Premium Essay

Checkpoint Tcp/Ip

In:

Submitted By trish4801
Words 1749
Pages 7
Checkpoint: TCP/IP LAN Plan
1. An IPv6 address is made up of how many bits?
a. 32
b. 48
c. 64
d. 128
e. 256
The answer to this question is d. Ipv6 address has 128 bits which is better than Ipv4 which has only 32 bit addresses. If I understand it with Ipv4 the amount of addresses will soon run out. With Ipv6 as stated in the book unless every star in the universe were assigned an address it is unlikely to run out of addresses. With Ipv4 it was stated that there are only 4 billion possible addresses. With Ipv6 there are 3.4x10^38 or 34 followed by 37 zeroes. Ipv6 resolves some problems found in Ipv4 such as limited addresses, security, sometimes complicated setup and quality of service (QoS). QoS describes the ability of a network to prioritize data packets based on the type of information. Ipv6 makes the handling of special packets easier to implement, such as applications that use video or audio. Whereas Ipv4 uses a dotted decimal in 8 bit sections, Ipv6 uses a hexadecimal format in 16 bit sections. At first I was a bit confused over what this meant and looking at the address example further confused me. Then after further reading I discovered that each 16 bit section was ended with a colon. It was explained that there are three sections to the address they are public topology, a site topology, and an interface identifier. If I am right then the address giving in the book would break down like this: 2001:DB8:0:0:0:2ed3:340:ab
The first 3 16 bit sections 2001:DB8:0: represent the public topology, internet backbone or service provider.
The next 16 bit section 0: represents the site topology such as a business or local ISP.
The last 64 bits or four 16 bit sections 0:2ed3:340:ab represent interface identifier which is derived from the MAC address on the host’s NIC. This is the unique host address (Tomsho, 2011). Am I correct in my understanding?
2. The subnet

Similar Documents

Premium Essay

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security...

Words: 278 - Pages: 2

Free Essay

Nt1210 Mid-Term Study Guide

...1. nibble, byte, word, double word- define 2. how does the RAM know when its on and off, full and half 3. converting binary’s 4. how are the tracks and setctors separated on a hard drive 5. pg 12 adding binary 6. Read about file systems 7. Video compression and what is it for 8. 9. Internet core 10. How do you define a network (more than one computer) 11. Topologies (bus,ring,star,and mesh) 12. Networking standards 13. Defacto standards vs vendor standards vs vendor group standards 14. Tcp/ip 15. Open networking model and the osi model 16. Ip routing 17. Pg 136 authors note 18. Frame and packet 19. IP addressing 20. IP addressing 21. Physical layer, layer 1 of the OSI model 22. Lab 3.1.1 (wouldn’t be able to communicate) 23. Data link layer 24. LAN vs WAN 25. Different between ac and dc currents 26. Difference between the circitury and node 27. Full duplex vs half duplex 28. Sending data through electricity foucusing on sound waves 29. RJ 45 connectors 30. Fiber optics 31. The wireless standards 32. CSMA CSCA 33. When you have a fiber optic cable and two buildings, which would you use single mode or multi mode? Multi mode 34. Copper cable and standards. (EMI) 35. Two types of utp cable a and b, cross over and straight cable 36. Max distance for UTP cables (100M) 37. FORFIT! 38. What is trouble shooting bottom up and...

Words: 366 - Pages: 2

Premium Essay

Analysis of Wireless Protocols

...Analysis of Wireless Protocols Analysis of Wireless Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction...

Words: 285 - Pages: 2

Premium Essay

Computernt Plus

...This Cisco IOS command would display the current status of EIGRP? Show IP eigrp neighbors Two metrics used by default in EIGRP metric calculation? Bandwidth and Delay Dynamic routing protocols is considered an exterior gateway protocol only? BGP Is an encapsulation protocol that can be used on cisco routers when configuring subinterfaces? 802.1Q Is the binary equivalent to the dotted decimal netmask- 255.255.192.0? 1111.1111.11100.0000 This routing protocol is considered to use distance vector logic? Rip Has the lowest Cisco IOS administrative distance? Static route Describe the point-to-point WAN connection protocol provided by Telco? Leased Lines This cisco IOS command copies the current running configuration to a tftp server? Copy running-config tftp The concept of EIGRP Feasible distance is the computed metric of a SUCCESSOR route Is the dotted decimal equivalent to slash notation /25 255.255.255.128 The routing protocol that doesn’t support support VLSM? RIP v1 Is the broadcast address for the ip subnet 8.5.8.232 mask 255.255.0.0 8.5.255.255 Is the slash notation dotted decimal mask of 255.255.255.252 /30 The following mask could create an IP subnet from a class B that contains 500 hosts? 255.255.255.0 Port of STMP? 25 Protocol responsible for resolving mac addresses from IP addresses? ARP Two protocols commonly used in WANS at layer 2 of the OSI model? HDLC and PPP 192.168.254.0 is private up networks, classified by? RFC1918 Bits comprise the network...

Words: 2228 - Pages: 9

Free Essay

Intro to Networking

...Building TCP/IP Networks This chapter will allow you to explore the common models of networking from the physical media connection to the application that displays the information, including how these layers interact and how they map to real networking devices. The labs in this chapter are designed to reinforce concepts from Chapter 3 of your Introduction to Networking textbook and allow you to explore some of the more important ideas with greater depth. You will explore the different types of network reference models available and analyze how each one applies to real network technology. You will also use packet capturing to look at real network traffic and explore the data link layer of networking. At the end of this chapter, you should be able to ■ Explain the purpose of network reference models ■ Describe the layers of the OSI reference model and explain what each layer provides ■ Describe the layers of the TCP/IP model and relate it to the OSI model and real networking equipment ■ Capture live packet information on a network and explain the data link layer portion of the packets captured ■ Enable network resources such as shared printers and file sharing on your own PC Lab 3.1: Network Reference Models approximate Lab Time: 10–15 min. Materials Needed: paper/pencil, Textbook, and Internet research This lab reviews the importance of modeling communication on a network. This will include a review of the state of networking before standardized reference models existed...

Words: 270 - Pages: 2

Free Essay

Physics

...Figure 1 is the soil layer. Ground water table is at 5m depth. The thickness of each layer is determined by Case 1 uses H1 = 4m, H2 = 5m, H3 = 7m, and H4 = 2m. Case 2 uses H1 = 2m, H2 = 7m, H3 = 5m, and H4 = 4m. Soil below Layer 4 is considered as a rigid stratum which can control failure mechanism. Case 1 Layer 1: c’ = 3kPa, φ’ = 38°, and γ = 19kN/m3 (γsat = 20.3kN/m3) Layer 2 : cu = 25kPa, c’ = 8kPa, φ’ = 25°, OCR = 2, Cc = 0.8, Cs = 0.16, e = 1.1 and γ = 15kN/m3 (γsat = 16kN/m3) Layer 3: c’ = 0kPa, φ’ = 38°, and γ = 18kN/m3 (γsat = 19.1kN/m3) Layer 4 : cu = 40kPa, φ’ = 28°, OCR = 1, Cc = 0.5, e = 0.9 and γ = 16kN/m3 (γsat = 17kN/m3) Case 2 Layer 1 : cu = 30kPa, c’ = 15kPa, φ’ = 23°, OCR = 3.0, Cc = 0.8, Cs = 0.16, e = 1.1 and γ = 15kN/m3 (γsat = 16.5kN/m3) Layer 2: c’ = 1kPa, φ’ = 35°, and γ = 19kN/m3 (γsat = 20.8kN/m3) Layer 3 : cu = 35kPa, c’ = 5kPa, φ’ = 28°, OCR = 1.5, Cc = 0.5, e = 0.9 and γ = 16kN/m3 (γsat = 17.3kN/m3) Layer 4: c’ = 0kPa, φ’ = 35°, and γ = 18kN/m3 (γsat = 19.1kN/m3) Design the cut slopes for 12m height (Case 1) and for 7m height (Case 2), based on F = 1.3 (short-term), F = 1.5 (long-term) and F = 1.15 (seismic). There are only three options that can be used to increase F for the slope. They are, 1) reduce the slope angle; 2) reduce the slope height; and 3) dewater. The optimum design is the slope cut as less as possible. The water table change will induce the consolidation. The maximum vertical displacement due to dewatering on the slope crest must be...

Words: 449 - Pages: 2

Premium Essay

Nt1210 Unit 3 Assignment 1

...The network uses standards defined in TCP/IP RFCs, plus other standards. 2. C. Ethernet D. TCP/IP mapping 3. A. It exists as a written document. C. It has been passed through some form of review and approval or certification process. 4. A. De facto standard documents have been reviewed more thoroughly. C. De facto standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. B. The data link layer sits lower in the model than the transport layer. C. The physical layer sits just below the data link layer. 6. B. IEEE D. ANSI 7. D. To keep intellectual property rights to the technology inside the company 8. B. IP is a network layer protocol. 9. B. TCP/IP 10. B. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13. D. Datagram 14. B. Can be written in DDN format D. Used by routers to make a forwarding decision 15. A. 48 bits in length 16. A. LANs generally connect devices that are nearer to each other, compared to WANs. D. LANs are purchased, and WANs are leased. 17. B. Two TCP/IP data-link protocols are Ethernet and...

Words: 699 - Pages: 3

Free Essay

Samba Research

...IT 302 LINUX ADMIN PROJECT I chose to do my final project on the Samba server, such as how to set up the server, security, and maintenance. Samba “is an Open Source/Free Software suite that provides seamless file and print services to SMB/CIFS clients. Samba is freely available, unlike other SMB/CIFS implementations, and allows for interoperability between Linux/Unix servers and Windows-based clients.” (source1) The whole purpose of the samba software is to make it possible to operate on many platforms. To install the server you would use the yum command in terminal. You then would enter su for the “super user” to install files as root. Then create a new directory containing three empty files which you'll share. While logged on as root create the new directory “/smbdemo” using this command “mkdir /smbdemo”. Then you would change permissions on the new directory to 770 with the following command “chmod 770 /smbdemo”. Now you navigate to the new directory with “cd /smbdemo” for the command. Add three empty files to the directory with the following command “touch file1 file2 file3”. Next step one would most likely add a user to the server. You do this first by “adding users to the Samba database in order for them to have access to their home directory and other Samba shares.”(source2) Using this command “smbpasswd -a ” you will then be able to add a new samba user. The user must be an existing Linux user or else the command will fail. Then if you “perform the following...

Words: 681 - Pages: 3

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...

Words: 2355 - Pages: 10

Premium Essay

Nt1330 Unit 6

...The checkpoints break the data into smaller groups for error detection. If the network fails, only the data after the last checkpoint has to be retransmitted. Implement dialog control between communicating processes, such as regulating which side transmits, when, and for how long. 3. List a few examples of protocols that the Session Layer may use and what they’d be used for. TCP is one of the main protocols in TCP/IP networks. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. SCTP (Stream Control Transmission Protocol) is a protocol for transmitting multiple streams of data at the same time between two end points that have established a connection in a network. SCTP use make it easier to manage connections over wireless network and to manage the transmission of multimedia data. 4. Briefly describe the process of Network Address...

Words: 506 - Pages: 3

Premium Essay

70-642

... it will broadcast a DHCPDISCOVER packet to locate any available DHCP server in order to request DHCP IP address information. 2. c DHCP operates at the Application Layer of the OSI model. 3. a The TFTP protocol is a lightweight alternative to FTP. It is capable of this level of efficiency because it uses the connectionless User Datagram Protocol (UDP) for communication rather than the acknowledgement-based Transmission Control Protocol (TCP). 4. b T1 is a time indicator that corresponds to 50% of the DHCP lease time; T2 corresponds to 87.5% of the total DHCP lease time. 5. b A DHCP server will hand out IP addresses to requesting clients from its available address pool, which consists of the total address range less any IP addresses that have been configured as exclusions from the available range. 6. c The TFTP protocol was used by BOOTP, the predecessor to DHCP, which was used to provide automatic IP addressing information to diskless workstations. 7. c When you reconcile a server or a scope, the DHCP service uses both the summary information in the registry and the detailed information in the DHCP database to reconstruct the most current view of the DHCP service. 8. c Superscopes contain only a list of member scopes or child scopes that can be activated together; they are not used to configure other details about scope use. 9. c The checkpoint file is used to indicate the last successful write to the database file, such as in cases in which a server...

Words: 1569 - Pages: 7

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Premium Essay

Tcp/Ip Lan Plan

...TCP/IP LAN Plan CheckPoint An IPv6 address is 128 bits compared to the IPv4, which is only 32 bits. The subnet mask of an IP address, defines the network portions and which part is the host portion. Each of the three class IP addresses have a range, which cannot be routed across the internet. Since the IP address 172.19.243.254 falls in the range of the class B 172.16 to 172.31 ranges it cannot be routed across the internet. Computers to communicate on a TCP/IP logical network they must have an IP address. An IP address is unique to the devices on a network providing the network ID and the host ID there for, for a computer to talk to another computer within a logical network they both must have an network ID and a host ID. Reallocating bits from the host ID to a network ID one must remember subnets take the power of 2, meaning to create 16 subnets one must reallocate 4 bits to the 2 power (2x2=4x2=8x2=16). A class C network address is 255.255.255.0, leaving the last octet for identification of subnets. 32 subnets equals 6 bits, converted to binary provides a 11111100 binary bit pattern with the sixth 1 representing the 32nds place. The binary bit pattern 11111100 is equal to (128+64+32+16+8+4) 252, which is a subnet mask of 255.255.255.252. To assign address to 62 hosts one must use the formula 2n-2 with n representing the number of host bits. 62 host is (2*2=4*2=8*2=16*2=32*2=64-2=62) 6 host bits. Why subnet, the ability to break up large networks in...

Words: 315 - Pages: 2

Premium Essay

Network & Telecommunication Concepts

...Running Head: Week 1, Individual Assignment; TCP/IP Architecture and OSI Layers TCP/IP Architecture and OSI Layers [your name here] NTC360 Network and Telecommunications Concept Associate Professor Anthony Bruno January 04, 2011 The purpose of this paper is to describe an OSI (Open Systems Interconnection) Model with details about each of the seven layers. The OSI reference model adopts a layered approach, where a communication subsystem is broken down into seven layers, each one of which performs a well-defined function. Additionally it is important to understand the purpose of the OSI model in the overall networking architecture especially as it relates to the TCP/IP (Transmission Control Protocol/Internet Protocol) Architecture, which also consists of layers each playing a particular role in the networking design. Generally speaking, the network protocol layer, which is similar to the data and network layer of the OSI model includes the protocols that allow clients and applications to send data over the network. This includes TCP/IP, NWLink (IPX/SPX), NetBEUI, Infrared Data Association (IrDA). However, the purpose of this document is to focus on the relationships between the OSI model and the TCP/IP architectures, and how they may interact together. Finally, as demonstration of this relationship a visual diagram has been provided to depicts how the TCP/IP layers correspond to the OSI model and layers. To begin with...

Words: 1573 - Pages: 7

Premium Essay

Osi Model

...OSI Ned Leeds CMGT/245 CMGT/245 Version 2 IS Security Concepts October 28, 2013 LAYER 1 - PHYSICAL  The physical layer is mainly responsible for establishing, maintaining and ending physical connections (point to point) between computers. This layer is concerned with the actual interpretation of the bit stream into an electrical signal that can be carried across a physical medium. The protocols at this layer deal with the binary transmission, voltage levels, and data rates. This layer would also specify physical medium properties such as cables and network cards. LAYER 2 - DATA LINK The data link layer defines the format of data on the network. All of the data sent through the network are made into a frame which is performed at this level. The frame is a uniform way of sending the data along with address information and error checking capabilities. CRC is used for the error detection at this level. The receiving end the CRC fails at this level there is a request back to the sender for retransmission of this packet. LAYER 3 - NETWORK The network layer basically handles all of the addressing issues. This layer addresses packets, determines the best path or route will manages network problems such as data congestion. There are three ways in which the packets are routed to their destinations. There could be a static route through the entire network that will never be changed. This could also be a static line only used during a particular session between the sender...

Words: 1130 - Pages: 5