Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In XIA, a host identifier is the hash of a host's public key.

(a) prepare down one advantage of this scheme.

(b) prepare down disadvantage of this scheme.

problem 2) One proposed XIA principal type is content. Routers can cache chunks of content and respond directly when they see a request for a chunk in their cache. Though, caching is already widespread today. Such as, many organizations (like CMU) employ transparent HTTP proxies at the edges of their networks. These proxies cache web content requested by hosts inside network and can respond with that content if it is requested by another host in the network. Why is content caching in XIA better than today's content caching?

problem 3) For a network with single sender and a single receiver, the 802.11 MAC protocol works as follows:

1) The sender senses channel and makes sure that it has been clear for at least one DIFS (Distributed InterFrame Space) before sending a frame.

2) Before transmitting a frame, sender transmits the preamble to alert the receiver there is data coming and permit it to synchronize with the sender. The preamble is sent at the lowest data rate.

3) After receiving a frame, receiver waits one SIFS (Short InterFrame Space) and sends a link-layer ACK.

For 802.11g, the parameters are as follows:

Parameter                                    Value
Time to transmit preamble             192  s
SIFS                                            10 s
DIFS                                            28 s
Maximum transmission rate            54 Mbps

Link layer ACK frame size 14 bytes

(a) Matt is sending data directly to David's laptop using a TCP connection over 802.11g in ad hoc mode. Suppose the following:

i) Propagation latency is 0.

ii) All frames are received correctly.

iii) David and Matt are achieving the maximum underlying transmission rate (54 Mbps)

iv) TCP is not using delayed ACKs; TCP on David's laptop sends an ACK for each data packet received from Matt.

v) A TCP data packet contains 1500 bytes of payload plus 30 bytes of header

vi) A TCP ACK packet is 70 bytes total.

vii) What goodput will Matt and David achieve? That is, at what rate will they transmit useful application data?

(b) What is the reason of using differently-sized interframe spaces? That is why do we need DIFS and SIFS - why not just pick a single IFS?

problem 4) In schemes like Portland, hierarchical addresses like IP are discarded in favour of at addresses like MACs. However, these at addressing schemes completely destroy the scalability of routing. How do schemes like Portland get around this?

problem 5) Would a scheme like Portland be applicable outside the data center?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96721

Have any Question? 


Related Questions in Computer Network & Security

Research paperfor this writing assignment you find a

Research Paper For this writing assignment, you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on th ...

Computer scienceprimary task response within the discussion

Computer Science Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Case study cyber security in business Case Study: Cyber Security in Business

Case Study: Cyber Security in Business Organizations Protecting organizational assets and information within the company has become a top priority for many organizational leaders. Review the article titled "Missed Alarms ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Assignment network consultation for designitthis assignment

Assignment: Network Consultation for DesignIT This assignment contains two Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to comple ...

Topic ethernet technologiescreate a short essay 1 to 3

Topic: Ethernet Technologies Create a short essay (1 to 3 pages) that describes an Ethernet frame. You will need to do some research to understand the construction of an Ethernet frame. As you describe an Ethernet frame, ...

You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

Ppp data path completion using dummy network interface term

PPP Data Path Completion using Dummy Network Interface Term Project Goal of Term project 3 1. Completes the user level PPP program - Making a connection on both sides of the program YOU made 2. Try to make the full data ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro