All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
computer networking
Questions and Answers of
Computer Networking
Determine if a datagram with the following information is a first fragment, a middle fragment, a last fragment, or the only fragment (no fragmentation):a. M bit is set to 1 and the value of the
Compare and contrast the protocol field at the network layer with the port numbers at the transport layer. What is their common purpose? Why do we need two port-number fields but only one protocol
Which fields of the IPv4 main header may change from router to router?
Can each of the following be the value of the TTL in a datagram? Explain your answer.a. 23b. 0c. 1d. 301
In Figure 19.4, show how the sum, wrapped sum, and checksum can be calculated when the words are given in decimal numbers (the way the words are stored in a computer memory). Figure 19.4 Example of
In an IPv4 datagram, the value of the header-length (HLEN) field is (6)16. How many bytes of options have been added to the packet?
In Figure 19.4, show how the sum, wrapped sum, and checksum can be calculated when each word (16 bits) is created instead of waiting for the whole packet to be created. Figure 19.4 Example of
Mention the three auxiliary protocols at the network layer of the TCP/IP suite that are designed to help the IPv4 protocol.
An IP fragment has arrived with an offset value of 100. How many bytes of data were originally sent by the source before the data in this fragment?
An IP datagram has arrived with the following partial information in the header (in hexadecimal):45000054 00030000 2006...a. What is the header size?b. Are there any options in the packet?c. What is
A host is sending 100 datagrams to another host. If the identification number of the first datagram is 1024, what is the identification number of the last?
In an IPv4 datagram, the value of total-length field is (00A0)16 and the value of the header-length (HLEN) is (5)16. How many bytes of payload are being carried by the datagram? What is the
Can the value of the header length field in an IPv4 packet be less than 5? When is it exactly 5?
Assume router R2 in Figure 18.35 receives a packet with destination address 140.24.7.42. How is the packet routed to its final destination?Figure 18.35 Figure 18.35 Longest mask matching
Can router R1 in Figure 18.35 receive a packet with destination address 140.24.7.194? What will happen to the packet if this occurs?Figure 18.35 Figure 18.35 Longest mask matching 140.24.7.0/26
An organization is granted the block 130.56.0.0/16. The administrator wants to create 1024 subnets.a. Find the number of addresses in each subnet.b. Find the subnet prefix.c. Find the first and the
An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for two organizations each with 500 addresses, two organizations each with 250 addresses, and three organizations each
An ISP is granted the block 16.12.64.0/20. The ISP needs to allocate addresses for 8 organizations, each with 256 addresses.a. Find the number and range of addresses in the ISP block.b. Find the
A large organization with a large block address (12.44.184.0/21) is split into one medium-size company using the block address (12.44.184.0/22) and two small organizations. If the first small company
Combine the following three blocks of addresses into a single block:a. 16.27.24.0/26b. 16.27.24.64/26c. 16.27.24.128/25
Assume we have an internet with a 9-bit address space. The addresses are divided between three networks (N0 to N2), with 64, 192, and 256 addresses respectively. The internetwork communication is
Assume we have an internet with a 12-bit address space. The addresses are equally divided between eight networks (N0 to N7). The internetwork communication is done through a router with eight
Assume we have an internet with an 8-bit address space. The addresses are equally divided between four networks (N0 to N3). The internetwork communication is done through a router with four
Compare NAT and DHCP. Both can solve the problem of a shortage of addresses in an organization, but by using different strategies.
Explain how DHCP can be used when the size of the block assigned to an organization is less than the number of hosts in the organization.
Show the n leftmost bits of the following network-addresses/masks that can be used in a forwarding table.a. 170.40.11.0/24b. 110.40.240.0/22c. 70.14.0.0./18
Each of the following addresses belongs to a block. Find the first and the last address in each block.a. 14.12.72.8/24b. 200.107.16.17/18c. 70.110.19.17/16
In classless addressing, can two different blocks have the same prefix length? Explain.
Which of the following cannot be a mask in CIDR?a. 255.225.0.0b. 255.192.0.0c. 255.255.255.6
In classless addressing, we know the first address and the number of addresses in the block. Can we find the prefix length? If the answer is yes, show the process.
Change each of the following masks to a prefix length:a. 255.224.0.0b. 255.240.0.0c. 255.255.255.128
In classless addressing, we know the first and the last address in the block. Can we find the prefix length? If the answer is yes, show the process.
Change each of the following prefix lengths to a mask in dotted-decimal notation:a. N = 0b. N = 14c. N = 30
In Figure 18.10, assume that the link between R1 and R2 is upgraded to 170 kbps and the link between the source host and R1 is now downgraded to 140 kbps. What is the throughput between the source
In classless addressing, what is the value of the prefix length (n) if the size of the block (N) is one of the following?a. N = 1b. N = 1024c. N = 232
List four types of delays in a packet-switched network.
In classless addressing, what is the size of the block (N) if the value of the prefix length (n) is one of the following?a. N = 0b. N = 14c. N = 32
Do we have any of the following services at the network layer of TCP/IP? If not, why?a. flow controlb. error controlc. congestion control
In classless addressing, show the whole address space as a single block using the CIDR notation.
List the three phases in the virtual-circuit approach to switching.
Find the class of the following classful IP addresses:a. 01110111 11110011 10000111 11011101b. 11101111 11000000 11110000 00011101c. 11011111 10110000 00011111 01011101
If a label in a connection-oriented service is 8 bits, how many virtual circuits can be established at the same time?
Find the class of the following classful IP addresses:a. 130.34.54.12b. 200.34.2.1c. 245.34.2.8
What is the piece of information in a packet upon which the forwarding decision is made in each of the following approaches to switching?a. Datagram approachb. Virtual-circuit approach
A program to simulate the action of forwarding in a router given the routing table and the destination address of a packet. The program should find the outgoing user interface.
Rewrite the following IP addresses using dotted-decimal notation:a. 01011110 10110000 01110101 00010101b. 10001001 10001110 11010000 00110001c. 01010111 10000100 00110111 00001111
Distinguish between the process of routing a packet from the source to the destination and the process of forwarding a packet at each router.
A program to find the first and the last address in a block given any addresses in the block and assuming classless addressing.
Rewrite the following IP addresses using binary notation:a. 110.11.5.88b. 12.74.16.18c. 201.24.44.32
Why is routing the responsibility of the network layer? In other words, why can’t the routing be done at the transport layer or the data-link layer?
A program to find the class of a given address in dotted decimal notation.
What is the size of the address space in each of the following systems?a. A system in which each address is only 16 bits.b. A system in which each address is made of six hexadecimal digits.c. A
Why does the network-layer protocol need to provide packetizing service to the transport layer? Why can’t the transport layer send out the segments without encapsulating them in datagrams?
A program to change an address in any notation to two other notations.
Which one has more overhead, a hub or a switch? Explain your answer.
Which one has more overhead, a switch or a router? Explain your answer.
Assume that in Figure 17.6, switch S3 is selected as the root of the tree. Find the spanning tree and the forwarding and blocking port.Figure 17.6 Figure 17.6 A system of connected LANS and its graph
What do we mean when we say that a link-layer switch can filter traffic? Why is filtering important?
If the switch in Figure 17.3 is connected to a router to provide access to the Internet, does it need a link-layer address? Explain.Figure 17.3 Figure 17.3 Link-layer switch Switch Switching table
What is the basis for membership in a VLAN?
Does each port of the switch in Figure 17.3 need a link-layer address? Explain.Figure 17.3 Figure 17.3 Link-layer switch Switch Switching table Address Port 4 71:2B:13:45:61:41 71:2B:13:45:61:42 2
How does a VLAN reduce network traffic?
Find the spanning tree and the logical connection between the switches in Figure 17.14. Figure 17.14 Problem P17-7. Si LAN 1 LAN 2 LAN 3 S3
How does a VLAN provide extra security for a network?
Find the spanning tree and the logical connection between the switches in Figure 17.13. Figure 17.13 Problem P17-6. S1 LAN 1 S2 2 LAN 2 LAN 3 S3 LAN 4 S4
How does a VLAN save a company time and money?
In Figure 17.5, do we have a loop problem if we change each hub in the LANs to a link-layer switch?Figure 17.5 Figure 17.5 Loop problem in a learning switch a. Station A sends a frame to station D b.
What is the difference between a forwarding port and a blocking port?
In Figure 17.5, do we have a loop problem if we change the hub in one of the LANs to a link-layer switch?Figure 17.5 Figure 17.5 Loop problem in a learning switch a. Station A sends a frame to
How is a hub related to a repeater?
Repeat the steps in Figure 17.5 if host B in LAN1 sends a frame to host C in the same LAN.Figure 17.5 Figure 17.5 Loop problem in a learning switch a. Station A sends a frame to station D b. Both
What is a transparent switch?
Repeat the steps in Figure 17.5 if host F in LAN2 sends a frame to host B in LAN1.Figure 17.5 Figure 17.5 Loop problem in a learning switch a. Station A sends a frame to station D b. Both switches
What do we mean when we say that a switch can filter traffic? Why is filtering important?
How is a repeater different from an amplifier?
A switch uses a filtering table; a router uses a routing table. Can you explain the difference?
What is the main difference between Iridium and Globalstar?
What is the purpose of GPS?
Use Kepler’s law to check the accuracy of a given period and altitude for a Globalstar satellite.
Compare an uplink with a downlink.
Use Kepler’s law to check the accuracy of a given period and altitude for an Iridium satellite.
What is the relationship between the Van Allen belts and satellites?
Use Kepler’s law to check the accuracy of a given period and altitude for a GPS satellite.
What is a footprint?
How many slots are sent each second in a channel using D-AMPS? How many slots are sent by each user in 1 s?
Which type of orbit does a GEO satellite have? Explain your answer.
Guess the relationship between a 3-kHz voice channel and a 30-kHz modulated channel in a system using AMPS.
What are the three types of orbits?
Repeat Problem P16-9 for IS-95.Problem P16-9Find the efficiency of AMPS in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be used in 1-MHz
What is the function of the CDMA in IS-95?
Repeat Problem P16-9 for GSM.Problem P16-9Find the efficiency of AMPS in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be used in 1-MHz
What is GSM?
Repeat Problem P16-9 for D-AMPS.Problem P16-9Find the efficiency of AMPS in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be used in 1-MHz
What is the relationship between D-AMPS and AMPS?
Find the efficiency of AMPS in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be used in 1-MHz bandwidth allocation.
What is AMPS?
What is the maximum number of callers in each cell in an IS-95 system?
What is the difference between a hard handoff and a soft handoff?
What is the maximum number of simultaneous calls in each cell in a GSM, assuming no analog control channels?
Which is better, a low reuse factor or a high reuse factor? Explain your answer.
Showing 1100 - 1200
of 2050
First
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Last