Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In XIA, a host identifier is the hash of a host's public key.

(a) prepare down one advantage of this scheme.

(b) prepare down disadvantage of this scheme.

problem 2) One proposed XIA principal type is content. Routers can cache chunks of content and respond directly when they see a request for a chunk in their cache. Though, caching is already widespread today. Such as, many organizations (like CMU) employ transparent HTTP proxies at the edges of their networks. These proxies cache web content requested by hosts inside network and can respond with that content if it is requested by another host in the network. Why is content caching in XIA better than today's content caching?

problem 3) For a network with single sender and a single receiver, the 802.11 MAC protocol works as follows:

1) The sender senses channel and makes sure that it has been clear for at least one DIFS (Distributed InterFrame Space) before sending a frame.

2) Before transmitting a frame, sender transmits the preamble to alert the receiver there is data coming and permit it to synchronize with the sender. The preamble is sent at the lowest data rate.

3) After receiving a frame, receiver waits one SIFS (Short InterFrame Space) and sends a link-layer ACK.

For 802.11g, the parameters are as follows:

Parameter                                    Value
Time to transmit preamble             192  s
SIFS                                            10 s
DIFS                                            28 s
Maximum transmission rate            54 Mbps

Link layer ACK frame size 14 bytes

(a) Matt is sending data directly to David's laptop using a TCP connection over 802.11g in ad hoc mode. Suppose the following:

i) Propagation latency is 0.

ii) All frames are received correctly.

iii) David and Matt are achieving the maximum underlying transmission rate (54 Mbps)

iv) TCP is not using delayed ACKs; TCP on David's laptop sends an ACK for each data packet received from Matt.

v) A TCP data packet contains 1500 bytes of payload plus 30 bytes of header

vi) A TCP ACK packet is 70 bytes total.

vii) What goodput will Matt and David achieve? That is, at what rate will they transmit useful application data?

(b) What is the reason of using differently-sized interframe spaces? That is why do we need DIFS and SIFS - why not just pick a single IFS?

problem 4) In schemes like Portland, hierarchical addresses like IP are discarded in favour of at addresses like MACs. However, these at addressing schemes completely destroy the scalability of routing. How do schemes like Portland get around this?

problem 5) Would a scheme like Portland be applicable outside the data center?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96721

Have any Question? 


Related Questions in Computer Network & Security

Assignmentthe vice president of sales for your company has

Assignment The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites. He tells you that the Sales team is often remote and needs to be able to stay connecte ...

1a briefly explain how an integrity check value icv may be

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors. (b) When using an ICV, explain why (i) a message might be transmitted correctly but the receiver believes t ...

Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

Or the purpose of the first part of this project you are

Or the purpose of the first part of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Projects 1 and 2. After seeing you searc ...

Term paper chief security officeryou have been hired as the

Term Paper: Chief Security Officer You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

In order to provide for the new services at the akron ohio

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured. Create a security matrix spreadsheet and security strategy summary. Include the user rol ...

Question 1which of the following must you do before ip

Question 1 Which of the following must you do before IP source guard can be used on a switch port? (Select 2 choices.) A) Enable IP routing on the switch port. B) Enable DHCP snooping on the switch. C) Configure static I ...

Assignment wireless technologythere are a number of

Assignment: Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen