022
1023
2046
2047
Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use same netmask N. Which of the values of N given
below should not be used if A and B should belong to the same network?
255.255.255.0
255.255.255.128
255.255.255.192
255.255.255.224
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP wants to give half of this
chunk of addresses to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation
of addresses to A and B?
128.96.166.0 255.255.254.0 R2
128.96.164.0 255.255.252.0 R3
0.0.0.0 Default R4
For each IP address in Group I Identify the correct choice of the next hop from Group II using the entries from the routing table above.
Group I Group II
i) 128.96.171.92 a) Interface 0
iii) 128.96.163.151 c) R2
Page 26 of 29
iv) 128.96.164.121 d) R3
e) R4
In the network 200.10.11.144/27 , the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ___________.
Consider three machines M, N, and P with IP addresses 100.10.5.2, 100.10.5.5 , and 100.10.5.6 respectively. The subnet mask is set to 255.255.255.252 for
An organization requires a range of IP address to assign one to each of its 1500 computers. The organization has approached an Internet Service Provider
(ISP) for this task. The ISP uses CIDR and serves the requests from the available IP address space 202.61.0.0/17 . The ISP wants to assign an address space to
the organization which will minimize the number of routing entries in the ISP’s router using route aggregation. Which of the following address spaces are
potential candidates from which the ISP can allot any one of the organization?
202.61.84.0/21
202.61.104.0/21
202.61.64.0/21
202.61.144.0/21
I and II only
I and IV only
A subnet has been assigned a subnet mask of 255.255.255.192 . What is the maximum number of hosts that can belong to this subnet?
14
30
62
126
A company has a class C network address of 204.204.204.0 . It wishes to have three subnets, one with 100 hosts and two with 50 hosts each. Which one of
the following options represents a feasible set of subnet address/subnet mask pairs?
204.204.204.128/255.255.255.192
204.204.204.0/255.255.255.128
204.204.204.64/255.255.255.128
204.204.204.0/255.255.255.192
204.204.204.192/255.255.255.128
204.204.204.64/255.255.255.128
204.204.204.128/255.255.255.128
204.204.204.192/255.255.255.192
204.204.204.224/255.255.255.192
Page 27 of 29
204.204.204.128/255.255.255.128
204.204.204.64/255.255.255.192
204.204.204.0/255.255.255.192
A subnetted Class B network has the following broadcast address: 144.16.95.255. Its subnet mask
is necessarily 255.255.224.0
is necessarily 255.255.240.0
is necessarily 255.255.248.0
Host X has IP address 192.168.1.97 and is connected through two routers R1 and R2 to another host Y with IP address 192.168.1.80. Router R1 has IP
addresses 192.168.1.135 and 192.168.1.110 . R2 has IP addresses 192.168.1.67 and 192.168.1.155 . The netmask used in the network is 255.255.255.224 .
Given the information above, how many distinct subnets are guaranteed to already exist in the network?
Host X has IP address 192.168.1.97 and is connected through two routers R1 and R2 to another host Y with IP address 192.168.1.80. Router R1 has IP
addresses 192.168.1.135 and 192.168.1.110 . R2 has IP addresses 192.168.1.67 and 192.168.1.155 . The netmask used in the network is 255.255.255.224 .
192.168.1.67
192.168.1.110
192.168.1.135
192.168.1.155
A computer on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. It is initially filled to capacity with 16
Megabits. What is the maximum duration for which the computer can transmit at the full 10 Mbps?
1.6 seconds
2 seconds
5 seconds
8 seconds
For a host machine that uses the token bucket algorithm for congestion control, the token bucket has a capacity of 1 megabyte and the maximum output
rate is 20 megabytes per second. Tokens arrive at a rate to sustain output at a rate of 10 megabytes per second. The token bucket is currently full and the
machine needs to send 12 megabytes of data. The minimum time required to transmit the data is ________________ seconds.
In the diagram shown below, L1 is an Ethernet LAN and L2 is a Token-Ring LAN. An IP packet originates from sender S and traverses to R, as shown. The links
within each ISP and across the two ISPs, are all point-to-point optical links. The initial value of the TTL field is 32. The maximum possible value of the TTL
Page 28 of 29
Page 29 of 29