0% found this document useful (0 votes)
40 views29 pages

Practical - 1 NS RollNo-6

Uploaded by

Devarshi kansara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views29 pages

Practical - 1 NS RollNo-6

Uploaded by

Devarshi kansara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Practical-1

AIM: Allocating IP address to network topologies

Student should be able to apply IP addresses to

Topology: two directly connected computers

Topology: four computers connected by switches

Topology: two networks connected by Router

Various networking commands:

ping

ipconfig

arp –a

netstat
12
11
10
9
8
7
6
5
4
3
2
1
1
2
3
4
5
6
7
8
9
10
11

Tab 1

Turn on screen reader support

To enable screen reader support, press Ctrl+Alt+Z To learn about keyboard shortcuts, press Ctrl+slash

Networking Command Line Tools

netbios

tracert

hostname

nmap

Reference Videos

IP address assignment in Video: Connecting 3 routers in Cisco Packet Tracer

Reference for commands:

Basic Networking Commands (Part 1)

Page 1 of 29
https://www.youtube.com/watch?v=nH85pddWWAk

https://www.youtube.com/watch?v=rurs7cdT5cc&t=7shttps://www.youtube.com/watch?v=ykz4oUPWACw

Rubrics: Nicely drafted document with clarity in answers leads to full marks. Otherwise, submission carries proportional marks.

Recommended to type, avoid copy-paste to increase your typing skill.

----------------------------------------------------------------------------------------------------------------

Refer to the following scenarios and let’s understand What is an IP Address and Purpose of IP Address.

Scenario : 1

In this first scenario, an envelope is sent from sachana to kathlal. But there was some check point like ahmedabad, kathwada and then the envelope is

delivered to kathlal.

Justify the following statement.

Was there any difficulty faced during sending the envelope from sender to receiver ?

Scenario : 2

Page 2 of 29
In this second scenario, the sender was located at Ahmedabad and wanted to send a file to the receiver who was located at Gandhinagar. But at the time of

sending a file to the receiver, the receiver's machine was powered off. So, can the receiver receive the file from the sender or not?

Justify the following statement.

Was there any difficulty faced during sending the file from sender to receiver? If yes then what would be the solution for it.

Scenario: 3

Refer the above image, and justify your answer

Question:

Can the envelope be sent to the proper destination?

Page 3 of 29
Scenario: 4

An IP address also acts like a return address on postal mail. When a letter you've mailed is delivered to the wrong address, you get the letter back if you include

a return address on the envelope. The same holds true for email. When you write to an invalid recipient (such as someone who left their job and no longer has

a company email address) your IP address lets the company’s mail server send you back a bounce message so that you know your email wasn't sent to the right

place.

From the above all scenarios, what would be the conclusion?

IP Address Types

Basically, there are two primary types of ip address formats used today.

1. IPv4

2. IPv6

Refer to the following diagrams and let’s understand IPv4 Address Representationq

Page 4 of 29
Refer to the following case-study and let’s understand IPv4 Address Structure.

Page 5 of 29
In this scenario, representing a small office network, each network running on TCP must have a unique number, and every machine on it must have a unique IP

address.

An IPv4 address is a 32-bit hierarchical address that is made up of a network portion and a host portion.

When determining the network portion versus the host portion, you must look at the 32-bit stream.

A subnet mask is used to determine the network and host portions.

IPv4 Address Structure

Page 6 of 29
IPv4 Address Structure using Binary format

IPv4 Address Structure : Subnet Mask

To identify the network and host portions of an IPv4 address, the subnet mask is compared to the IPv4 address bit by bit, from left to right.

The actual process used to identify the network and host portions is called ANDing.

IPv4 Address Structure: Prefix Length

A prefix length is a less cumbersome method used to identify a subnet mask address.

The prefix length is the number of bits set to 1 in the subnet mask.

It is written in “slash notation” therefore, count the number of bits in the subnet mask and prepend it with a slash.

Page 7 of 29
Types of IPv4 Addresses: Legacy Classful Addressing

Classful addressing wasted many IPv4 addresses.

