Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) A network uses routers with fair queueing. This is not weighted - all weights are the same.

(a) Two connections share same congested gateway and have no other congested gateways. Connection A has RTT 5ms, connection B has RTT 10ms. State the throughput of connection B(tputB) in terms of throughput achieved by connection A ( tputA), or specify if there is no relationship between the two.

(b) Two connections traverse same congested gateway, but also traverse some other unshared congested gateways. State the throughput of connection B (tputB) in terms of throughput achieved by connection A ( tputA), or specify if there is no relationship between the two.

problem 2) Matt thinks that fair queuing is great idea! Every flow gets fair share of bandwidth. He is sad to determine it is not extensively implemented. Why is not fair queuing used across the entire Internet?

problem 3) In link state routing protocols, routers broadcast link state announcements to rest of the network containing information about which routers they are directly connected to. Each router collects these announcements from every other router and uses them to build a graph of the network.

(a) Routers store these link state announcements with time to live (TTL); an announcement is deleted when

1) a more recent announcement from same router arrives and replaces it or

2) the TTL expires. Why is this TTL timeout essential?

(b) Link state announcements have sequence numbers to make sure that router never replaces newer information with stale information from older message still circulating in the network. Unlike other protocols, these sequence numbers are not expected to wrap around (and so they should be fairly long, like, 64 bits). A problem can arise when the router crashes, reboots, and begins sending link state announcements starting at sequence # 0. How does network deal with this situation (suppose that routers don’t store current sequence number in non-volatile storage so that it is available after a reboot)?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96694

Have any Question? 


Related Questions in Computer Network & Security

Discussion questions -optimizing your network design please

Discussion Questions - "Optimizing Your Network Design" Please respond to the following: Select and describe one (1) of the queuing methods described in the readings. Present a real-world example of the method you select ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Perimeter securitythe project deliverables are as

Perimeter Security The project deliverables are as follows: • Update the Information Network Security Architecture Design document title page with a new date and project name. • Update your previously completed sections ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

Ppp data path completion using dummy network interface term

PPP Data Path Completion using Dummy Network Interface Term Project Goal of Term project 3 1. Completes the user level PPP program - Making a connection on both sides of the program YOU made 2. Try to make the full data ...

1 when an organization undertakes an infosec-driven review

1. When an organization undertakes an InfoSec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be reviewed? 2. List and de ...

Short papercompare and contrast cat 6 unshielded twisted

Short Paper Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type ...

Firewall fundamentalsactions for firewall

Firewall Fundamentals Actions for 'Firewall Fundamentals Firewalls are considered the key element in securing networks. A firewall is usually a computer that sits on two different networks and passes allowed traffic betw ...

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen