0% found this document useful (0 votes)
24 views3 pages

Mid_term_Exam_Networking

Uploaded by

fodilayadi2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views3 pages

Mid_term_Exam_Networking

Uploaded by

fodilayadi2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

BOUMERDES UNIVERSITY

Institute of Electrical and Electronic Engineering, I.G.E.E (ex-INELEC)


Date: December 2024
Teacher: Dr. Sylia MEKHMOUKH TALEB

Last Name:
First Name:

Midterm Exam 2: Networks and Protocols


Exercise 1
A university has been assigned the IP address 172.16.0.0/16 for its internal network. The university has the
following faculties and their device requirements:

• Math faculty: 3000 devices.


• medecine faculty: 2000 devices.

• Law faculty: 1000 devices.


• Science faculty: 500 devices.

1. Is Class B sufficient to satisfy the requirements of all devices?


The total number of devices required by all faculties is: 3000 + 2000 + 1000 + 500 = 6500 devices.
A Class B network can accommodate up to 65,534 hosts (216 - 2). Since the company only needs 6500
addresses, a Class B network address provides more than enough capacity.

2. The university must create equal-sized subnetworks for different faculties. Specify the extended-
network-prefix needed for all faculties to accommodate their requirements.
The largest faculty, the Math faculty, requires 3000 devices. To ensure each faculty has enough IP
addresses, we need to create subnets that can accommodate at least 3000 devices.
A minimum of 12 bits are required to define 3000 devices, so the extended-network prefix is /20 (20=
32-12).

3. The administrator planned to create 8 subnets.


(a) Provide the subnet mask used for each subnet.
To create 8 subnets, we need to borrow 3 bits from the host portion of the address.
The new subnet mask will be: 16 + 3 = 19
Thus, the subnet mask for each subnet is: 255.255.224.0.
(b) How many devices can be identified in each subnet?
213 -2=8192 - 2 = 8190 devices
(c) Provide the network, first usable, last usable, and broadcast addresses for each subnet in Table 1.

1
Subnet Network address First address Last address Broadcast address
Subnet 1 172.16.0.0/19 172.16.0.1 172.16.31.254 172.16.31.255
Subnet 2 172.16.32.0/19 172.16.32.1 172.16.63.254 172.16.63.255
Subnet 3 172.16.64.0/19 172.16.64.1 172.16.95.254 172.16.95.255
Subnet 4 172.16.96.0/19 172.16.96.1 172.16.127.254 172.16.127.255
Subnet 5 172.16.128.0/19 172.16.128.1 172.16.159.254 172.16.159.255
Subnet 6 172.16.160.0/19 172.16.160.1 172.16.191.254 172.16.191.255
Subnet 7 172.16.192.0/19 172.16.192.1 172.16.223.254 172.16.223.255
Subnet 8 172.16.224.0/19 172.16.224.1 172.16.255.254 172.16.255.255
Table 1: Network, first, last, and broadcast addresses for each subnetwork

Exercise 2
The network administrator installed and connected the sub-networks in the university using physical
links and manually assigned appropriate IPs to all devices based on the subnets calculated in Exercise
1.
1. The administrator investigates a user problem. The user can reach hosts on the same subnetwork
but is unable to communicate with remote devices in the university network. The administrator tries
to ping the gateway address configured on the host device and is unsuccessful. What is the most likely
cause of the problem?
Since the user can successfully communicate with devices within the same subnet (all devices, including
the gateway, respond), but the configured default gateway on the user’s device is unreachable, this
indicates that the default gateway is misconfigured.
2. The administrator decided to use DHCP and BOOTP protocols as solutions to simplify IP configu-
ration. What is the main difference between the two solutions?
BOOTP provides static configuration for diskless computers, whereas DHCP offers both static and
dynamic configuration for devices. DHCP is especially beneficial in environments where devices and IP
addresses frequently change.
3. Assuming connectivity is verified within each subnetwork and between directly connected subnet-
works. However, a PC cannot reach remote devices in the university. Could you explain why this is
happening and propose a solution?
Since connectivity is successful within each subnetwork and between directly connected subnetworks,
this indicates that the IP configuration is correct. However, the inability of a PC to reach remote
devices suggests that there is no routing path established between the remote networks. To resolve this
issue, routing must be activated.
4. When a router receives a packet and prepares it for forwarding, what happens to the Layer 2
information?

• The source MAC address is replaced by the MAC address of the router’s exit interface.
• The destination MAC address is replaced by the MAC address of the next hop.

5. A student is sending files from a phone to a computer across the university network. Which layer of
the TCP/IP model is responsible for reassembling these messages as they are received on the computer?
Transport layer is responsible for reassembling messages.
6. A student is using its device to send files and browse an HTTP server across the university network.
How can this situation occur when the device is using the same IP address for both applications?
The Transport Layer uses port numbers to manage multiple connections simultaneously, allowing both
applications to operate without conflict.
7. Can students at the university access the internet using their assigned IPs? If not, how can this be
enabled?
No, students cannot access the internet directly with private IPs. NAT can be configured on the default
router to translate private IP addresses to a public IP address for internet access

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy