Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What do you mean by a packet, what do packets through, and what are the main types of packet switches? Write down difference between packet switching and circuit switching?
What do you mean by CSU/DSU? What is DTE? What you mean by SOHO? How many people in a SOHO setting? What you mean by SONET? What is SDH? What are the speeds of OC-1, OC-3, and OC-192? What is ATM? Wha
How can popping pop corn cause interference for Wi Fi networks? What do you mean by MIMO and which 802.11 standard supports it? What do you mean by SSID?
Briefly explain about is “best effort” traffic? Write down some possible methods for bandwidth management? Draw the network troubleshooting process.
Explain the various categories of UTP? For each category give the applicable Ethernet standard, speed, and distance (it might be easiest to do this in a table).
In XIA, a host identifier is the hash of a host's public key. Write down one advantage of this scheme. Write down disadvantage of this scheme.
Networking community has explored two various approaches for providing different classes of service: integrated services (IntServ) and differentiated services (DiServ). Briefly compare and contrast
Skype uses mysterious protocol to find out whether the user is logged in, where they are located, and what ports they are listening on. Assume that you have set out to build your own peer-to-peer te
In CCN, data packets are forwarded using longest prefix match. Compared to IP, CCN makes it more difficult to target a particular host with denial of service attack.
Peer-to-peer file sharing systems require a way to permit peers to determine which other peers have the content they want. Compare and contrast the approaches taken by Napster (a centralized databas
Consider iSLIP crossbar scheduling algorithm. For router with N ports, find the maximum number of iterations iSLIP could take to complete?
In link state routing protocols, routers broadcast link state announcements to rest of the network containing information about which routers they are directly connected to. The TTL expires. Why is
TFRC transmission rate is based solely on loss rate and RTT of the connection. RED gateways can optionally be run in \byte mode," where the average queue size is measured in bytes instead of packets
At time t, a TCP connection has congestion window of 4000 bytes. The maximum segment size used by the connection is 1000 bytes. What is the congestion window after it sends out 4 packets and receive
Why would ISPs select to have peering relationships if it means they transport packets for free? Why do ISPs attempt to make sure valley-free routes?
Why was the original TCP/IP protocol split into two separate protocols, TCP and IP? Describe how the NAT on the router in your home network violates fate sharing.
Why does UDP exist? Would it not have been sufficient to let applications send raw IP packets?
Measurements of slotted Aloha channel with the infinite number of users demonstrate that 10 percent of the slots are idle. Determine the channel load, G? Calculate the throughput S? Is the channel u
For the bit stream 1010011010(10 bits) sketch the waveforms for the following codes. Make suitable assumptions where ever necessary. NRZL, NRZ-I and Differential Manchester.
Outline the design scheme that make the IP multicast a reliable group communication. Discuss the design issues for Remote Method Invocation.
With a neat diagram explain in detail the working mechanism of RPC. Discuss in details the file service architecture with a neat diagram.
What is the significance of external data representation? With an example describe CORBA CDR Representation. Describe the TCP implementation of Request Reply protocol.
Describe the contents of the Cost Assessment. Several Documents are needed for Configuration Management. State three of them, and describe their importance.
Make a distinction between interior routing and exterior routing. With the use of diagram(s), describe in details how routing takes place between Autonomous Systems.
Describe how frame tagging within a VLAN can be used to set up trunk ports. Describe how inter-VLAN communication can be accomplished through subinterfaces.