Question: 13. Given class-C IP address (192.168.1.0/24), subnets this IP address by borrowing THREE (3) bits from the network octet. 9 marks) Based on the information

 13. Given class-C IP address (192.168.1.0/24), subnets this IP address by

13. Given class-C IP address (192.168.1.0/24), subnets this IP address by borrowing THREE (3) bits from the network octet. 9 marks) Based on the information given above, identify the following elements: a) New subnet mask 1 mark) b) Network ID for the first THREE (3) subnets. (3 maris) c) Broadcast IP address for the last THREE (3) subnets. (3 marks) d) Number of subinets can be created. (1 mark) e) Number of useable HOSTS can be generated for each subnet. (1 mark) 14. Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1 = 200kbps, R2 =4Mbps and R3=10Mbps. (4 marks) a) Assume no other traffic in the network, what is the throughput for the file transfer. b) Suppose the file is 4 million bytes. Roughly, how long will it take to transfer the file to Host B? c) Repeat (a) and (b), but now with R2 reduced to 100kbps. 15. In computer networking, the maximum transmission unit (MTU) of a communications protocol of a layer is the size (in bytes) of the largest protocol data unit that the layer can pass onwards. MTU parameters usually appear in association with a communications interface (NIC, serial port, etc.). Standards (Ethernet, for example) can fix the size of an MTU; or systems (such as point-to-point serial links) may decide MTU at connect time. Consider sending a 5800 -byte datagram into a link that has an MTU of 600 bytes. The original datagram is stamped with the identification number 1. Assume that IPv4 is used. (12 marks) Based on the statement above answer the following questions | a. Distinguish between "fragmentation and reassemble" process in IPv4 datagrams. b. Identify where the fragmentations occur and where they are being reassembled. c. Calculate the number of fragments that are being generated for the above transmission d. Discuss the other values of the fragmentation-related fields in the generated IP datagram(s) such as the fragment size, Identification number (ID) offsets number and flag numbers. e. Justify the changes in the datagram, if IPv6 addressing was used

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!