Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1)a) prepare down four socket functions (C functions) used to create client/server applications.

b) prepare five layers in a typical TCP/IP computer network.

c) prepare down the services provided by TCP?

d) The source and destination port numbers are included in the packet header. Which layer needs to be able to read these port numbers?

problem 2)

a) If the FTP client is in active mode, what are the two FTP commands (protocol commands) issued by the client when the user issues:
ftp> ls

b) If the FTP client is in passive mode, what are the two FTP commands (protocol commands) issued by the client when the user issues:
ftp> get

c) How many concurrent connections does HTTP needs in order to download a single file? How many concurrent connections does FTP needs in order to download a single file?

d) Briefly describe what is a DNS (Domain Name Service) iterated query. Describe why this method is significant to keep the scalability of the DNS.

problem 3)

a) A distributed system uses UDP to transfer files between nodes. You are asked to design a simple reliable protocol to replace it. What are the necessary elements which you need to include in such a protocol? Your solution must focus on possible lost and damaged packets, not performance.

b) Describe the difference between Go-Back-N and Selective Repeat. Given a choice, which one is better for the performance of the network?

c) Describe the difference between “Congestion Control” and “Flow Control” from the view point of a transport protocol.

problem 4)

a) prepare down the two significant functions provided by the network layer protocols? Emphasize the importance of the difference between the two functions.

b) The network administrator checks an Ethernet card configuration using the command ipconfig. He extracts the values for the IP address and for the Mask:

IP address 192.123.246.12

Mask 255.255.255.128

prepare two exs of IP addresses that this machine can access:

1) one IP address that is accessible directly (no routing) by this machine.

2) one IP address that is only accessible via the gateway (router).

c)

371_Router.jpg

There are four routers connected via certain links in above figure. Assume that the following table is used for the initialisation of D’s routing table:

1937_Routing table.jpg

And the minimum cost is an array of 4 integers in the order A, B, C, D:

A advertises its minimum costs as: 0, 12, 7, 3

B advertises its minimum costs as: 12, 0, ∞, 70

C advertises its minimum costs as: 7, ∞, 0, 2

Demonstrate the first update on D’s table if node D simultaneously receives packets with the minimum cost information from the routers A, B and D.

d) There are possibly hundreds of millions of IP addresses in the Internet. Describe why the routing tables in TCP/IP routers do not need to contain lots of entries, and are usually rather small.

problem 5)

a) What is the purpose of CRC (Cyclic Redundancy Check)?

b) find out the CRC value for the character “1110 0001” considering:

i) the algorithm uses a standard polynomial method with 16 bits

ii) the generator is 0x8005

iii) no reverse bytes, no reverse results

prepare the final result of the CRC in hexadecimal.

c) Collisions are a challenging problem for data link protocols. Describe the main differences between data-link layer protocols for wired networks and protocols for wireless networks.

d) Describe briefly how the ARP protocol keeps table with the IP addresses and correspondent MAC (hardware) addresses.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95660

Have any Question? 


Related Questions in Computer Network & Security

Assignment wireless technologythere are a number of

Assignment: Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

Multiple-choice questions1 which of the following is not a

Multiple-Choice Questions: 1. Which of the following is NOT a feature of an Intranet? A. uses Internet based standards, such as HTML and SMTP B. is used to connect both local and remote sites into one network C. is used ...

A company in manhattan still keeps to the traditional

A company in Manhattan still keeps to the traditional mailing approaches even though the nature of their business strictly involves confidential documents that need to be sent to clients. Tell this Manhattan Company why ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized format ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

Assignment network programmingassignmentbuild a chat

Assignment: Network Programming Assignment: Build a chat programme using socket level programming. This can be done at various levels of sophistication and the marks available at each level are indicated below. Tutorials ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen