All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
computer networking
Questions and Answers of
Computer Networking
What information provided by SNMP might be useful to someone planning the IP spoofing attack? What other SNMP information might be considered sensitive?
Application protocols such as FTP and SMTP were designed from scratch, and they seem to work reasonably well. What is it about Business-to-Business and Enterprise Application Integration protocols
Choose a Web Service with equivalent REST and SOAP interfaces, such as those offered by Amazon.com. Compare how equivalent operations are implemented in the two styles.
Get the WSDL for some SOAP-style Web Service and choose an operation. In the messages that implement that operation, identify the fields.
Suppose some receivers in a large conference can receive data at a significantly higher bandwidth than others. What sorts of things might be implemented to address this? Hint: Consider both the
How might you encode audio (or video) data in two packets so that if one packet is lost, then the resolution is simply reduced to what would be expected with half the bandwidth? Explain why this is
Explain the relationship between Uniform Resource Locators (URLs)and Uniform Resource Identifiers (URIs). Given an example of a URI that is not a URL.
What problem would a DNS-based redirection mechanism encounter if it wants to select an appropriate server based on current load information?
Consider the following simplified BitTorrent scenario. There is a swarm of 2n peers and, during the time in question, no peers join or leave the swarm. It takes a peer 1 unit of time to upload or
The purpose of this problem is to give you a better understanding as to the mechanisms of RSA. Write a function that receives as its parameters primes p and q, calculates public and private RSA keys
Write a function that accepts a stream of ASCII characters and encrypts this input using a substitution cipher with the Cipher Block Chaining mode. The block size should be 8 bytes. The program
Write a procedure that computes the SHA-1 hash of a block of data. The procedure should have two parameters: a pointer to the input buffer and a pointer to a 20-byte output buffer. To see the exact
Write a program that encrypts its input by XORing it with a key stream. Find or write as good a random number generator as you can to generate the key stream. The program should act as a filter,
Search the Internet for some court case involving copyright versus fair use and write a 1-page report summarizing your findings.
Rewrite the server of Fig. 6-6 as a true Web server using the GET command for HTTP 1.1. It should also accept the Host message. The server should maintain a cache of files recently fetched from the
Numerous people have registered DNS names that consist of www.word.com, where word is a common word. For each of the following categories, list five such Web sites and briefly summarize what it is
Some cybersquatters have registered domain names that are misspellings of common corporate sites, for example, www.microsfot.com. Make a list of at least five such domains.
Design and implement a chat system that allows multiple groups of users to chat. A chat coordinator resides at a well-known network address, uses UDP for communication with chat clients, sets up chat
One common function that all network protocols need is to manipulate messages. Recall that protocols manipulate messages by adding/striping headers. Some protocols may break a single message into
The file server of Fig. 6-6 is far from perfect and could use a few improvements. Make the following modifications.(a) Give the client a third argument that specifies a byte range.(b) Add a client
Use the trace route (UNIX) or tracert (Windows) programs to trace the route from your computer to various universities on other continents. Make a list of transoceanic links you have discovered. Some
Write a function to do forwarding in an IP router. The procedure has one parameter, an IP address. It also has access to a global table consisting of an array of triples. Each triple contains three
Write a program that simulates a computer network using discrete time. The first packet on each router queue makes one hop per time interval. Each router has only a finite number of buffers. If a
Write a program to simulate routing using flooding. Each packet should contain a counter that is decremented on each hop. When the counter gets to zero, the packet is discarded. Time is discrete,
Write a program to simulate the behavior of the CSMA/CD protocol over Ethernet when there are N stations ready to transmit while a frame is being transmitted. Your program should report the times
The goal of this lab exercise is to implement an error-detection mechanism using the standard CRC algorithm described in the text. Write two programs, generator and verifier. The generator program
Write a program to implement CDMA. Assume that the length of a chip sequence is eight and the number of stations transmitting is four. Your program consists of three sets of processes: four
Multiplexing STS-1 multiple data streams, called tributaries, plays an important role in SONET. A 3:1 multiplexer multiplexes three input STS-1 tributaries onto one output STS-3 stream. This
Write a program that implements message flow from the top layer to the bottom layer of the 7-layer protocol model. Your program should include a separate protocol function for each layer. Protocol
Search the Internet to find out some of the important peering points used for routing packets in the Internet at present.
