![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem P8P
Explanation of Solution
- Three different subnets named Subnet 1, Subnet 2 and Subnet 3 are interconnected in a network and the interfaces related to these subnets require a prefix 223.1.17/24.
- Subnet 1 that supports minimum of 60 interfaces requires the network address 223...
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also suppose that Subnet 1 is required to support up to 25 interfaces, Subnet 2 is to support up to 50 interfaces, and Subnet 3 is to support up to 75 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints
Consider a router that interconnects four subnets: Subnet 1, Subnet 2, Subnet 3, and Subnet 4. Suppose all of the interfaces in each of these four subnets are required to have the prefix 223.1.17/24.Also suppose that Subnet 1 is required to support at least 90 interfaces, Subnet 2 is to support at least 60 interfaces, Subnet 3 is to support at least 13 interfaces, and Subnet 4 is to support 2 WAN interfaces. Provide four network addresses (of the form a.b.c.d/x) that satisfy these constraints. Also, justify your answer.
Consider a datagram network using 32-bit host addresses. Suppose a router has four links, numbered 0
through 3, and packets are to be forwarded to the link interfaces as follows:
Destination Address Range
Link Interface
11100000 00000000 00000000 00000000
through
11100000 00111111 1111111 11111111
11100000 01000000 00000000 00000000
through
11100000 01000000 1111111111111111
11100000 01000001 00000000 00000000
through
11100001 01111111 11111111 11111111
otherwise
0
1
2
3
a. Provide a forwarding table that has five entries, uses longest prefix matching, and forwards packets
to the correct link interfaces.
Chapter 4 Solutions
EBK COMPUTER NETWORKING
Ch. 4 - Lets review some of the terminology used in this...Ch. 4 - Prob. R2RQCh. 4 - Prob. R3RQCh. 4 - Prob. R4RQCh. 4 - Prob. R5RQCh. 4 - Prob. R6RQCh. 4 - Prob. R7RQCh. 4 - Prob. R8RQCh. 4 - Prob. R9RQCh. 4 - Prob. R10RQ
Ch. 4 - Prob. R11RQCh. 4 - Prob. R12RQCh. 4 - Prob. R13RQCh. 4 - Prob. R14RQCh. 4 - Prob. R15RQCh. 4 - Prob. R16RQCh. 4 - Prob. R17RQCh. 4 - Prob. R18RQCh. 4 - Prob. R19RQCh. 4 - Prob. R20RQCh. 4 - Prob. R21RQCh. 4 - Prob. R22RQCh. 4 - Prob. R23RQCh. 4 - Prob. R24RQCh. 4 - Prob. R25RQCh. 4 - Prob. R26RQCh. 4 - Prob. R27RQCh. 4 - Prob. R28RQCh. 4 - Prob. R29RQCh. 4 - Prob. R30RQCh. 4 - Prob. R31RQCh. 4 - Prob. R32RQCh. 4 - Prob. R33RQCh. 4 - Prob. R34RQCh. 4 - Prob. R35RQCh. 4 - Prob. P1PCh. 4 - Prob. P2PCh. 4 - Prob. P3PCh. 4 - Consider a datagram network using 32-bit host...Ch. 4 - Consider a datagram network using 8-bit host...Ch. 4 - Consider a datagram network using 8-bit host...Ch. 4 - Prob. P8PCh. 4 - Prob. P9PCh. 4 - Prob. P10PCh. 4 - Prob. P11PCh. 4 - Prob. P12PCh. 4 - Consider sending a 2400-byte datagram into a link...Ch. 4 - Prob. P15PCh. 4 - Prob. P16PCh. 4 - Prob. P17PCh. 4 - Prob. P18PCh. 4 - Prob. P19PCh. 4 - Prob. P20PCh. 4 - Prob. P21PCh. 4 - Prob. P22P
Knowledge Booster
Similar questions
- Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also suppose that Subnet 1 is required to support 70 interfaces, Subnet 2 is to support 40 interfaces, and Subnet 3 is to support 40 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints. Please provide a short discussion justifying your answer.arrow_forwardA frame containing http request is sent from Computer (A) [in whichever subnet it is now, make sure to show it in your figure], to the access point it is associated with. Draw the address fields (1, 2, and 3) of the frame travelling from Computer A to AP and the source and destination addresses of the frame travelling from AP to R1. The MAC addresses of AP1, AP2, and AP3 are M1, M2, and M3 respectively, and the Router R1’s MAC address connected to this Switch/AP is MRA. IP address values are already given, and the port addresses could also be used as given. The Router’s MAC address facing WAN side is MRW.arrow_forwardConsider a router that interconnects three subnets: Subnet 1, Subnet 2 and Subnet 3. Suppose all interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also, suppose that subnet 1 is required to support at least 100 interfaces. Subnet 2 to support at least 120 interfaces and subnet three to support at least 12 interfaces. A possible network addressing which satisfies the above constraints is: Subnet 2: 223.1.17.0/25 Subnet 1: 223.1.17.128/25 - 223.1.17.240/28 Subnet 3: 223.1.17.240/28 Select one: O True O Falsearrow_forward
- The first thing needed is a IP-addressing range to use in our network. Since this assignment is done in a laboratory setting, we don't have to comply to the RFC1918[2] standards of private IP-addressing. An IP address is written in the form shown in equation (2.1.1). X grpl grp2 grp3 grp4 X grpl grp2 grp3 grp4 We need however to take into consideration that the address range of 224.0.0.0/3 have been reserved, for amongst other thing multicast. Because of this, we will need to use another modulus-value on the first octet when we are generating a usable ip-address range. Start by creating your groups unique IP-address range using equation (2.1.2) where {x,y EZ | 0≤x≤ 223,0 ≤ y ≤ 255} (2.1.2) where {x EZ | 0≤x≤ 255} Where each octet will be based on each group members birthday. Value X is calculated according to equation (2.1.3), and value Y is calculated according to equation (2.1.4). YY * MM + DD mod 223 YY MM + DD X mod 255 grpl (2.1.1) The fourth group in the IP-address should be set…arrow_forwardTCP / IP uses the client-server communication model, in which a user or computer (a client) receives a service (such as sending a web page) from another computer (a server) on the network. In short, the TCP / IP protocol suite is classified as stateless, which means that each client request is considered new because it has nothing to do with previous requests. Being stateless, network routes are released so that they can be used continuously. Answer the following questions briefly. How does resource reservation work in the TCP / IP model? Which TCP / IP layer is responsible to reserve resources across a network using the TCP / IP model? What protocol assigns an IP address to the client connected to the Internet? Checksum is used by various protocols on the Internet, but not at the one of TCP / IP Explain.arrow_forwardSuppose that a router interconnects three subnets, where all the interfaces ofthe subnets must have the prefix 164.132.62/24. Also, suppose that Subnet 1 is required to support up to 60 interfaces, Subnet 2 is required to support up to 100 interfaces, and Subnet 3 is required to support up to 15 interfaces. Provide three network addresses of the form a.b.c.d/x that satisfy the aboverequirements.arrow_forward
- Host A and B are communicating over a TCP connection. Host B has already received from Host A all bytes up through byte 23. Suppose Host A then sends two segments to Host B back-to-back. The first and the second segments contain 30 and 50 bytes of data, respectively. In the first segment, the sequence number is 24, the source port number is 3000, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment from Host A. A. In the second segment sent from Host A to B, what arethe sequence number_________,source port number __________,and destination port number__________?B. If the second segment arrives after the first segment, in the acknowledgment of the second segment, what arethe acknowledgment number___________,the source port number__________,and the destination port number __________?C. If the second segment arrives before the first segment, in the acknowledgment of the first arriving segment,what is the acknowledgment number ___________?D.…arrow_forwardConsider sending real-time voice from Host A to Host B over a packet-switched network (VolP). Host A converts analog voice to a digital 64 kbps bit stream on the fly. Host A then groups the bits into 56-byte packets. There is one link between Hosts A and B; its transmission rate is 2 Mbps and its propagation delay is 10 msec. As soon as Host A gathers a packet, it sends it to Host B. As soon as Host B receives an entire packet, it coverts the packet's bits to an analog signal. How much time elapses from the time a bit is created (from the original analog signal at Host A) until the bit is decoded (as part of the analog signal at Host B)?arrow_forward1. Build a Router network which has three Generic Routers and totally of Six networks in it. From each Router the required switch shall be connected through Fast Ethernet port and the switch is connected to two users. On the whole there are '6' networks in the configuration. Along with the network diagram do the packet transfer in simulation mode and write results for three different combinations.arrow_forward
- Consider a network connecting two systems located 4000 kilometers apart. The bandwidth of the network is 500 x Mbps. The propagation speed of the media is 4 × 106 meters per second. It is needed to design a Go-Back-N sliding window protocol for this network. The average packet size is 107 bits. The network is to be used to its full capacity. Assume that processing delays at nodes are negligible. What is the minimum size in bits of the sequence number field?arrow_forwardHost A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B backto-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment from Host A. d. Suppose the two segments sent by A arrive in order at B. The first acknowledgment is lost and the second acknowledgment arrives after the first timeout interval. Draw a timing diagram, showing these segments and all other segments and acknowledgments sent. (Assume there is no additional packet loss.) For each segment in your figure, provide the sequence number and the number of bytes of data; for each acknowledgment that you add, provide the acknowledgment number.arrow_forwardConsider a computer 1 that communicates with a computer 2 via LAN1, router R1, and LAN2. The sending computer1 is running two processes at this time with port addresses k and l. The receiving computer 2 is running three processes at this time with port addresses f, g and h. Process k in the sending computer 1 needs to communicate with process g in the receiving computer 2. Draw the network and show the contents of segments, packets and frames at the network, data link, and transport layer for each hop. Note: Computer 1 has: Physical address=15, Logical address=A Router R1 has: Physical address in the side of LAN 1=20, Logical address in the side of LAN1=B Physical address in the side of LAN 2=50, Logical address in the side of LAN2=D. Computer 2 has: Physical address=77, Logical address=E.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education