[go: up one dir, main page]

0% found this document useful (0 votes)
23 views6 pages

WOLAITA SODO UNIVERSITY - Docx Tom - Docxc.docx NEWF

The document explains the three-way handshake method in TCP/IP networks, detailing the steps of SYN, SYN-ACK, and ACK for establishing a reliable communication channel. It also covers subnet masks, their calculation, and the creation of subnets of different sizes, emphasizing the importance of network and host portions in IP addressing. Additionally, it introduces Classless Inter-Domain Routing (CIDR) notation and provides an example of calculating network and host portions, subnet masks, and usable addresses for a given CIDR notation.

Uploaded by

mersimoybekele88
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views6 pages

WOLAITA SODO UNIVERSITY - Docx Tom - Docxc.docx NEWF

The document explains the three-way handshake method in TCP/IP networks, detailing the steps of SYN, SYN-ACK, and ACK for establishing a reliable communication channel. It also covers subnet masks, their calculation, and the creation of subnets of different sizes, emphasizing the importance of network and host portions in IP addressing. Additionally, it introduces Classless Inter-Domain Routing (CIDR) notation and provides an example of calculating network and host portions, subnet masks, and usable addresses for a given CIDR notation.

Uploaded by

mersimoybekele88
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

WOLAITA SODO UNIVERSITY

COLLAGE OF INFORMATICS

DEPARTMENT OF CUMPUTER
SCIENCE
COURSE DATA COMMUNICATION

INDIVIDUAL ASSIGNMENT

NAME:TEMIRET LEGESE

UGR/92287/16

1. Three-way handshake method used in TCP/IP


networks establishment?
* TCP is the connection oriented protocol and that means
it is actually deal with the integrity of of the data that is
sent across the network to ensure that it is delivered.
And it does this through the process that is called the
three way handshake.

What is the three handshake and through what step it is


work?

The three way handshake is a process that enable the


client and the server are reliable and synchronized
communication channel before they begin sharing data.
- This three handshake has to do in three steps process:

1.synchronized(SYN)
SYN is stands for synchronized.
The client sends a SYN (Synchronize) packet to the server, indicating its
intention to establish a connection and including an initial sequence number.

The client want to establish a connection with server,so it send a segment


with SYN.This inform server that client is likely to start communication with
what sequence number it starts segment with.

2.Synchronize-Acknowledge(SYN- ACK)
After the client sent synchronized to the server the server responds to the
client request with SYN- ACK signal bit set.Acknowledgement signifies the
response of segment it received and SYN signifies with what sequence
number it is likely to start the segments with.

3.Acknowledge (ACK)
Lastly,client acknowledges the response of the server by ACK
message.status on both side change to established and ready to start the
actual data transfer.

GENERALLY: The client first send the SYN packet trying to say hello to
the server and then the server responds with a SYN ACK
And say Hi I’m available and the client also responds with ACK.after
this three handshake is complete and the TCP session set up.

2. How sub-net masks work and how to calculate them?

To clearly describe this question we need to starts an IP addresses.


IP address is an identifier for the computer or device on a network.evrery
device has an IP address for the purpose of the communication.
IP address consists of two part.Network address and Host address.

Sub-net mask is a 32 bit number used in IP addressing to differentiate


between the network and the host parts of an IP address, enabling network
segmentation and efficient routing.
How it work?
-Binary representation:sub-net mask can represented by binary
representation. Which means the 1s indicate the network portions and 0s
indicate the host portion.each octet ( 8-bit section) of the sub-net mask can
be converted to its binary equivalent.
-Bitwise ANDing: the sub-net mask is used with an IP address via a bitwise
and operation to determine the network portion.
How to calculate them?
To calculate the sub-net mask we need to follow some steps
1. identify the class of the IP address and note the default sub-net mask: we
need to identify the class of the IP address the t we are going to sub-net and
the default sub-net mask .
2. Convert the default sub-net mask into binary:the default sub-net mask
must be converted into binary bit as a computer understand language.
3. Note the umber of host required per sub-net and find the sub-net
generator and octet position.
4. Generate the new sub-net mask.
5. Use the sub-net generator and generate the network range or sub-net in
the appropriate octet position.
Through this steps we can calculate the sub-net mask.

3. How to create sub-nets of different sizes?


Steps we follow to create the sub-net at different sizes.
Determine host requirement det:Identify the number of hosts each sub-
net needs.
Choose sub-net mask: Select the appropriate sub-net masks (CIDR
notation) for each sub-net based on the number of hosts required.
Calculate-network and broadcast addresses: Determine the network
address (the first address in the sub-net) and the broadcast address (the
last address in the sub-net) for each sub-net.
Allocate IP addresses: Assign IP addresses within each sub-net to the
devices that will reside on that sub-net.

Arrange sub-nets in descending order: Start with the sub-net that


requires the largest number of hosts, and then work your way down
to the sub-net with the smallest requirement.
Ensure non-overlapping sub-nets:Make sure that the sub-net ranges
do not overlap.

4. Learning
about Classless Inter-Domain Routing and how to
use CIDR notation?
CIDR is the method of allocating IP address more flexible and efficiently
by enabling the aggregation of multiple sub-nets into a large network .
CIDR is based on the idea that IP addresses can be allocated and routed
based on their network prefix rather than their class, which was the
traditional way of IP address allocation.

HOW TO USE CIDR NOTATION?

It is represented by using slash notation, which is specifies the number of


bits in the network prefix.
Example: an IP address of 192.168.1.0 with a prefix length of 24would be
represented as 192.168.1.0/24.
This notation indicate that the first 24 bit of the IP address are the
network prefix and the remaining 8 bits are the host indicator.

5. Let’s we have CIDR 192.168.1.0/28


a. Identify the network and host portion
b. Sub-net mask
c. Number of hosts and usable address?

As we discuss about the CIDR in the question number 4 the CIDR notation is
represented by the slash notation like: 192.168.1.0/28

. Network and Host Portion

CIDR notation /28 means that the first 28 bits of the IP address are used for
the network portion and the remaining bits (32 - 28 = 4 bits) are used for the
host portion.

A.Network Portion: The first 28 bits (or first 3 octets and 4 bits of the 4th
octet) are part of the network.

In the IP address 192.168.1.0, in binary.


192.168.1.0 => 11000000.10101000.00000001.0000
0000

The first 28 bits are the network portion.

Network portion: 11000000.10101000.00000001.0000

Host Portion: The remaining 4 bits (from the 4th octet) are used for the host part.

Host portion: 0000

B.Subnet Mask

A /28 means there are 28 bits set to 1 in the subnet mask, which corresponds
to 255.255.255.240 in decimal form.

255.255.255.240

In binary,

11111111.11111111.11111111.11110000

C.Number of Hosts and Usable Addresses

With a /28 sub-net, there are 4 bits for the host portion. The formula to
calculate the number of hosts in a sub-net is:

 Number of Hosts=2n−2\text{Number of Hosts} = 2^n -


2Number of Hosts=2n−2

Where n is the number of host bits. We subtract 2 because one address is


reserved for the network address (all host bits are 0), and one address is
reserved for the broadcast address (all host bits are 1).

Number of Hosts:

24−2=16−2=14 usable hosts2^4 - 2 = 16 - 2 = 14 \text{ usable


hosts}24−2=16−2=14 usable hosts

Total Addresses in the Sub-net:

There are 16 total IP addresses in the sub-net (from 192.168.1.0 to


192.168.1.15).

The usable IP addresses are from 192.168.1.1 to 192.168.1.14.

The network address is 192.168.1.0 and the broadcast address is


192.168.1.15.
o abserrB.bb
o

You might also like