Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What are the source and destination port numbers for the segments traveling from Host B to Host A?
In classless (CIDR) IP addressing assume we know lowest and highest IP address in a range of addresses. Briefly outline the process for determining that length.
A TCP machine is sending full windows of 65,535 bytes over a 1 Gbps channel that has a 10 millisec one-way delay. What is the maximum achievable throughput?
List two one-word advantages that a Virtual Circuit network connection scheme has over its Datagram cousin. List one advantage the Datagram scheme has.
Suppose, in TCP's adaptive retransmission mechanism, that EstimatedRTT is 90. Explain your results, i.e., why the increment of µ leads to such a change?
For the Client server application over TCP, why must the server program be executed before the client program?
To fix the problem, you had to fix the server and restore from backup. You want to make the server fault tolerant in case it fails again in the future.
Hands-On Project: What other network models exist or have been in existence besides the OSI model and TCP/IP protocol suite?
What are the five classes of attack possible on a Web server? If cookies are so dangerous, why don't valid Web servers discontinue their use?
Write a fake_create_initial_network_list function, that creates a list with 3 IP addresses. IPs are your choice, 127.0.0.1, etc.
Briefly describe how packet-switching works? How would you transmit data over the Internet, if you had an alternative to packet-switching?
What percentage of the bandwidth of the access link is consumed by the web traffic when there is no proxy server, and all requests are serviced by origin server
Compare the benefits of TCP vs. UDP. What are the major differences between the two protocols? How do these differences affect the choice of protocol
What are the sequence numbers of pending data packets (in transit, corrupted, or lost)? What are the acknowledged numbers of pending ACK packets?
What is the hardware device used to make this connection (network card, onboard port, wireless)? List the device's name as Windows sees
For each of the following network functions, write down the names of the network layers where it should/can be performed. (a) Congestion control
How are outgoing DNS packets from PC to DNS server different than incoming DNS packets from the DNS server to the PC?
Why might a company that allows its employees to work from home require that when they do so, they must use a Virtual Private Network (VPN)?
showing the memory process explaining how memory and virtual memory addressing work.
How SSL uses both asymmetric and symmetric encryption to protect the communications between web browser and web server?
the changes that will be made to the organization, you realize that this is an internal change. You want to identify the kind of internal change this is.
How many two-way 30 kHz analog voice channels can be frequency- division multiplexed in a single television channel?
Problem: Write a small summary that describes how layer 2 and layer 3 addresses function on the network.
Explain the three layers in a broadband content/service provision system. Discuss the relation of the three layers to each other.
Problem: Describe the programing of the Socket Programming by using the ICMP, Proxy Server, SMTP, Traceroute, Wireshark.