Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Determine the net ID and host ID of the following IP Addresses. 117.34.4.8, 29.34.41.5 and 23.67.12.1.
Find out the routing table? Find out the collapsed routing table using default route?
Instead of traceroute, you can also use ping to determine the route that packets take to a given network host. It does so by using IP Record Route option. Try the following two commands: ping -R www.c
Fill in the following tables to demonstrate the initial routing table at node F: Now demonstrate the contents of the routing table after each iteration of the algorithm.
IPv4 contained a checksum while IPv6 does not. Explain why the designers of IPv6 decided the checksum was not needed. Give at least 2 concrete reasons why they felt they could or should drop this fe
The MAC address of node E is e (lower case), its IP address is E (UPPER CASE). If node has multiple IP or MAC addresses, use index of segment to distinguish between them. In this topology: T
There are both network-layer addresses (IP-addresses) and link-layer addresses (i.e. LAN addresses), there is a need to translate between them. For the Internet, this is the job of address resolutio
In this section, you will learn a couple of practical tools: route, and ifconfig, and netstat. Below is a very brief explanation of what they do. route The route command can be used to view and mani
Consider a network with ring topology, link bandwidths of 1000 Mbps, and propagation speed 2×108m/s. What would the circumference of loop require to be to exactly contain one 1500 byte packet, s
Compute the total time required to transfer 1500 KByte file in the following cases, assuming a RTT of 10ms, a packet size of 1500 bytes, and the initial 3 RTT of handshaking before the actual data i
Write two command-line sockets programs – a client and a server – as follows. Define a Who-Am-I message as a UDP datagram containing the ASCII string “WHO AM I”. Define a You
What do you mean by a packet, what do packets through, and what are the main types of packet switches? Write down difference between packet switching and circuit switching?
What do you mean by CSU/DSU? What is DTE? What you mean by SOHO? How many people in a SOHO setting? What you mean by SONET? What is SDH? What are the speeds of OC-1, OC-3, and OC-192? What is ATM? Wha
How can popping pop corn cause interference for Wi Fi networks? What do you mean by MIMO and which 802.11 standard supports it? What do you mean by SSID?
Briefly explain about is “best effort” traffic? Write down some possible methods for bandwidth management? Draw the network troubleshooting process.
Explain the various categories of UTP? For each category give the applicable Ethernet standard, speed, and distance (it might be easiest to do this in a table).
In XIA, a host identifier is the hash of a host's public key. Write down one advantage of this scheme. Write down disadvantage of this scheme.
Networking community has explored two various approaches for providing different classes of service: integrated services (IntServ) and differentiated services (DiServ). Briefly compare and contrast
Skype uses mysterious protocol to find out whether the user is logged in, where they are located, and what ports they are listening on. Assume that you have set out to build your own peer-to-peer te
In CCN, data packets are forwarded using longest prefix match. Compared to IP, CCN makes it more difficult to target a particular host with denial of service attack.
Peer-to-peer file sharing systems require a way to permit peers to determine which other peers have the content they want. Compare and contrast the approaches taken by Napster (a centralized databas
Write a Java program to create a client based on TCP protocol. Add comments to your program to illustrate the instructions you are using. What is the function of RMI security manager and RMI registry
Consider iSLIP crossbar scheduling algorithm. For router with N ports, find the maximum number of iterations iSLIP could take to complete?
What are the four essential characteristics of client-server architecture? What do you understand by the term middleware? Describe the functions of middleware. Give two examples of middleware.
By showing all your workings, draw the spanning tree for following graph based on Breadth-First-Search algorithm. Choose e as the root node.