Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
application of satellite communication started with the installation and commissioning of std- ldquobrdquo earth station having 11m diameter antenna
questionwrite a program to find the area under the curve y fx between x a and x b integrate y fx between the limits of a and b the area under a
beladys anomalyalso known fifo anomaly generally on raising the number of frames given to a process virtual storage the program execution is faster
data units at different layers of the tcp ip protocol suitethe data unit prepared at the application layer is known a message at the transport layer
problem 1- alice bob and charlie have a secret key a3 b4 c5 respectively- they want to find a common secret key using diffie-hellan key exchange
udp interaction udp follows four kinds of interaction 1-to-1 one application can interact with one application 1-to-many one application can
udp communication semantics udp needs ip for all delivery that is similar best effort delivery as ip to use udp an application have to either
udp- datagram transport serviceintroduction udp is the one of the transport protocols in tcpip protocol suite udp protocol accepts applications on
transport protocols give application-to-application communication require extended addressing mechanisms to check applications are known
internet protocol ip gives computer-to-computer communication host and receiver addresses are computers this is also known machine-to-machine
using icmp to test reachability icmp can also be used to test several tools an internet host a is reachable from another host b if data
ipv6 addressingipv6 has 128-bit addresses a 128-bit address adds network prefix and host suffix an benefit of ipv6 addressing is that there is
fragmentation and path mtuipv6 source is responsible for fragmentation routers simply drop datagrams bigger than network mtu so source have to
success of ip ip has accommodated dramatic modification since real design but basic rules are still appropriate today there are many new kinds of
fragment identificationident field in every fragment matches ident field in real datagram fragments from different datagrams may arrive out of order
ip datagramvarious options can be included to ip header eg source route record route and timestamp header with no function has h len field value 5
address masksto identify receiver network apply address mask to receiver address and calculate to network address in routing table it can use boolean
ip datagram size datagrams may have different sizes ie header area is generally fixed 20 octets but can have various options data area may contain
virtual packetsthese data packets serve same reason in internet as frames on lan every packet has a header routers which are normally gateways
tcp and udpend-to-end delivery application is connection less the basic function of connectionless service are as givenit adds extension of lan
processing an incoming arp messagewhen an arp message reaches the protocol specifies that the receiver must operate two basic steps first the
address resolution with message exchangean alternative to local calculation is a distributed function a computer that requires to find an address
address resolution with closed-form computationfor networks use reliable addressing it is possible to select an address that creates closed-form
hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string
address resolution algorithms may be grouped into three basic types table lookup closed-form computation message exchange1 table lookupin table