All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
computer networking
Questions and Answers of
Computer Networking
Assume the HTTP client in the previous problem closes the connection and, at the same time, acknowledges the bytes received in the response from the server. After receiving the FIN segment from the
In TCP, does a FIN segment close a connection in only one direction or in both directions?
Assume the HTTP client in the previous problem sends a request of 100 bytes. The server responds with a segment of 1200 bytes. Show the contents of the two segments exchanged between the client and
In TCP, does a SYN segment open a connection in only one direction or in both directions?
An HTTP client opens a TCP connection using an initial sequence number (ISN) of 14,534 and the ephemeral port number of 59,100. The server opens the connection with an ISN of 21,732. Show the three
What is the maximum size of the TCP header? What is the minimum size of the TCP header?
TCP is sending data at 1 megabyte per second. If the sequence number starts with 7000, how long does it take before the sequence number goes back to zero?
The maximum window size of the TCP was originally designed to be 64 KB (which means 64 × 1024 = 65,536 or actually 65,535). Can you think of a reason for this?
A client uses TCP to send data to a server. The data consist of 16 bytes. Calculate the efficiency of this transmission at the TCP level (ratio of useful bytes to total bytes).
Looking at the TCP header (Figure 24.7), we find that the sequence number is 32 bits long, while the window size is only 16 bits long. Does this mean that TCP is closer to the Go-Back-N or
In a connection, the value of cwnd is 3000 and the value of rwnd is 5000. The host has sent 2000 bytes, which have not been acknowledged. How many more bytes can be sent?
Can you explain why in TCP a SYN, SYN + ACK, and FIN segment each consume a sequence number, but an ACK segment carrying no data does not consume a sequence number?
In a TCP connection, the initial sequence number at the client site is 2171. The client opens the connection, sends three segments, the second of which carries 1000 bytes of data, and closes the
In TCP, how many sequence numbers are consumed by each of the following segments?a. SYNb. ACKc. SYN + ACKd. Data
To make the initial sequence number a random number, most systems start the counter at 1 during bootstrap and increment the counter by 64,000 every half second. How long does it take for the counter
In TCP, we have two consecutive segments. Assume the sequence number of the first segment is 101. What is the sequence number of the next segment in each of the following cases?a. The first segment
To better understand the need for the three-handshake connection establishment, let us go through a scenario. Alice and Bob have no access to telephones or the Internet (think about the old days) to
In TCP, how do we define the sequence number of a segment (in each direction)? Consider two cases: the first segment and other segments.
The following is part of a TCP header dump (contents) in hexadecimal format.E293 0017 00000001 00000000 5002 07FF…a. What is the source port number?b. What is the destination port number?c. What is
In TCP, some segment types can be used only for control; they cannot be used to carry data at the same time. Can you define some of these segments?
The control field in a TCP segment is 6 bits. We can have 64 different combinations of bits. List some combinations that you think are normally used.
Can you explain why we need four (or sometimes three) segments for connection termination in TCP?
What can you say about each of the following TCP segments, in which the value of the control field is:a. 000000b. 000001c. 010001d. 000100e. 000010f. 010010
Assume a private internet uses a protocol suite totally different from the TCP/IP protocol suite. Can this internet still use the services of UDP or TCP as an end-to-end vehicle of message
In TCP, if the value of HLEN is 0111, how many bytes of options are included in the segment?
Assume a private internet, which uses point-to-point communication between the hosts and needs no routing, has totally eliminated the use of the network layer. Can this internet still benefit from
Compare the TCP header and the UDP header. List the fields in the TCP header that are not part of the UDP header. Give the reason for each missing field.
Answer the following questions:a. What is the minimum size of a UDP user datagram?b. What is the maximum size of a UDP user datagram?c. What is the minimum size of the application-layer payload data
The following is a dump (contents) of a UDP header in hexadecimal format.0045DF0000580000a. What is the source port number?b. What is the destination port number?c. What is the total length of the
A client residing on a host with IP address 122.45.12.7 sends a message to the corresponding server residing on a host with IP address 200.112.45.90. If the well-known port is 161 and the ephemeral
A client uses UDP to send data to a server. The data length is 16 bytes. Calculate the efficiency of this transmission at the UDP level (ratio of useful bytes to total bytes).
