Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In XIA, a host identifier is the hash of a host's public key.

(a) prepare down one advantage of this scheme.

(b) prepare down disadvantage of this scheme.

problem 2) One proposed XIA principal type is content. Routers can cache chunks of content and respond directly when they see a request for a chunk in their cache. Though, caching is already widespread today. Such as, many organizations (like CMU) employ transparent HTTP proxies at the edges of their networks. These proxies cache web content requested by hosts inside network and can respond with that content if it is requested by another host in the network. Why is content caching in XIA better than today's content caching?

problem 3) For a network with single sender and a single receiver, the 802.11 MAC protocol works as follows:

1) The sender senses channel and makes sure that it has been clear for at least one DIFS (Distributed InterFrame Space) before sending a frame.

2) Before transmitting a frame, sender transmits the preamble to alert the receiver there is data coming and permit it to synchronize with the sender. The preamble is sent at the lowest data rate.

3) After receiving a frame, receiver waits one SIFS (Short InterFrame Space) and sends a link-layer ACK.

For 802.11g, the parameters are as follows:

Parameter                                    Value
Time to transmit preamble             192  s
SIFS                                            10 s
DIFS                                            28 s
Maximum transmission rate            54 Mbps

Link layer ACK frame size 14 bytes

(a) Matt is sending data directly to David's laptop using a TCP connection over 802.11g in ad hoc mode. Suppose the following:

i) Propagation latency is 0.

ii) All frames are received correctly.

iii) David and Matt are achieving the maximum underlying transmission rate (54 Mbps)

iv) TCP is not using delayed ACKs; TCP on David's laptop sends an ACK for each data packet received from Matt.

v) A TCP data packet contains 1500 bytes of payload plus 30 bytes of header

vi) A TCP ACK packet is 70 bytes total.

vii) What goodput will Matt and David achieve? That is, at what rate will they transmit useful application data?

(b) What is the reason of using differently-sized interframe spaces? That is why do we need DIFS and SIFS - why not just pick a single IFS?

problem 4) In schemes like Portland, hierarchical addresses like IP are discarded in favour of at addresses like MACs. However, these at addressing schemes completely destroy the scalability of routing. How do schemes like Portland get around this?

problem 5) Would a scheme like Portland be applicable outside the data center?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96721

Have any Question? 


Related Questions in Computer Network & Security

Security management assessmentimplementing basic security

Security Management Assessment Implementing basic security management is an important task for system administrators, as security is important to today's organizations. IT specialists are on the front lines of protecting ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Benefits of cloud-based office productivity softwarebased

Benefits of Cloud-based Office Productivity Software Based on what you have learned about using cloud-based office productivity software, create a 5-slide presentation to the department head or CEO to convince him or her ...

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

Assignmentnetwork architecture paper using either the osi

Assignment Network Architecture Paper: Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and acr ...

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Ppp data path completion using dummy network interface term

PPP Data Path Completion using Dummy Network Interface Term Project Goal of Term project 3 1. Completes the user level PPP program - Making a connection on both sides of the program YOU made 2. Try to make the full data ...

Two reasearch paperswan technologies paper research

Two Reasearch Papers WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission techn ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro