Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In XIA, a host identifier is the hash of a host's public key.

(a) prepare down one advantage of this scheme.

(b) prepare down disadvantage of this scheme.

problem 2) One proposed XIA principal type is content. Routers can cache chunks of content and respond directly when they see a request for a chunk in their cache. Though, caching is already widespread today. Such as, many organizations (like CMU) employ transparent HTTP proxies at the edges of their networks. These proxies cache web content requested by hosts inside network and can respond with that content if it is requested by another host in the network. Why is content caching in XIA better than today's content caching?

problem 3) For a network with single sender and a single receiver, the 802.11 MAC protocol works as follows:

1) The sender senses channel and makes sure that it has been clear for at least one DIFS (Distributed InterFrame Space) before sending a frame.

2) Before transmitting a frame, sender transmits the preamble to alert the receiver there is data coming and permit it to synchronize with the sender. The preamble is sent at the lowest data rate.

3) After receiving a frame, receiver waits one SIFS (Short InterFrame Space) and sends a link-layer ACK.

For 802.11g, the parameters are as follows:

Parameter                                    Value
Time to transmit preamble             192  s
SIFS                                            10 s
DIFS                                            28 s
Maximum transmission rate            54 Mbps

Link layer ACK frame size 14 bytes

(a) Matt is sending data directly to David's laptop using a TCP connection over 802.11g in ad hoc mode. Suppose the following:

i) Propagation latency is 0.

ii) All frames are received correctly.

iii) David and Matt are achieving the maximum underlying transmission rate (54 Mbps)

iv) TCP is not using delayed ACKs; TCP on David's laptop sends an ACK for each data packet received from Matt.

v) A TCP data packet contains 1500 bytes of payload plus 30 bytes of header

vi) A TCP ACK packet is 70 bytes total.

vii) What goodput will Matt and David achieve? That is, at what rate will they transmit useful application data?

(b) What is the reason of using differently-sized interframe spaces? That is why do we need DIFS and SIFS - why not just pick a single IFS?

problem 4) In schemes like Portland, hierarchical addresses like IP are discarded in favour of at addresses like MACs. However, these at addressing schemes completely destroy the scalability of routing. How do schemes like Portland get around this?

problem 5) Would a scheme like Portland be applicable outside the data center?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96721

Have any Question? 


Related Questions in Computer Network & Security

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

Assignment case study handmade furniture ltdthis case study

Assignment case study: HandMade Furniture Ltd. This case study provides background information for both assignment 1 and assignment 2. As a network consultant, your initial examination of the company has discovered the f ...

Assignment network programmingassignmentbuild a chat

Assignment: Network Programming Assignment: Build a chat programme using socket level programming. This can be done at various levels of sophistication and the marks available at each level are indicated below. Tutorials ...

Assignmentpart 1the new network administrator at health

Assignment Part 1 The new network administrator at Health Care HQ wants to be clear about your duties as the system administrator. In 1 paragraph, you will provide the following: • Explain your job duties to the new netw ...

Q1 the first transcontinental telephone service was

Q1. The first transcontinental telephone service was established in the 1940s. a. true b. false Q2. The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET. a. tru ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro