Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
a udp header does not have sequence number and acknowledgement number fields. is it an advantage or a disadvantage? explain your answer in
A Checklist of the Cabling Specifications that i will give to a Cable Contractor - the list must have cables, connectors and other hardware required for installion of the network
Suppose the following block of 2 bytes in Hexadecimal is to be sent in a multicast system using a checksum of 1 byte:A935
In this phase of the project you will include Part I (presumably improved as needed based upon week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the
Respond to a classmate who summarized a different modulation scheme than you. Compare his or her modulation scheme to the one you selected. What are the major differences? Why is there a need for diff
A common message integrity check is DES-CBC, which means encrypting the message in CBC mode and using the final ciphertext block as the checksum.
Suppose there are exactly two packet switches between a sending host and a receiving host. The transmission rate between the sending host and switch#1 is R1
Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the web servers (outside your department) that are not popular among the users
Assume that you are to design a TDM carrier, say DS-489, to support 30 voice channels using 6 bit samples and a structure similar to DS-1. Determine the required bit rate. Assume that the sa
Your company network currently consists of workstations, switches and routers. There are 12 departments in the company. The company has agreed to use the reserved (private) class B address range.
Name the five layers of the Internet protocol stack and give an example of protocol for each layer (except for the lowest layer). Do not use abbreviations or acronyms.
Imagine you are designing an application-layer protocol for streaming video. How would you deal with the unreliability of the Internet Protocol? Which aspects of unreliability would most aff
You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot. Within the next year they are planning to expand to anot
Describe the two layers: LLC & MAC, and how are they different from what is available in the TCP/IP protocol? Why do we need these two extra layers for a LAN?
Design a switched network to compliment your routed network. Each department will require five switches that will plug into the router cards. Your will be running 100 MB service from the router t
Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1=500kbps, R2=2Mbps, and R3=1Mbps.
A friend is interested in installing a wireless LAN in her small business. She has about a dozen employees. She is concerned about security. Write a two- page letter to explain what security threats
While you are connected in chat, transfer files between partners. Use a continuous ping from the host to the eagle server to monitor network throughput
Suppose that a 1-Megabyte message is sent over a serial link using TCP over IP over PPP. If the speed of the line is 56 kbps and the maximum PPP payload is 500 bytes, how long does it take to sen
What are some of the projected growth rates for expansion of Wi-Fi in a geographic area? Pick a geographic region of the United States and identify growth rates for Wi-Fi in the area over the next yea
Suppose an ISP owns the block of addresses of the form 128.119.40.64/25. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the p
Assume the role of an IT consultant to a new nonprofit organization, Free Flu, which provides flu shots to the elderly. The organization needs a domain name.
You are hired to design an IP addressing scheme for five departments that will provide security and access to the Internet. Each department requires between 1,500 - 2,000 IP addresses. The compan
Draw a potential network architecture of a data network for a secondary campus to the main campus of the university (Detail and explain the function of each component in the network (Include 3 buildin
Assume that there is a block cipher ABC that always encrypts block of b=72 bits using key of k= 60 bits. We know that ABC will be broken even using simple brute-force attacking by guessing the encrypt