The Internet is made up of a large number of networks. Their arrangement determines the topology of the Internet. A considerable amount of information about the Internet topology is available on
Go to IETF’s Web site, www.ietf.org, to see what they are doing. Pick a project you like and write a half-page report on the problem and the proposed solution.
The ping program allows you to send a test packet to a given location and see how long it takes to get there and back. Try using ping to see how long it takes to get from your location to several
Find out what networks are used at your school or place of work. Describe the network types, topological, and switching methods used there.
Make a list of activities that you do every day in which computer networks are used. How would your life be altered if these networks were suddenly switched off?
Find the efficiency of the AMPS protocol in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be made in 1-MHz bandwidth allocation.
Find the efficiency of the D-AMPS protocol in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be made in 1-MHz bandwidth allocation.
To which generation does each of the following cellular telephony systems belong?a. AMPSb. D-AMPSc. IS-95
Find the efficiency of the GSM protocol in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be made in 1-MHz bandwidth allocation.
Find the efficiency of the IS-95 protocol in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be made in 1-MHz bandwidth allocation.
Write concurrent TCP client-server programs to simulate a simplified version of HTTP using only a nonpersistent connection. The client sends an HTTP message; the server responds with the requested
In Section 4.2. We noted that the maximum queuing delay is (n - I) D if the switching fabric is n times faster than the input line rates. Suppose that all packets are of the same length, n packets
Do routers have IP addresses? If so, how many?
The DatagramPacket class has two constructors (see Table 25.11). Which constructor can be used as a sending packet? Table 25.11 Some methods in DatagramPacket class public final class
Encrypt the message “this is an exercise” using additive cipher with key = 20. Ignore the space between words. Decrypt the message to get the original plaintext.
Use the additive cipher with k = 10 to encrypt the plaintext “book”. Then decrypt the message to get the original plaintext.
In real-time interactive audio/video, what will happen if a packet arrives at the receiver site after the scheduled playback time?
Explain why TCP, as a byte-oriented stream protocol, is not suitable for applications such as live or real-time multimedia streaming.
In Figure 28.26, can the Web server and media server run on different machines? Figure 28.26 Using a media server Server machine Client machine GET: metafile Web Browser RESPONSE server Metafile GET:
A program for encoding and decoding LZW compression.
Define a Response PDU (see Figure 27.18) using the syntax defined for structured data types in ASN.1.Figure 27.18 Figure 27.18 SNMP PDU format PDU header Variable bindings PDU type Request ib Error
In SCTP, the state of a sender is as follows:a. The sending queue has chunks 18 to 23.b. The value of curTSN is 20.c. The value of the window size is 2000 bytes.d. The value of inTransit is 200.If
Define a GetRequest PDU (see Figure 27.18) using the syntax defined for structured data types in ASN.1.Figure 27.18 Figure 27.18 SNMP PDU format PDU type PDU type PDU header Request Error status
In a Kademlia network, the size of the identifier space is 1024. What is the height of the binary tree (the distance between the root and each leaf)? What is the number of leaves? What is the number
An output interface in a switch is designed using the leaky bucket algorithm to send 8000 bytes/s (tick). If the following frames are received in sequence, show the frames that are sent during each
Alice uses the same key when she encrypts a message to be sent to Bob and when she decrypts a message received from Bob. Is this an example of symmetric-key or asymmetric-key cryptography? Explain.
In SCTP, a SACK chunk reports the receipt of three out-of-order data chunks and five duplicate data chunks. What is the total size of the chunk in bytes?
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time î, the next in-order packet that the receiver is expecting has a sequence number
Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first
Host A and 13 are directly connected with a 100 Mbps link. There is one TCF connection between the two hosts, and I-lost A is sending to Host B an enormous file over this connection. Host A can send
Use the whois service at the American Registry for Internet Numbers (http://www.arin.net/whois) to determine the IP address blocks for three universities. Can the whois services be used to determine
Suppose Host A sends Host B a TCP segment encapsulated in an IP data- gram. When Host B receives the data-gram, how does the network layer in Host B know it should pass the segment (that is, the
Which of the following is not one of the five areas of network management defined by ISO?a. Faultb. Performancec. Personnel
Define an SNMP message (see Figure 27.19) using the syntax defined for structured data types in ASN.1. Figure 27.19 SNMP message Request-id Error-status Error-index Message Header Varbind List
Define a VarbindList (see Figure 27.19) using the syntax defined for structured data types in ASN.1. Figure 27.19 SNMP message Request-id Error-status Error-index Message Header Varbind List Varbind
In predictive coding, assume we have the following sample (xn). Show the encoded message sent if we use adaptive DM (ADM). Let y0 = 10, Δ1 = 4, M1 = 1. Also assume that Mn = 1.5 × Mn-1 if qn = qn-1
In DCT, is the value of T(m, n) in transform coding always between –1 and 1? Explain.
In transform coding, show that a receiver that receives an M matrix can create the original p matrix.
What is the main difference between live audio/video and real-time interactive audio/video?
Assume we devise a protocol with the packet size so large that it can carry all chunks of a live or real-time multimedia stream in one packet. Do we still need sequence numbers or timestamps for the
In Internet telephony, explain how a call from Alice can be directed to Bob when he could be either in his office or at home?
Do you think H.323 is actually the same as SIP? What are the differences? Make a comparison between the two.
How many points can we have in a DHT with m = 10?
Repeat Example 29.2 in the text, but assume that node N12 needs to find the responsible node for key k7.
Explain the problems we encounter if we use IP addresses as the node identifiers in a DHT.
Explain two strategies used for storing an object in DHT-based network.
In Pastry, assume the address space is 16 and that b = 2. How many digits are in an address space? List some of the identifiers.
In a DHT-based network, assume m = 4. If the hash of a node identifier is 18, where is the location of the node in the DHT space?
In a Pastry network with m = 32 and b = 4, what is the size of the routing table and the leaf set?
In a DHT-based network, assume node 4 has a file with key 18. The closest next node to key 18 is node 20. Where is the file stored?a. In the direct methodb. In the indirect method
Show the outline of a routing table for Pastry with address space of 16 and b = 2. Give some possible entries for each cell in the routing table of Node N21.
In a Chord network, we have node N5 and key k5. Is N5 the predecessor of k5? Is N5 the successor of k5?
In a Pastry network using DHT, in which m = 4 and b = 2, draw the identifier space with four nodes, N02, N11, N20, and N23, and three keys, k00, k12, and k24. Determine which node is responsible for
In the previous problem, answer the following questions:a. Show how node N02 responds to a query to find the responsible node for k24.b. Show how node N20 responds to a query to find the responsible
In Kademlia, assume m = 4 and active nodes are N4, N7, and N12. Where is the key k3 stored in this system?
Using the routing tables in Figure 29.11 in the text, explain and show the route if node N0 receives a lookup message for the node responsible for K12.Figure 29.11 聊夏剪夏 専,等 Node NO Node
Using the binary tree in Figure 29.10 in the text, show the subtree for node N11.
In a Kademlia network with m = 4, we have five active nodes: N2, N3, N7, N10, and N12. Find the routing table for each active node (with only one column).
Rank the following applications based on their sensitivity to reliability:1. HTTP2. SNMP3. SMTP4. VoIP
Figure 30.13 shows a router using priority queuing at the input port.The arrival and required service times (transmission time is negligible) for 10 packets are shown below; ti means that the packet
A program to simulate a token bucket.
Rank the following applications based on their sensitivity to delay:1. HTTP2. SNMP3. SMTP4. VoIP
To regulate its output flow, a router implements a weighted queueing scheme with three queues at the output port. The packets are classified and stored in one of these queues before being
Rank the following applications based on their sensitivity to jitter:1. HTTP2. SNMP3. SMTP4. VoIP
In Figure 30.3, assume the weight in each class is 4, 2, and 1. The packets in the top queue are labeled A, in the middle queue B, and in the bottom queue C. Show the list of packets transmitted in
Rank the following applications based on their sensitivity to bandwidth:1. HTTP2. SNMP3. SMTP4. VoIP
In a leaky bucket used to control liquid flow, how many gallons of liquid are left in the bucket if the output rate is 5 gal/min, there is an input burst of 100 gal/min for 12 s, and there is no
Which of the following applications are classified as CBR in ATM?a. HTTPb. SNMPc. SMTPd. VoIP
Assume fixed-sized packets arrive at a router with a rate of three packets per second. Show how the router can use the leaky bucket algorithm to send out only two packets per second. What is the
Which of the following applications are classified as VBR-NRT in ATM?a. HTTPb. SNMPc. SMTPd. VoIP
Showing 400 - 500
of 2050
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last