Nt1310 Unit 3 Assignment 1 Study Guide

Decent Essays
QUES 1. A router has the following CIDR entries in the routing table:
Address/Mask
Next Hop
135.46.56.0/22
Interface 0
135.46.60.0/22
Interface 1
192.53.40.0/23
Router 1
Default
Router 2

For each of the following IP addresses, what does the router do if a packet with that address arrives?
1. 135.46.63.10
2. 135.46.57.14
3. 135.46.52.2
4. 192.53.40.7
5. 192.53.56.7 g entirely with bytes is much simpler than working with individual bits. Answers:
1. 135.46.63.10
Using the first 22 bits of it as the network address, we have 135.46.60.0. the bit pattern of 135.46.63.10 is 10000111.00101110.00111111.00001010 at this point when we perform the bit and operation with a 22 leading bit the 1s and 10 bit 0s, this the same and similar of making the ultimate or the last zero. We accept the subsequent network address bit pattern: 10000111.00101110.00111100.00000000. At this period, the first two bytes are not changed. However, the 3rd type shifts from 63 to 60 while the 4th bytes convert zero. Match with the network address in the routing table. The 2nd-row matches. The router will transmit the packet to interface 1.
…show more content…
135.46.57.14
Using the first 22 bits of the above IP address as a network address, we have 135.45.56.0. This matches the network address of the first row. The packet will be forwarded to interface

Related Documents

  • Decent Essays

    The Aegis Secure Key 3.0 has military grade full disk AES 256-bit XTS hardware encryption and is FIPS 140-2 Level 3 validated. You unlock the drive by entering your 7-16 digit PIN before you connect it to your device that way hackers cannot use software on your device to capture your password, and it automatically locks when you unplug it. If an incorrect password is typed 20 consecutive times all the data and the encryption key are erased. It is also dust and water resistant as well as a wear resistant keypad to hide key usage and to help prevent hackers from knowing the commonly used keys. This USB is a Super Speed USB 3.0 that has data transfer rates of 195 for read and 162 for write.…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hi Hemant, USHDCWPBTD03 and USHDCWPBTD04 we are not using at full extend. Both the servers only use for “Single Sign on Feature”. Both the servers use 2 processor each (2 + 2 = 4). I am thinking if we remove 1 process from each server (1 + 1 = 2) we end up with 2 processer, this will save us some BizTalk cost.…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface. The last layer is called Application Layer which takes care of…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 5 Study Guide

    • 190 Words
    • 1 Pages

    Answer the following questions "True" or "False" only (Choose Five only) 1. Snipping tool used to captures different parts of the screen. 2. The user can add toolbars to the taskbar by right click on taskbar and select Toolbars. 3.…

    • 190 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The two source nodes, 1 and 2, have messages A and B that need to be transmitted to the two destination/sink nodes, 5 and 6, which need both A and B to be delivered. Each edge in this network can only carry a single value. If nodes could only route/retransmit, then the central link would only be able to carry message A or message B, but not both of them at the same time. Assuming we sent message A through the center, then node 5 would receive message A twice and would never receive message B. The same problem would occur at node 6 if we sent message B through the center node, with node 6 never being able to receive message A. We can immediately see here that routing would be insufficient since no routing scheme can simultaneously transmit A and B to both sink nodes.…

    • 919 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Term Paper

    • 485 Words
    • 2 Pages

    1. Define the following terms: According to the textbook below are the following definitions. • Surface water-Water from lakes, streams, rivers, and surface springs (Friis, 2012, pg. 211). • Groundwater- Any water that is stored naturally deep underground in aquifers or that flows through rock and soil, supplying springs and wells; this water is less susceptible to contamination than surface water (Friis, 2012, pg. 211).…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Allowing kids under the age of fourteen to play tackle football can have severe consequences to their young minds. I personally do not like football but I’m sure there are other ways that younger kids can play football without tackling each other and getting hurt. “ Goldstein and his colleagues advocate for no tackle football before 14 because children’s bodies, particularly their necks and upper bodies, aren’t strong enough to counteract the bobbling of the head and shaking of the brain that occurs during tackles” (Kounang 1). Not only does that sound painful but why would a parent want that for their child.…

    • 280 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Lab 4.3

    • 653 Words
    • 3 Pages

    Notice that the data contains the source and destination IPv4 address information. What is the source IP address? 192.168.2.32_________________________________ What is the destination IP address?…

    • 653 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    TCP/IP And OSI Models

    • 957 Words
    • 4 Pages

    PC1 sends data intended for an app running on PC2. Which of the following mechanisms does Ethernet define so that PC2 receives and processes the…

    • 957 Words
    • 4 Pages
    Decent Essays