Some of the application programs can use the services of two transport-layer protocols (UDP or TCP). When a packet arrives at the destination, how can the computer find which transport layer is
In a network using the Selective-Repeat protocol with m = 4 and the sending window of size 8, the value of variables are Sf = 62, Sn = 67, and Rn = 64. Packet 65 has already been acknowledged at the
In a network using the Go-Back-N protocol with m = 3 and the sending window of size 7, the values of variables are Sf = 62, Sn = 66, and Rn = 64. Assume that the network does not duplicate or reorder
An acknowledgment number in the Go-Back-N protocol defines the next packet expected, but an acknowledgment number in the Selective-Repeat protocol defines the sequence number of the packet to be
Assume we need to design a Selective-Repeat sliding window protocol for a network in which the bandwidth is 1 Gbps and the average distance between the sender and receiver is 5,000 km. Assume the
Assume we need to design a Go-Back-N sliding-window protocol for a network in which the bandwidth is 100 Mbps and the average distance between the sender and receiver is 10,000 km. Assume the average
We can define the bandwidth-delay product in a network as the number of packets that can be in the pipe during the round-trip time (RTT). What is the bandwidth-delay product in each of the following
Answer the following questions related to the FSMs for the Selective-Repeat protocol with m = 7 bits. Assume the window size is 64. (Figure 23.34):a. The sending machine is in the ready state
Answer the following questions related to the FSMs for the Go-back-N protocol with m = 6 bits. Assume the window size is 63. (Figure 23.27):
Answer the following questions related to the FSMs for the Stop-and-Wait protocol (Figure 23.21):a. The sending machine is in the ready state and S = 0. What is the sequence number of the next packet
Redraw Figure 23.35 if the sender sends 5 packets (0, 1, 2, 3, and 4). Packets 0, 1, and 2 are received in order and acknowledged, one by one. Packet 3 is delayed and received after packet 4.
Redraw Figure 23.29 when the sender sends 5 packets (0, 1, 2, 3, and 4). Packets 0, 1, and 2 are sent and acknowledged in a single ACK, which arrives at the sender site after all packets have been
In the Selective-Repeat protocol, the size of the send and receive windows is the same. Does this mean that there are supposed to be no packets in transit?
Create a scenario similar to Figure 23.22 in which the sender sends two packets. The first packet is received and acknowledged, but the acknowledgment is lost. The sender resends the packet after
In the Go-Back-N protocol, the size of the send window can be 2m − 1, while the size of the receive window is only 1. How can flow control be accomplished when there is a big difference between the
Create a scenario similar to Figure 23.22 in which the sender sends three packets. The first and second packets arrive and are acknowledged. The third packet is delayed and resent. The duplicate
Can you explain why some transport-layer packets may be duplicated in the Internet?
Redraw Figure 23.19 with 5 packets exchanged (0, 1, 2, 3, 4). Assume packet 2 is lost and packet 3 arrives after packet 4.
Can you explain why some transport-layer packets may be lost in the Internet?
Assume we want to change the Stop-and-Wait protocol and add the NAK (negative ACK) packet to the system. When a corrupted packet arrives at the receiver, the receiver discards the packet, but sends a
Can you explain why some transport-layer packets may be received out of order in the Internet?
In the Stop-and-Wait protocol, show the case in which the receiver receives a duplicate packet (which is also out of order).
Does the wraparound situation we discussed in the previous question create a problem in a network?Previous QuestionSince the field that stores the sequence number of a packet is limited in size, the
Assume that our network may corrupt packets, but it never loses or duplicates a packet. We are also concerned about flow control. We do not want the sender to overwhelm the receiver with packets.
Since the field that stores the sequence number of a packet is limited in size, the sequence number in a protocol needs to wrap around, which means that two packets may have the same sequence number.
Assume that our network never corrupts, loses, or duplicates packets. We are only concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM to
In a network with fixed value for m > 1, we can either use the Go-Back-N or the Selective-Repeat protocol. Describe the advantage and the disadvantage of using each. What other network criteria
Show the FSM for an imaginary machine with three states: A (starting state), B, and C; and four events: events 1, 2, 3, and 4. The following specify the behavior of the machine:a. When in state A,
In a network, the size of the send window is 20 packets. Which of the following protocols is being used by the network?a. Stop-and-Waitb. Go-Back-Nc. Selective-Repeat
Using 5-bit sequence numbers, what is the maximum size of the send and receive windows for each of the following protocols?a. Stop-and-Waitb. Go-Back-Nc. Selective-Repeat
In a network, the size of the receive window is 1 packet. Which of the following protocols is being used by the network?a. Stop-and-Waitb. Go-Back-Nc. Selective-Repeat
In each of the following protocols, how many packets can have independent sequence numbers before wraparound occurs (see the previous problems).a. Stop-and-Waitb. Go-Back-N with m = 8c. Select-Repeat
Assume a new organization needs to create a new server process and allow its customers to access the organization site using that process. How should the port number for the server process be
Write a program to simulate the sending-site FSMs for the Selective Repeat protocol (Figure 23.34). Figure 23.34 FSMS for SR protocol Sender Time-out. Resend all outstanding packets in window.
A sender sends a series of packets to the same destination using 5-bit sequence numbers. If the sequence numbers start with 0, what is the sequence number of the 100th packet?
Assume you need to write and test a client-server application program on two hosts you have at home.a. What is the range of port numbers you would choose for the client program?b. What is the range
Write a program to simulate the sending-site FSMs for the Go-Back-N protocol (Figure 23.27).
Can you explain why ICANN has divided the port numbers into three groups: well-known, registered, and dynamic?
Operating systems assign a process number to every running application program. Can you explain why these process numbers cannot be used instead of port numbers?
Write a program to simulate the sending-site FSMs for the Stop-and-Wait protocol (Figure 23.21). Figure 23.21 FSMS for the Stop-and-Wait protocol Sender Request came from application. Make a
Compare the range of 16-bit addresses, 0 to 65,535, with the range of 32-bit IP addresses, 0 to 4,294,967,295 (discussed in Chapter 18). Why do we need such a large range of IP addresses, but only a
Assume we have a set of dedicated computers in a system, each designed to perform only a single task. Do we still need host-to-host and process-to-process communication and two levels of addressing?
Write a program to simulate the sending-site FSMs for the simple protocol (Figure 23.18). Figure 23.18 FSMS for the simple protocol Request came from application. Packet arrived. Make a packet and
Make a table to compare and contrast group-membership messages in ICMPv6 with the corresponding messages in version 4.
Make a table to compare and contrast inverse neighbor-discovery messages in ICMPv6 with the corresponding messages in version 4.
Make a table to compare and contrast neighbor-discovery messages in ICMPv6 with the corresponding messages in version 4.
Make a table to compare and contrast informational messages in ICMPv6 with informational messages in ICMPv4.
Make a table to compare and contrast error-reporting messages in ICMPv6 with error-reporting messages in ICMPv4.
In which transition strategy do we need to have both IPv4 and IPv6 in the path?
Which ICMP messages contain part of the IP datagram? Why is this needed?
In which transition strategy do we need to encapsulate IPv6 packets in the IPv4 packets?
An IPv6 packet consists of a base header and a TCP segment. The length of data is 128,000 bytes (jumbo payload). Show the packet and enter a value for each field.
Which messages in version 6 replace the IGMPv6 messages in version 4?
An IPv6 packet consists of the base header and a TCP segment. The length of data is 320 bytes. Show the packet and enter a value for each field.
Which message in version 6 replaces the ARP request message in version 4? Which replaces the ARP reply message?
Using the CIDR notation, show the site local address in which the node identifier is 0::123/48.
Assume a datagram carries no option. Do we still need a value for the next header field in Figure 22.7? Figure 22.7 Payload in an IPV6 datagram Next header Some next-header codes 00: Hop-by-hop
Using the CIDR notation, show the link local address in which the node identifier is 0::123/48.
Which field in the IPv6 packet is responsible for multiplexing and demultiplexing?
Using the CIDR notation, show the IPv6 loopback address.
Explain the benefit of renumbering.
Using the CIDR notation, show the IPv6 address mapped to the IPv4 address 129.6.12.34.
Explain the benefit of autoconfiguration.
Using the CIDR notation, show the IPv6 address compatible to the IPv4 address 129.6.12.34.
Find the size of the multicast block from Table 22.1. Table 22.1 Prefixes for assigned IPV6 addresses Block prefix 0000 0000 CIDR 0000:/8 Fraction Block assignment Special addresses Global unicast
An organization is assigned the block 2000:1110:1287/48. What is the IPv6 address of an interface in the third subnet if the IEEE physical address of the computer is (F5-A9-23-14-7A-D2)16.
Find the size of the unique local unicast block from Table 22.1.Table 22.1 Figure 22.1 Global unicast address 128 bits Global routing prefix Subnet identifier Interface identifier n bits m bits q
Find the interface identifier if the Ethernet physical address is (F5-A9-23-12-7A-B2)16 using the format we defined for Ethernet addresses.
Find the size of the special address block from Table 22.1.Table 22.1 Figure 22.1 Global unicast address 128 bits Global routing prefix Subnet identifier Interface identifier n bits m bits q bits
Showing 900 - 1000
of 2050
First
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Last