Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1)a) prepare down four socket functions (C functions) used to create client/server applications.

b) prepare five layers in a typical TCP/IP computer network.

c) prepare down the services provided by TCP?

d) The source and destination port numbers are included in the packet header. Which layer needs to be able to read these port numbers?

problem 2)

a) If the FTP client is in active mode, what are the two FTP commands (protocol commands) issued by the client when the user issues:
ftp> ls

b) If the FTP client is in passive mode, what are the two FTP commands (protocol commands) issued by the client when the user issues:
ftp> get

c) How many concurrent connections does HTTP needs in order to download a single file? How many concurrent connections does FTP needs in order to download a single file?

d) Briefly describe what is a DNS (Domain Name Service) iterated query. Describe why this method is significant to keep the scalability of the DNS.

problem 3)

a) A distributed system uses UDP to transfer files between nodes. You are asked to design a simple reliable protocol to replace it. What are the necessary elements which you need to include in such a protocol? Your solution must focus on possible lost and damaged packets, not performance.

b) Describe the difference between Go-Back-N and Selective Repeat. Given a choice, which one is better for the performance of the network?

c) Describe the difference between “Congestion Control” and “Flow Control” from the view point of a transport protocol.

problem 4)

a) prepare down the two significant functions provided by the network layer protocols? Emphasize the importance of the difference between the two functions.

b) The network administrator checks an Ethernet card configuration using the command ipconfig. He extracts the values for the IP address and for the Mask:

IP address 192.123.246.12

Mask 255.255.255.128

prepare two exs of IP addresses that this machine can access:

1) one IP address that is accessible directly (no routing) by this machine.

2) one IP address that is only accessible via the gateway (router).

c)

371_Router.jpg

There are four routers connected via certain links in above figure. Assume that the following table is used for the initialisation of D’s routing table:

1937_Routing table.jpg

And the minimum cost is an array of 4 integers in the order A, B, C, D:

A advertises its minimum costs as: 0, 12, 7, 3

B advertises its minimum costs as: 12, 0, ∞, 70

C advertises its minimum costs as: 7, ∞, 0, 2

Demonstrate the first update on D’s table if node D simultaneously receives packets with the minimum cost information from the routers A, B and D.

d) There are possibly hundreds of millions of IP addresses in the Internet. Describe why the routing tables in TCP/IP routers do not need to contain lots of entries, and are usually rather small.

problem 5)

a) What is the purpose of CRC (Cyclic Redundancy Check)?

b) find out the CRC value for the character “1110 0001” considering:

i) the algorithm uses a standard polynomial method with 16 bits

ii) the generator is 0x8005

iii) no reverse bytes, no reverse results

prepare the final result of the CRC in hexadecimal.

c) Collisions are a challenging problem for data link protocols. Describe the main differences between data-link layer protocols for wired networks and protocols for wireless networks.

d) Describe briefly how the ARP protocol keeps table with the IP addresses and correspondent MAC (hardware) addresses.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95660

Have any Question? 


Related Questions in Computer Network & Security

Dqfacebook email electronic commerce and collaborative

DQ Facebook, email, electronic commerce, and collaborative sites for both work and leisure are a normal part of our everyday computing activities. Personal information entered on these websites become partially owned by ...

Mpi networkplease let me know if anyone is able to do it

MPI network Please, let me know if anyone is able to do it right and in the proper time. Please put Course number, your Full Name, Assignment number on top right. Submit your homework on Blackboard. Please name your file ...

Network management paperin this paper you will research and

Network Management Paper In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

Security configuration managementkey assignmentsignificant

Security Configuration Management Key Assignment Significant work has been completed over the past few weeks on the Network Security Architecture Design document, including the following: • Security Requirements • Perime ...

Q1 a subnetted or hierarchical backbone can also be called

Q1. A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone Q2. A backbone network that connects many backbone networks span ...

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

Term paper chief security officeryou have been hired as the

Term Paper: Chief Security Officer You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security ...

Assignmentthe vice president of sales for your company has

Assignment The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites. He tells you that the Sales team is often remote and needs to be able to stay connecte ...

Case studyyour company security professionals inc has been

Case study Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as "Case # 2 - W ...

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro