Analyze Essential Tcp/Ip Network Protocols Essay

484 words - 2 pages

1. What is the purpose of the address resolution protocol (ARP)?
ARP is used as a mediator between Ethernet and IP protocols. It converts the IP addresses to Ethernet addresses.
2. What is the purpose of the dynamic host control protocol (DHCP)?
DCHP is “the protocol used to assign a pool of IP addresses to requesting clients.” (Beasley & Nilkaew, p. 459) DCHP will allow a network administrator to centrally manage the assignment of the IP addresses in an organization’s network.
3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server.
The IP host address for the vWorkstation is and the ...view middle of the document...

I believe there were 4 packets sent back to the IP source.
6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake?
A TCP three-way handshake is needed to initiate a connection. It is when three data packets are exchanged at the beginning of a TCP connection that occurs between two hosts. The sequence happens as follows: The synchronizing packet, the synchronizing acknowledgment packet, then the acknowledgment packet. (Beasley & Nilkaew, p. 230)
7. What was the SEQ# of the initial SYN TCP packet and ACK# of the SYN ACK TCP packet?
The SEQ# for the initial SYN TCP packet was 0 and the ACK# of the SYN ACK TCP packet was 1.
8. During the instructor’s Telnet session to LAN Switch 1 and LAN Switch 2, what was the captured terminal password for LAN Switch 1 and LAN Switch 2?
During the Telnet session to LAN Switch 1 and LAN Switch 2 the terminal password was cisco.
9. When the instructor used SSH to a Cisco router, were you able to see the terminal password? Why or why not?
No, the terminal password was not visible. This is due to encryption.
10. What other IP packets are on the VLAN and Ethernet LAN segment? How can these other IP packets provide additional clues or information about the logical IP routing and IP addressing schema?
Other packets can provide the administrator information about how they were routed from the source to the destination.

Other Papers Like Analyze Essential Tcp/Ip Network Protocols

Kulder Essay

838 words - 4 pages . It is also very costly averaging over $3000 USD per month, so most don’t lease these lines. They are also reserved circuits that operate over either copper or fiber optics cables. One of the protocols that should be implemented is the Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is the set of rules for communication on which most major networks, such as the Internet, are based. TCP/IP has become standard for transmitting

It Nsa Essay

530 words - 3 pages |Manually Configuring TCP/IP | |Overview |Because the lab network you are constructing for Contoso, Ltd. must be isolated from the production | | |network, you do not want lab computers to obtain their TCP/IP settings from the DHCP servers on the | | |production network. Therefore in

Sfdas Fsaf

1951 words - 8 pages INTRODUCTION“UNIX NETWORK PROGRAMMING” Vol 1, Third Edition by Richard Stevens Read: Chapters 1,2, 3, 4 Communications Client Ex: TCP/IP Server Example: Telnet client on local machine to Telnet server on a remote machine Client and server are “user” processes TCP and IP are normally part on the “kernel” protocol stack 1 Aside on compiling programs in linux: To compile a program in Linux (not using make) for example

It/240 Univeristy Of Phoenix Appendix E

337 words - 2 pages Associate Level Material Appendix E TCP/IP Network Planning Table Refer to appendix E1. Identify the problems with the TCP/IP network and complete the table. |Problem |Explanation of Proposed Solution | |Group A and D have incorrect subnet addresses. |All

History Of Ipv4

518 words - 3 pages server service that dynamically assigns, or leases, IP addresses and related IP information to network clients. At first glance, this may not seem like an important task. However, you have to remember that, on a TCP/IP network, each network client must have a unique IP address and an appropriate subnet mask. Without these items, a client cannot communicate on the network. For example, if two clients have the same IP address, neither will be able to communicate on the network.

Ntc/362 Fundamentals Of Networking Team Paper

3457 words - 14 pages hardware and software component requirements to ensure that the collection of these is adequate enough to exchange information on the network. The inclusion of a WLAN, WAN, and VoIP will require additional protocols that are unique from the OSI. Required Protocols Consist of TCP/IP which is the Transmission Control Protocol/ Internet Protocol along with VoIPs are required for the improvement designs to the Patton-Fuller network. There is

Risk Managment

438 words - 2 pages : ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several

Wireless Glossary

4427 words - 18 pages networking technology developed by Apple that makes it easy to set up and use network resources. Bonjour Use Bonjour to discover other networked devices on your wireless network. Bonjour uses the following protocols: -- DDNS -- mDNS -- AutoIP Always capitalized. The client makes a BOOTP A protocol allowing a network request and is assigned an IP device to broadcast a request for address. an IP address, and a server to DHCP is based on BOOTP

Intro Networking

449 words - 2 pages connected to the internet in your home and can be connected through multiple devices. WAN is a network that connects multiple LAN networks across a large area. VPN is a network that relies on protocol that encrypts the data from one end to another. This network is more used in government applications or a secure networking site. The OSI and TCP/IP models are similar in ways that the both handle the network. They both have and application layer

Ipv4 Vs Ipv6

374 words - 2 pages is also in hexadecimal. Having a bigger address means it takes longer time to find the address and having it in hexadecimal makes it even tougher to figure out. IPv6 also supports IPsec, which supports better security while sending data across the TCP/IP Network. IPv6 is considered safer because of the IPsec where in IPv4, there are many compatibility issues and without having the IPsec enabled, it can be a security fault. IPv6 includes security

Crytographic Tunneling

1193 words - 5 pages between the networks. It manages the transfer of data and guarantees error free data is delivered without loss or duplications (Merkow, 2005). Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) is used in this layer. Both are commonly used protocol on the Internet. TCP guarantees delivery of data and UDP is used for streaming audio and video (Rodriguez, 2011). When data leave the transport layer, enters the network layer (Layer

Related Essays

Three Way Handshack Essay

384 words - 2 pages TCP/IP Three-Way Handshake   In May 1974 the Institute of Electrical and Electronic Engineers (I EEE) publish a paper entitled” A Protocol for Packet Network Intercommunication”. This document describes an Internet internetworking protocol for sharing sources using packet switching. A central control component of this model which was the Transmission Control Program that incorporated both connection – oriented links and datagram service between

It273 Final Essay

680 words - 3 pages (ARP) is a TCP/IP protocol that provides a device’s MAC address, based on its IP address. Anytime a computer communicates with another computer it needs to know its MAC address, which is hard-coded on the network adapter. TCP/IP uses Address Resolution Protocol to find a computer’s MAC address when the IP address The Transport layer protocols responsible for handling end-to-end communication issues and establishing, maintaining, and

Indp Phase 22 Essay

1165 words - 5 pages a common set of telecommunication protocols – the IP family.” (Telecommunication Essentials, 251) Define the overall network architecture. The design of a KFF’s communications system, which includes the networks, routers, switches, wireless access points, access methods and protocols will be used. KFF will not limit the use of LAN architecture but will incorporate TCP/IP on the WAN. The IP handles packet forwarding across the network. It

Network Implementation Essay

2004 words - 9 pages tool, has the ability to analyze routing protocols, recover, decode and/or crack encrypted passwords and record VoIP conversations. Wireshark has the ability to capture packets live and/or read in a file of previously captured packets. Additionally, the interactive interface allows the user to dig deep into the details of the packet as well as reconstruct the flow of a TCP session. I think based upon the research findings comparing and