As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called
Transmission Control Protocol (TCP)
, responsible for creation, reliability of delivery, and proper assembling of data packets.
In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report.
In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages.
To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses
sliding windows
for packets remaining in processing at a given time, at both the sender and receiver ends.
In the next step, you will look into subnetting BallotOnline’s IP addresses.
One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232,, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are under way to assure wide adoption, IPv4 is still widely used.
One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.
For a given large network, rather than addressing all the hosts using the host part of the address,
subnetting
allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits. It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.
As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization's needs. BallotOnline has been assigned a network address block by the
In.
As robust as the IP protocol is, it does not perform the actual .docx
1. As robust as the IP protocol is, it does not perform the actual
transmission of the data. In this step, you will investigate the
network protocol called
Transmission Control Protocol (TCP)
, responsible for creation, reliability of delivery, and proper
assembling of data packets.
In addition to IP, TCP is also widely used on the internet,
especially for any network communication where it is essential
to confirm receipt of the transmission. Many of the network
protocols used to implement cloud computing use both TCP and
IP. You will review TCP’s workings and discuss them in your
final technical report.
In general, there is no guarantee that a data packet will reach its
destination. Packets can get lost or corrupted during
transmission, and there are network applications where you
need assurance that the packets have reached their destination.
To achieve reliability, TCP establishes connections between
communicating hosts, using port numbers to refer to
applications on these hosts. Then, packets are created,
sequenced, transmitted, acknowledged, and retransmitted if
missing or containing errors. Finally, at the destination, they are
reassembled into the original messages.
To synchronize the flow of packets between sender and
receiver, and avoid packet congestion in case of varying speeds,
TCP uses
sliding windows
for packets remaining in processing at a given time, at both the
sender and receiver ends.
In the next step, you will look into subnetting BallotOnline’s IP
2. addresses.
One of the drawbacks of IPv4 is the maximum number of
network devices it can support. IPv4 addressing uses a 32-bit
network address. This allows for 232,, or a little over 4 billion
devices. However, today there are significantly more devices on
the internet. Even though the more robust IPv6 version has been
introduced and efforts are under way to assure wide adoption,
IPv4 is still widely used.
One method used to more efficiently use the IPv4 network
addresses is a technique to optimize the addresses by splitting
them into network addresses and host addresses within
designated networks. You will need to take advantage of IP
address splitting so that you can efficiently use and allocate the
IPv4 network addresses that have been assigned to
BallotOnline.
For a given large network, rather than addressing all the hosts
using the host part of the address,
subnetting
allows for splitting the network into several smaller ones by
borrowing the host part bits and adding them to the network
bits. It supports efficient management of local networks
composed of multiple LANs. In this step, you will investigate
subnetting conventions and discuss them in your final report in
order to lay ground for the use of subnets by BallotOnline.
As the network engineer for BallotOnline, you know that
subnetting a network into several smaller and variable-sized
networks will be best for the organization's needs. BallotOnline
has been assigned a network address block by the
3. Internet Assigned Numbers Authority (IANA)
.
Because BallotOnline has several offices around the world, you
will need to subnet this network address to assign just the right
number of addresses to each office location based on the
number of systems at that office location (the network address
assigned by IANA and the number of offices along with their
sizes will be provided in the announcement section of this class
at the beginning of Week 2).
Your task is to create the appropriate number of subnets with
the right size to optimize the network.
Your technical report should include
Classless Interdomain Routing (CIDR)
notation, which allows for specifying a variable-length network
as part of the IPv4 address, leaving the rest for addressing hosts
within the network.
Submit the network information in the submission box below.
Classless Interdomain Routing (CIDR)
Classless Interdomain Routing (CIDR) is a method to use IP
addressing without being restricted to the original grouping of
IPv4 (Class A, B, and C). Using CIDR, you can create a
network (or subnetwork) and size it appropriately based on the
needs.
For example, without CIDR, if you have a network with 500
hosts or systems, you cannot use a Class C network
because Class C is limited to 254 hosts, so you are forced to use
4. a Class B network, which leads to a waste of IP addresses.
Also, prior to CIDR, when specifying a network address, you
will need to also provide the subnet mask. For example:
Network address: 192.168.1.0
Subnet mask: 255.255.255.0
You need both to inform the size of the network.
With CIDR notation, instead of specifying the subnet mask, you
note the number of bits used for the network hosts. For
example, the same network as above would be written as:
Network address: 192.168.1.0/24
For more information, review the following article:
https://opensource.com/article/16/12/cidr-network-notation-
configuration-linux