Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1)a) prepare down four socket functions (C functions) used to create client/server applications.

b) prepare five layers in a typical TCP/IP computer network.

c) prepare down the services provided by TCP?

d) The source and destination port numbers are included in the packet header. Which layer needs to be able to read these port numbers?

problem 2)

a) If the FTP client is in active mode, what are the two FTP commands (protocol commands) issued by the client when the user issues:
ftp> ls

b) If the FTP client is in passive mode, what are the two FTP commands (protocol commands) issued by the client when the user issues:
ftp> get

c) How many concurrent connections does HTTP needs in order to download a single file? How many concurrent connections does FTP needs in order to download a single file?

d) Briefly describe what is a DNS (Domain Name Service) iterated query. Describe why this method is significant to keep the scalability of the DNS.

problem 3)

a) A distributed system uses UDP to transfer files between nodes. You are asked to design a simple reliable protocol to replace it. What are the necessary elements which you need to include in such a protocol? Your solution must focus on possible lost and damaged packets, not performance.

b) Describe the difference between Go-Back-N and Selective Repeat. Given a choice, which one is better for the performance of the network?

c) Describe the difference between “Congestion Control” and “Flow Control” from the view point of a transport protocol.

problem 4)

a) prepare down the two significant functions provided by the network layer protocols? Emphasize the importance of the difference between the two functions.

b) The network administrator checks an Ethernet card configuration using the command ipconfig. He extracts the values for the IP address and for the Mask:

IP address 192.123.246.12

Mask 255.255.255.128

prepare two exs of IP addresses that this machine can access:

1) one IP address that is accessible directly (no routing) by this machine.

2) one IP address that is only accessible via the gateway (router).

c)

371_Router.jpg

There are four routers connected via certain links in above figure. Assume that the following table is used for the initialisation of D’s routing table:

1937_Routing table.jpg

And the minimum cost is an array of 4 integers in the order A, B, C, D:

A advertises its minimum costs as: 0, 12, 7, 3

B advertises its minimum costs as: 12, 0, ∞, 70

C advertises its minimum costs as: 7, ∞, 0, 2

Demonstrate the first update on D’s table if node D simultaneously receives packets with the minimum cost information from the routers A, B and D.

d) There are possibly hundreds of millions of IP addresses in the Internet. Describe why the routing tables in TCP/IP routers do not need to contain lots of entries, and are usually rather small.

problem 5)

a) What is the purpose of CRC (Cyclic Redundancy Check)?

b) find out the CRC value for the character “1110 0001” considering:

i) the algorithm uses a standard polynomial method with 16 bits

ii) the generator is 0x8005

iii) no reverse bytes, no reverse results

prepare the final result of the CRC in hexadecimal.

c) Collisions are a challenging problem for data link protocols. Describe the main differences between data-link layer protocols for wired networks and protocols for wireless networks.

d) Describe briefly how the ARP protocol keeps table with the IP addresses and correspondent MAC (hardware) addresses.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95660

Have any Question? 


Related Questions in Computer Network & Security

Introductionthis case study has been divided into six

Introduction This case study has been divided into six components. You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, an ...

Assessing and securing systems on a wide area network

Assessing and securing systems on a wide area network (WAN) Research paper; Ten pages, however no more than fifteen pages, 12 point font, Times New Roman and double spaced. Your name should appear in the header along wit ...

Your report should detail the following section and points

Your report should detail the following section and points below commensurate with the marks allocated and be addressed primarily to the management of CCA Pty Ltd who are not security or IT experts. Some issues may requi ...

Cybersecurity in business and industry industry

Cybersecurity in Business and Industry Industry Profile Introduction - Provided an excellent overview of the cybersecurity industry as a whole. Answered the questions: (a) Why does this industry exist? and (b) How does t ...

Tcpip network assignmentneed 8 ppt slides with at least 2

TCP/IP Network Assignment Need 8 ppt slides with at least 2 references. Your manager has tasked you to create two network diagrams that illustrate the Remote Employee Connection options for VPN connectivity. These diagra ...

Cyber crime and security 2168alleged computer hacker gary

Cyber Crime and Security (2168) Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from y ...

Assignment a complete home networkdevelop an entire home

Assignment: A Complete Home Network Develop an entire home network with a budget of $5,000.00. Your configuration must assume the purchase of associated hardware for access to both wireless and wired connections and a br ...

I encourage you to use latex but even if you dont please

I encourage you to use Latex, but even if you don't, please type your answers or hand write nicely. Explain your argument in a brief and precise way. 1. In a symmetric cryptosystem, Alice and Bob both know the e-key and ...

Using power flow analysis for network Using Power Flow Analysis for Network

Using Power Flow Analysis for Network Reconfiguration Electricity distribution networks connect the high-voltage transmission system to users. Conventional distribution networks have been developed over the last 50 years ...

Management is pleased with the progress that has been made

Management is pleased with the progress that has been made and likes the steps you have taken to set up a secured network environment. During the last status meeting, it was asked, has everything been done that is possib ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate