Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
question a consider that you enter the subsequent url in the address bar of a popular web client and that both the server and client accepts http
a wireless local area network wlan technologies constitute a fast-growing market introducing the flexibility of wireless access into office home or
question a a datagram of 3000 bytes has to travel over a network with a mtu size of 1000 bytes describe how fragmentation can be used to solve this
questiona explain with the aid of a diagram a star topology of a network of your choiceb illustrate on the use of a man and give an example of onec
a describe how csmacd operates and explain how ethernet deals with collisionsb describe how the subsequent protocols worki arpii dhcpiii dnsiv smtpc
questiona in relation to a tcp segment structure provide the fields responsible fori connection managementii flow controliii error controliv reliable
questiona consider that you enter the given url in the address bar of a popular web client and that both the client and server accepts http version
a mention the five main security servicesb what is a passive attack give an example of passive attackc what four types of active attacks and mention
problem a the ieee 802 series of standards describe both the physical and data link layers of their respective technologies two important standards
a describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as tcpb what is
question a name 3 popular electronic mail access protocolsbi what is dnsii briefly describe what it does and how it worksiii why does dns use a
question a describe the role of dns root servers in the internet networkb what do you understand by the handover concept in a mobile networkc list
questiona ethernet has grown in popularity in the recent years and is now used in lans give three reasons for the success behind ethernetb ethernet
problema assume that a new application layer protocol is developed for video conferencing application which transport layer protocol between tcp
problema name the various layers of the osi modelb show by means of a diagram how the tcpip reference model is different from the osi-7
question a a crc is constructed to generate a 4-bit fcs for an 11-bit message the divisor polynomial is x4 x3 1i encode the data bit sequence
assume that the rsa problem is hard prove that the rsa encryption is secure against ind- cpa provide a game between an adversary a and a
question 1a draw a use-case model for the above system you must identify all possible actors and use-casesbassume you are using the rational unified
questiona consider the following digital bit stream 01001100 is to be encoded ini nrz-i ii pseudoternary iii manchester iv differential
question a determine the rtt round trip time between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 base-t
questiona explain four issues that are generally addressed in the needs analysis phase in the building-block approach to network designb sketch a
suppose that frames are 1250 bytes long including 25 bytes of overhead also assume that ack frames are 25 bytes long calculate the efficiency of
determine the term - experimental neuropsychologythis is an approach which uses methods from experimental psychology to uncover the relationship
multicastan identifier for a set of interfaces typically belonging to dissimilar nodes a packet sent to a multicast address is delivered to all
difference between unicast and anycastunicast an identifier for a single interface a packet sent to a unicast address is delivered to the interface