Classful address allocation was replaced with classless addressing which ignores the rules of classes (A, B, C).

Exercise-1(Note: Start allocation IP address number from PC0)

Redraw above diagram which includes IP address and MAC address. Take IP address and MAC address as per your knowledge. Insert image below.

<<Image from student>>

Ipconfig: fill table ipconfig of all computers

Page 8 of 29
PC0

Parameter Value

Link local IPV6 Address FE80::201:97FF:FE20:945

IP address 192.168.1.1

Subnet Mask 255.255.255.0

Default Gateway -

PC1

Parameter Value

Link local IPV6 Address FE80::290:2BFF:FE2E:6BDA

IP address 192.168.1.2

Subnet Mask 255.255.255.0

Default Gateway -

Ipconfig /all: apply command on command prompt and write parameters and values in the following table.

PC0

Parameter Value

Physical Address 00E0.F97C.BDBD

Link-local IPv6 Address FE80::2E0:F9FF:FE7C:BDBD

IPv6 Address ::

IPv4 Address 192.168.1.1

Subnet Mask 255.255.255.0

PC1

Parameter Value

Physical Address 00D0.BC2D.EB19

Link-local IPv6 Address FE80::2D0.BCFF:FE2D:EB19

IPv6 Address ::

IPv4 Address 192.168.1.2

Subnet Mask 255.255.255.0

Arp –a: before ping, write output of command from PC0 and PC1 computers

PC0

Parameter Value

PC1

Parameter Value

Page 9 of 29
Ping from PC0 to PC1 and vice versa and insert snap of output here.

Arp –a: after ping, insert snap (below) of output of command from all computers

Netstat: insert snap of output of command from all computers

------------------------------------------------------------------------------------------------------------

Exercise-2: (Note: Start allocation IP address number from PC0)

Page 10 of 29
Redraw above diagram which includes IP address and MAC address. Take IP address and MAC address as per your instruction. Insert image below.

Ipconfig: fill table ipconfig of all computers

PC2

Page 11 of 29
Link local IPV6 Address FE80::260:5CFF:FEA7:56A0

IP address 192.168.2.1

Subnet Mask 255.255.255.0

Default Gateway ::

Similarly Prepare for PC1, PC2 and PC3

Ipconfig /all: apply command on command prompt and write parameters and values in following table.

PC2

Parameter Value

Link local IPV6 Address FE80::260:5CFF:FEA7:56A0

IP address 192.168.2.1

Subnet Mask 255.255.255.0

Default Gateway ::

PC3

Parameter Value

Link local IPV6 Address FE80::260:2FFF:FE24:B7BD

IP address 192.168.2.2

Subnet Mask 255.255.255.0

Default Gateway ::

PC4

Parameter Value

Link local IPV6 Address FE80::20C:CFFF:FE8A:A4C4

IP address 192.168.2.3

Subnet Mask 255.255.255.0

Default Gateway ::

PC5

Parameter Value

Link local IPV6 Address FE80::201:43FF:FEC1:CD04

IP address 192.168.2.4

Subnet Mask 255.255.255.0

Page 12 of 29
Default Gateway ::

Arp –a: before ping write/snap of output of command from all computers

Page 13 of 29
Page 14 of 29
Ping from PC0 to PC1 and vice versa and get the output here.

Page 15 of 29
Arp –a: after ping write/snap of output of command from all computers

Page 16 of 29
Netstat: write/snap of output of command from all computers

Page 17 of 29
show ip route: write/snap of output of command from all computers

----------------------------------------------------------------------------------------------------------------

Exercise-3 (Note: Start allocation IP address number from PC0)

Redraw above diagram which includes IP address and MAC address. Take IP address and MAC address as per your instruction. Insert image below.

Page 18 of 29
Ipconfig: fill following table with output of ipconfig of computer.

PC0

Link local IPV6 Address FE80::260:47FF:FEC5:6A8

IP address 192.168.3.2

Subnet Mask 255.255.255.0

Default Gateway 192.168.3.1

PC1

Parameter Value

Link local IPV6 Address FE80::250:FFF:FE6E:70C0

IP address 192.168.3.3

Subnet Mask 255.255.255.0

Default Gateway 192.168.3.1

Ipconfig /all: apply command on command prompt and write parameters and values in following table

PC0

Parameter Value

Link local IPV6 Address FE80::260:47FF:FEC5:6A8

Page 19 of 29
IP address 192.168.3.2

Subnet Mask 255.255.255.0

Default Gateway 192.168.3.1

PC1

Parameter Value

Link local IPV6 Address FE80::250:FFF:FE6E:70C0

IP address 192.168.3.3

Subnet Mask 255.255.255.0

Default Gateway 192.168.3.1

Arp –a: before ping write/snap of output of command from all computers

Page 20 of 29
Ping from PC0 to PC1 and vice versa and get the output here.

Arp –a: after ping write/snap of output of command from all computers

Netstat: write/snap of output of command from all computers

show ip route: write/snap of output of command from all computers

Page 21 of 29
----------------------------------------------------------------------------------------------------------------

Write answers to the following questions.

What are the conclusions of the ipconfig command?

It displays the basic IP, subnet mask, and default gateway configuration of a device.

What are the conclusions of ipconfig /all commands?

It provides detailed information, including MAC address, DNS, DHCP status, and IPv6 addresses.

What are the conclusions of arp -a command before ping?

The ARP table is empty as no communication has occurred.

What are the conclusions of netstat -r command after ping?

It displays the routing table used for network traffic.

What is my MAC address?

The MAC address is a unique identifier for your NIC. It can be found via ipconfig /all.

Page 22 of 29
Which network is configured? Static and Dynamic

This exercise uses static IP configuration.

What is my gateway?

The default gateway is the IP address of the router interface connected to the device’s network.

What is a hostname?

The unique name assigned to a device in the network.

What is my IPv6 address?

Found via ipconfig or ipconfig /all.

What is ARPA?

Address Resolution Protocol (ARP) resolves IP addresses to MAC addresses.

What is a loopback address?

The IP 127.0.0.1, used for testing a device's network stack.

What does Port 80 mean?

Port 80 is the default port for HTTP traffic.

What is the difference between logical address and physical address?

 Logical address: IP address.

 Physical address: MAC address.

What is NetBIOS?

A protocol for network communication on Windows-based networks.

Page 23 of 29
Gate Questions :

Traceroute reports a possible route that is taken by packets moving from some host A to some other host B. Which of the following options represents the

technique used by traceroute to identify these hosts:

By progressively querying routers about the next router on the path to B using ICMP packets, starting with the first router

By requiring each router to append the address to the ICMP packet as it is forwarded to B. The list of all routers en-route to B is returned by B in an ICMP reply

packet

By ensuring that an ICMP reply packet is returned to A by each router en-route to B, in the ascending order of their hop distance from A

By locally computing the shortest path from A to B

Which of the following assertions is FALSE about the Internet Protocol (IP)?

It is possible for a computer to have multiple IP addresses

IP packets from the same source to the same destination can take different routes in the network

IP ensures that a packet is discarded if it is unable to reach its destination within a given number of hops

The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Consider three IP networks A, B and C. Host HA in network A sends messages each containing 180 bytes of application data to a host HC in network C. The

TCP layer prefixes 20 byte header to the message.

This passes through an intermediate network B.The maximum packet size, including 20 byte IP header, in each network is:

A: 1000 bytes

B: 100 bytes

C: 1000 bytes

The network A and B are connected through a 1 Mbps link, while B and C are connected by a 512 Kbps link (bps = bits per second).

Assuming that the packets are correctly delivered, how many bytes, including headers, are delivered to the IP layer at the destination for one application

message, in the best case? Consider only data packets.

200

220

240

260

Consider three IP networks A, B and C. Host HA in network A sends messages each containing 180 bytes of application data to a host HC in network C. The

TCP layer prefixes 20 byte header to the message. This passes through an intermediate network B. The maximum packet size, including 20 byte IP header, in

each network, is:

A : 1000 bytes

B : 100 bytes

C : 1000 bytes

The network A and B are connected through a 1 Mbps link, while B and C are connected by a 512 Kbps link (bps = bits per second).

What is the rate at which application data is transferred to host HC? Ignore errors, acknowledgments, and other overheads.

325.5 Kbps

354.5 Kbps

409.6 Kbps

512.0 Kbps

In the IPv4 addressing format, the number of networks allowed under Class C addresses is:

Page 24 of 29
214

227

221

224

Correct options. need to be changed.

In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the

datagram, the sequence numbers of the first and the last bytes of the payload, respectively are:

Last fragment, 2400 and 2789

First fragment, 2400 and 2759

Last fragment, 2400 and 2759

Middle fragment, 300 and 689

There are n stations in slotted LAN. Each station attempts to transmit with a probability p in each time slot. What is the probability that ONLY one station

transmits in a given time slot?

np(1 − p)n−1

(1 − p)n−1

p(1 − p)n−1

1 − (1 − p)n−1

The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?

172.57.88.62 and 172.56.87.23

10.35.28.2 and 10.35.29.4

191.203.31.87 and 191.234.31.88

128.8.129.43 and 128.8.161.55

The routing table of a router is shown below:

Destination Subnet Mask Interface

128.75.43.0 255.255.255.0 Eth0

128.75.43.0 255.255.255.128 Eth1

192.12.17.5 255.255.255.255 Eth3

Default Eth2

On which interface will the router forward packets addressed to destinations 128.75.43.16 and 192.12.17.10 respectively?

Eth1 and Eth2

Eth0 and Eth2

Eth0 and Eth3

Eth1 and Eth3

An organization has a class B network and wishes to form subnets for 64 departments. The subnet mask would be:

255.255.0.0

255.255.64.0

255.255.128.0

255.255.252.0

Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and netmask 255.255.128.0 .C2 has IP address 203.197.75.201 and

netmask 255.255.192.0 . Which one of the following statements is true?

C1 and C2 both assume they are on the same network

C2 assumes C1 is on same network, but C1 assumes C2 is on a different network

C1 assumes C2 is on same network, but C2 assumes C1 is on a different network


Page 25 of 29
C1 and C2 both assume they are on different networks.

The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of

hosts in each subnet?

62 subnets and 262142 hosts.

64 subnets and 262142 hosts.

62 subnets and 1022 hosts.

64 subnets and 1024 hosts.

If a class B network on the Internet has a subnet mask of 255.255.248.0 , what is the maximum number of hosts per subnet?

1022

1023

2046

2047

Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use same netmask N. Which of the values of N given

below should not be used if A and B should belong to the same network?

255.255.255.0

255.255.255.128

255.255.255.192

255.255.255.224

An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP wants to give half of this

chunk of addresses to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation

of addresses to A and B?

245.248.136.0/21 and 245.248.128.0/22

245.248.128.0/21 and 245.248.128.0/22

245.248.132.0/22 and 245.248.132.0/21

245.248.136.0/24 and 245.248.132.0/21

Consider the following routing table at an IP router:

Network No Net Mask Next Hop

128.96.170.0 255.255.254.0 Interface 0

128.96.168.0 255.255.254.0 Interface 1

128.96.166.0 255.255.254.0 R2

128.96.164.0 255.255.252.0 R3

0.0.0.0 Default R4

For each IP address in Group I Identify the correct choice of the next hop from Group II using the entries from the routing table above.

Group I Group II

i) 128.96.171.92 a) Interface 0

ii) 128.96.167.151 b) Interface 1

iii) 128.96.163.151 c) R2

Page 26 of 29
iv) 128.96.164.121 d) R3

e) R4

i-a, ii-c, iii-e, iv-d

i-a, ii-d, iii-b, iv-e

i-b, ii-c, iii-d, iv-e

i-b, ii-c, iii-e, iv-d

In the network 200.10.11.144/27 , the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ___________.

Consider three machines M, N, and P with IP addresses 100.10.5.2, 100.10.5.5 , and 100.10.5.6 respectively. The subnet mask is set to 255.255.255.252 for

all the three machines. Which one of the following is true?

M, N, and P all belong to the same subnet

Only M and N belong to the same subnet

Only N and P belong to the same subnet

M, N, and P belong to three different subnets

An organization requires a range of IP address to assign one to each of its 1500 computers. The organization has approached an Internet Service Provider

(ISP) for this task. The ISP uses CIDR and serves the requests from the available IP address space 202.61.0.0/17 . The ISP wants to assign an address space to

the organization which will minimize the number of routing entries in the ISP’s router using route aggregation. Which of the following address spaces are

potential candidates from which the ISP can allot any one of the organization?

202.61.84.0/21

202.61.104.0/21

202.61.64.0/21

202.61.144.0/21

I and II only

II and III only

III and IV only

I and IV only

A subnet has been assigned a subnet mask of 255.255.255.192 . What is the maximum number of hosts that can belong to this subnet?

14

30

62

126

A company has a class C network address of 204.204.204.0 . It wishes to have three subnets, one with 100 hosts and two with 50 hosts each. Which one of

the following options represents a feasible set of subnet address/subnet mask pairs?

204.204.204.128/255.255.255.192

204.204.204.0/255.255.255.128

204.204.204.64/255.255.255.128

204.204.204.0/255.255.255.192

204.204.204.192/255.255.255.128

204.204.204.64/255.255.255.128

204.204.204.128/255.255.255.128

204.204.204.192/255.255.255.192

204.204.204.224/255.255.255.192

Page 27 of 29
204.204.204.128/255.255.255.128

204.204.204.64/255.255.255.192

204.204.204.0/255.255.255.192

A subnetted Class B network has the following broadcast address: 144.16.95.255. Its subnet mask

is necessarily 255.255.224.0

is necessarily 255.255.240.0

is necessarily 255.255.248.0

could be any one of 255.255.224.0 , 255.255.240.0 ,255.255.248.0

Host X has IP address 192.168.1.97 and is connected through two routers R1 and R2 to another host Y with IP address 192.168.1.80. Router R1 has IP

addresses 192.168.1.135 and 192.168.1.110 . R2 has IP addresses 192.168.1.67 and 192.168.1.155 . The netmask used in the network is 255.255.255.224 .

Given the information above, how many distinct subnets are guaranteed to already exist in the network?

Host X has IP address 192.168.1.97 and is connected through two routers R1 and R2 to another host Y with IP address 192.168.1.80. Router R1 has IP

addresses 192.168.1.135 and 192.168.1.110 . R2 has IP addresses 192.168.1.67 and 192.168.1.155 . The netmask used in the network is 255.255.255.224 .

Which IP address should X configure its gateway as?

192.168.1.67

192.168.1.110

192.168.1.135

192.168.1.155

A computer on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. It is initially filled to capacity with 16

Megabits. What is the maximum duration for which the computer can transmit at the full 10 Mbps?

1.6 seconds

2 seconds

5 seconds

8 seconds

For a host machine that uses the token bucket algorithm for congestion control, the token bucket has a capacity of 1 megabyte and the maximum output

rate is 20 megabytes per second. Tokens arrive at a rate to sustain output at a rate of 10 megabytes per second. The token bucket is currently full and the

machine needs to send 12 megabytes of data. The minimum time required to transmit the data is ________________ seconds.

In the diagram shown below, L1 is an Ethernet LAN and L2 is a Token-Ring LAN. An IP packet originates from sender S and traverses to R, as shown. The links

within each ISP and across the two ISPs, are all point-to-point optical links. The initial value of the TTL field is 32. The maximum possible value of the TTL

field when R receives the datagram is _____________.

Page 28 of 29
Page 29 of 29

You might also like