Describe the evolution of mobile telephone generation

Assignment Help Other Subject
Reference no: EM13504430

QUESTION 1

a. Describe the evolution of mobile telephone generation landscape based on wireless celluar technologies and what improvements have been done from one generation to another generation.

b. Android is one of the popular environments for application development over the mobile application. In order to develop mobile application using Android, what are the android software requirements needed and describe the process development flow in developing the application in general.

QUESTION 2

You need to complete the simulation exercise using Wireshark simulator, Tracert and Ping commands. The simulation focuses on the Internet Control Message Protocol (ICMP). ICMP is a companion protocol to IP that helps IP to perform its functions by handling various error and test cases. It is covered in topic 5.6.4 of your text. You need to capture a data from your entire network before you are filtering the ICMP data. The report need to have an introduction and results.

You need to include the whole process how to get the results. The steps below are an important part in order to get the results, however there are many processes you need to include in the report. You also need to describe on how the data have been captured in Wireshark. There are three parts you need to follow and produce the results. The steps are as follows:

 Part 1

Start your exploration by selecting an echo (ping) request and reply packet at the start of the trace. Expand the ICMP block to see the ICMP header and payload details. Answer the following questions to demonstrate your understanding of ICMP echo messages:

a. What are the Type/Code values for an ICMP echo request and echo reply packet, respectively?

b. How do the Identifier and Sequence Number compare for an echo request and the corresponding echo reply?

c. How do the Identifier and Sequence Number compare for successive echo request packets?

d. Is the data in the echo reply the same as in the echo request or different?

Part 2

Next, explore trace route traffic by selecting any Time Exceeded ICMP packet in your trace. Expand the ICMP block to see the ICMP header and payload details:

Draw a picture of one ICMP TTL Exceeded packet to make sure that you understand its nested structure. On your figure, show the position and size in bytes of the IP header, ICMP header with details of the Type/Code and checksum subfields, and the ICMP payload. Within the ICMP payload, draw another rectangle that shows the overall structure of the contents of the payload. Answer the following questions:

a. What is the Type/Code value for an ICMP TTL Exceeded packet?

b. How can the receiver safely find and process all the ICMP fields if it does not know ahead of time what kind of ICMP message to expect? The potential issue, as you have probably noticed, is that different ICMP messages can have different formats.

For instance, Echo has Sequence and Identifier fields while TTL Exceeded does not.

c. How long is the ICMP header of a TTL Exceeded packet? Select different parts of the header in Wireshark to see how they correspond to the bytes in the packet.

d. The ICMP payload contains an IP header. What is the TTL value in this header? Explain why it has this value. Guess what it will be before you look!

Part 3

The source and destination IP addresses in an IP packet denote the endpoints of an Internet path, not the IP routers on the network path the packet travels from the source to the destination. By looking at the details of the packets, answer the following questions:

a. How does your computer (the source) learn the IP address of a router along the path from a TTL exceeded packet? mention where on this packet the IP address is found.

b. How many times is each router along the path probed by traceroute?

c. How does your computer (the source) craft an echo request packet to find (by eliciting a TTL Exceeded response) the router N hops along the path towards the destination? Describe the key attributes of the echo request packet.

Using the traceroute output, sketch a drawing of the network path. Show your computer and the remote server, both with IP addresses, as well as the routers along the path between them numbered by their distance on hops from the start of the path. To finish your drawing, label the routers along the path with the name of the real-world organisation to which they belong. To do this, you will need to interpret the domain names of the routers given by traceroute. If you are unsure, label the routers with the domain name of what you take to be theorganisation. Ignore or leave blank any routers for which there is no domain name (or no IP address).

Reference no: EM13504430

Questions Cloud

Ability to conduct a critical incident technique : Using methodology described in the readings, prepare a list of questions regarding an individual's direct personal experience with leaders. A minimum of 15 questions is required.
Why is a drp needed : Does your organization have a DRP and if so, do you know the procedures/steps it includes? Why is a DRP needed?
What must the pressure of the air supplied to a diver : Scuba divers breathe compressed air stored in metal tanks. What must the pressure of the air supplied to a diver at a depth of 24 m in salt water be
What is the highest acceptable manufacturing cost : What is the highest acceptable manufacturing cost Hannon would be willing to incur to produce the All-Body swimsuit, if it desired a profit of $16 per unit? (Assume target costing.)
Describe the evolution of mobile telephone generation : Evolution of mobile telephone generation landscape based on wireless celluar technologies and what improvements have been done from one generation to another generation.
What is the compent parallel to the ramp : The vector v in the figure has the following components: vx=1, vy=2. what is the compent v parallel to the ramp
How does the social environment affect eating habits : How does the social environment affect eating habits? Are there consequences to using food as a reward or punishment? Is obesity a lack of will or strength of survival?
Find the rate of convective cooling of the walls : The exterior walls of a house have a total area of 204 m2 and are at 11.4°C and the surrounding air is at 7.4° C. Find the rate of convective cooling of the walls
What are the three lowest energy levels of the electrons : We can approximate an electron moving in a nanowire as a one-dimensional infinite square-well potential. Let the wire be 2 μm long. The nanowire is cooled to a temperature of 13K, What are the three lowest energy levels of the electrons

Reviews

Write a Review

Other Subject Questions & Answers

  What mechanisms might the federal market committee

What mechanisms might the Federal Market Committee utilize to expand the money supply? What might the "Fed" be seeing to eliminate by these policies? How are they expected to work?

  Federal reserve-designing and implementing monetary policy

The U.S. Congress and the President should have enough leverage and power to control the Federal Reserve’s actions in both the short and long run. The Federal Reserve should be independent from political pressure in designing and implementing monetar..

  Specify the nature structure types of products or service

according to the textbook the current world economy is increasingly becoming integrated and interdependent as a result

  Choose the given scenario on which to focus your cause and

select the following scenario on which to focus your cause and effect paper. research the topic and include credible

  Explain the effects on people or process or technology

explain the effects on people or process or technology.The paper should be no more than 5 pages, describing that issue and what are the plans control /mitigate the risk ,and future prediction on resolution of the problem.

  Terms of goals-government-social structure and religion

The Virginia colony and the Massachusetts Bay colony: in terms of their goals, government, social structure, and religion. In your response be sure to address the ways in which they were similar and different, and why.

  Element of the speech communication process

Recognizing that the audience for his graduation speech would be packed into a non-air-conditioned gymnasium during the hottest week of the year, Kane decided to keep his speech at the low end of his 10-to-15-minute time limit. In making this decisio..

  Give specific illustration of six kinds of machine guarding

give specific examples of six types of machine guarding and discuss the safety control measures associated with

  Moral development theory

Find an article or situation in law enforcement or corrections agency where you feel a lapse of ethical judgment occurred. In a 1-2 page paper, describe the incident and primary participants.

  What are the stages of negotiation what are the three most

1.what are the stages of negotiation? what are the three most important steps in the negotiation planning process and

  How does cognitive psychology assist you to understand

how does cognitive psychology help you to understand memory? how can the accuracy of memory be affected by cognitive

  Descussing the alternate ftc analysis

Discuss the alternate FTC analysis that is applied to such cases if they are suspect but not found to be per se illegal.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd