Ethernet network, Computer Network Security


a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should provide the value of the 3 key fields used in fragmentation for each fragment created.

b) Ethernet has grown in popularity in the recent years and is now widely used in LANs. Give reasons for the success behind Ethernet.

c) Ethernet uses CSMA/CD. Explain the features behind CSMA/CD.

d) A repeater is a physical-layer device generally used in an Ethernet network. List the features of a repeater.

e) Consider you have to recommend someone to build a network. Would you recommend him to use a repeater? Illustrate your answer giving your reasons, specifying any other device that will be used instead.

Posted Date: 10/18/2013 2:04:02 AM | Location : United States

Related Discussions:- Ethernet network, Assignment Help, Ask Question on Ethernet network, Get Answer, Expert's Help, Ethernet network Discussions

Write discussion on Ethernet network
Your posts are moderated
Related Questions
B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be

Discuss how developers should apply the following countermeasures to improve the security of their code:

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

project on ensuring data securities on cloud computing

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

on LAN,where are IP datagrams transported?

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is