1 with what kind of network device router or switch do you

Assignment Help Computer Networking
Reference no: EM13380244

1) With what kind of network device (Router or Switch) do you replace Device 1, Device 2 and Device 3? And Why? Note:  Answer should be either Router or Switch.

2) Choose appropriate IP address from the six address given above  for the interfaces and write explanation

a. Device1 Fa0/0

b. Device1 Fa0/1

c. Device2 Fa0/0

d. Device2 S0/0

3) Write appropriate connections between the devices?

4) Open website in your browser, how different networking protocols involved for successfully displaying the webpage?

Hint: DNS, ARP, HTTP, NAT, TCP/IP

5) Host A is exchanging TCP packets with Host B.  Host B has the TCP buffer size of 1500 bytes and 750 bytes of received and unprocessed data. Host A has a congestion window size of 2000 bytes.

How many bytes host A can send to host B?

6) Five hosts  A, B, C, D, E are connected  in a network. Host A and B are in the same collision domains. Host C and D are in different collision domains but Hosts A, B, C and D are in the same broadcast domain. Host E is in different broadcast domain.

Create network topology using Cisco packet tracer for the above given specification, assign appropriate IP addresses to each host and ping Host E from Host A.

Submit screen shots for the topology, successful ICMP request and response messages.

7) IP address 10.11.111.11 with a subnet mask of 255.255.0.0. Convert to binary

Row1: IP Address,     Row2: Subnet Mask Address,      Row3: Subnet Address

8) Choose all that applies.  Find the one that use the different frequency schemes and indicate the frequencies.

a) 802.11a

b) 802.11b

c) 802.11N

d) Bluetooth

e) WiMAX

9) Write major difference between TDMA and FDMA with less than three sentences.

10) What are the frequency band and bit rates for 802.11n?

11) A company has Class B address with network ID of 149.151.0.0.  And it wants to create subnets with 1502 hosts each.  Apply subnet mask to IP address of 149.151.99.121 to find corresponding subnet

IP Address in Binary

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Mask

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

AND

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

What is the subnet address used by the company in decimal numbers?

Reference no: EM13380244

Questions Cloud

From your study of asymmetric and symmetric key : from your study of asymmetric and symmetric key cryptography use your own words to compare between them in terms of1.
You and your eight-year-old nephew elmo decide to play a : you and your eight-year-old nephew elmo decide to play a simple card game. atthe beginning of the game the cards are
Write a paper discussing threads vs processes what is a : write a paper discussing threads vs processes. what is a thread? what is a process? how are they different? how are
Write two page paper describing xml and json what are they : write two page paper describing xml and json. what are they? why do we need them? are there certain applications that
1 with what kind of network device router or switch do you : 1 with what kind of network device router or switch do you replace device 1 device 2 and device 3? and why? notenbsp
Study carefully the following network topology it is : study carefully the following network topology. it is required that the small business smart office services pty ltd
A rural medical centre in australia plans to improve its : a rural medical centre in australia plans to improve its services to the community by providing telemedicine and
Use wireshark tool to capture packets when you download : use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you
Consider the following udp header dumpbb400045003aff10a : consider the following udp header dumpbb400045003aff10a identify the source port number.b identify the destination port

Reviews

Write a Review

Computer Networking Questions & Answers

  Find an ftp server product

List two examples of e-mail server software other than those mentioned in class. List three to six features of each software package and include the web site of the software manufacturer.

  Define ieee

Define TIA/EIA and briefly describe how it is relevant to the current topic. Define IEEE and briefly describe how it is relevant to the current topic.

  Investigate and write report on using internet phone

you are asked to investigate and write a report on using Internet phone and the company's existing LAN to replace the company's PBX.

  Explaining role of antennas in transmitting radio waves

Explain role of antennas in transmitting radio waves. What kind of antenna is typically used in wireless LAN?

  Data communications and net-centric computing homeworklan

data communications and net-centric computing homeworklan sectionq1. list a below contains the layers of the internet

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Domain name system (dns.dynamic host configuration protocol

On the Internet, the entity that looks up a domain name and retrieves information about it is the:Select one: A. Domain Name System (DNS) B. Dynamic Host Configuration Protocol (DHCP) C. Internet Corporation for Assigned Names and Numbers (ICAAN) ..

  Ip subnet design project-technical design of network service

technical design of network services - You are a consultant being brought in by XUMUC to assist with its merger with another company

  Design a simple layout of omni directional antennas

Consider a warehouse that is 60m by 30m. Wireless networking is required so that up to 20 staff members working in the warehouse can track stock movements and perform stock checks using mobile devices.

  Explain why asynchronous io activity is a problem with many

explain why asynchronous io activity is a problem with many memory protection schemes including basebounds and paging.

  The general method for constructing the parameters of the

the general method for constructing the parameters of the rsa cryptosystem can be described asnbspfollows select two

  Does node refrain from transmitting its scheduled time

Assume nodes A and B are on same 10 Mbps Ethernet bus, and propagation delay between two nodes is 245 bit times. Does B refrain from transmitting at its scheduled time?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd