You are on page 1of 3

Running head: UNIT 5 ASSIGNMENT2 1

Unit 5 Assignment 2

Student’s Name

Institutional Affiliation
UNIT 5 ASSIGNMENT 2 2

Unit 5 Assignment 2

Since the course commenced, I have learned several aspects of Internet Protocol/

Transmission Control Protocol. As the class began, I learned about particular terminologies and

concepts associated with the TCP/IP. Some of the aspects are multicast and shadow networks. In

particular, multicast implies the use of bandwidth-conserving technology, focusing on reducing

traffic by delivering single information simultaneously to different receivers in homes and

businesses. On the other hand, the shadow network involves a phenomenon whereby data flows

through IPv6 enabled connections as it enters the IPv4 network that cannot be traced. Apart from

the terminologies, the unit course led me to the installation and use of Wireshark software, which

has been one of my best experiences. The software captures data packets, depicting various

protocols that have particular features. The use of Ping and Traceroute, among other commands,

were significant in studying how to troubleshoot network problems. Hence, different aspects

characterized the course.

As the course progressed, I learned about the parts of IPv6 and IPv4 headers. In

particular, the IPv6 header is an improved version of the IPv4 header, hence playing a critical

role in eliminating some non-usable parts of the old header. The parts of the IPv6 header include

version, traffic class, and destination address. The header is also defined by the flow label, which

is 20 bit in size, and hop limit, indicating the highest number of intermediate nodes. Other than

the headers, an essential tool that has characterized the course was Wireshark. The application

captures packets of networks with different protocols. Some of the protocols observed in the

packets are TCP, ARP, DNS, and ICMPv6, among others. The course progressed to networking

utilities, where Ping and Tracert tools were identified. In particular, Ping checks the connectivity

between two machines and defines the speed of the connection. In case the connection is lost,
UNIT 5 ASSIGNMENT 2 3

when packets are sent, the percentage loss is indicated with a non-zero digit(s). Similarly, Tracert

confirms the connection between the source and destination machines, while detailing the hops

experienced along the packet path. Finally, the course took us to the seven layers of Open

Systems Interconnections models, which include the Application Layer, Transport Layer, and

Network Layer, among others. The layers define the nature of communication and interaction

between computers. The Neighbor Discovery protocol has also been defined as a critical element

of IPv6, replacing ARP and ICMP in IPv4. The protocol is essential when resolving link-layer

addresses, detecting neighbor unreachability, and any duplicated addresses, among others.

Up to where we have reached with the course, I believe that the content has been

significant for real-life applications. In particular, I plan to use Wireshark and computer

command tools to troubleshoot network problems. I will not need a specialist for minor errors,

which I can do myself. Using Ping and Tracert, I will be able to know which connections have

problems before any remedy is incorporated. I hope the knowledge will be significant for

verifying network applications. Through the contents of the unit, I will be a Networking expert

handling some common networking problems.

You might also like