Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In XIA, a host identifier is the hash of a host's public key.

(a) prepare down one advantage of this scheme.

(b) prepare down disadvantage of this scheme.

problem 2) One proposed XIA principal type is content. Routers can cache chunks of content and respond directly when they see a request for a chunk in their cache. Though, caching is already widespread today. Such as, many organizations (like CMU) employ transparent HTTP proxies at the edges of their networks. These proxies cache web content requested by hosts inside network and can respond with that content if it is requested by another host in the network. Why is content caching in XIA better than today's content caching?

problem 3) For a network with single sender and a single receiver, the 802.11 MAC protocol works as follows:

1) The sender senses channel and makes sure that it has been clear for at least one DIFS (Distributed InterFrame Space) before sending a frame.

2) Before transmitting a frame, sender transmits the preamble to alert the receiver there is data coming and permit it to synchronize with the sender. The preamble is sent at the lowest data rate.

3) After receiving a frame, receiver waits one SIFS (Short InterFrame Space) and sends a link-layer ACK.

For 802.11g, the parameters are as follows:

Parameter                                    Value
Time to transmit preamble             192  s
SIFS                                            10 s
DIFS                                            28 s
Maximum transmission rate            54 Mbps

Link layer ACK frame size 14 bytes

(a) Matt is sending data directly to David's laptop using a TCP connection over 802.11g in ad hoc mode. Suppose the following:

i) Propagation latency is 0.

ii) All frames are received correctly.

iii) David and Matt are achieving the maximum underlying transmission rate (54 Mbps)

iv) TCP is not using delayed ACKs; TCP on David's laptop sends an ACK for each data packet received from Matt.

v) A TCP data packet contains 1500 bytes of payload plus 30 bytes of header

vi) A TCP ACK packet is 70 bytes total.

vii) What goodput will Matt and David achieve? That is, at what rate will they transmit useful application data?

(b) What is the reason of using differently-sized interframe spaces? That is why do we need DIFS and SIFS - why not just pick a single IFS?

problem 4) In schemes like Portland, hierarchical addresses like IP are discarded in favour of at addresses like MACs. However, these at addressing schemes completely destroy the scalability of routing. How do schemes like Portland get around this?

problem 5) Would a scheme like Portland be applicable outside the data center?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96721

Have any Question?


Related Questions in Computer Network & Security

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Suppose there is no inflation and an insurance company

Suppose there is no inflation and an insurance company offers a contract that would pay $500,000 with certainty 50 years from now. What is the most that this contract would be worth today if: 1. The rate of interest is 7 ...

Backgroundyou have obtained a contract position at a small

Background: You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and ...

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Question a signal travels through an amplifier and its

Question : A signal travels through an amplifier, and its power increased and becomes doubled. Then calculate amplification for this condition 2 Discuss about the TCP/IP PROTOCOL SUITE and Principles of Protocol Layering ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As