How to identify udp socket and how to identify a tcp socket

Assignment Help Computer Network Security
Reference no: EM13673300

Question:

Suppose 5 TCP connections are present over some bottleneck link of rate X bps. All connections have a huge file to send (in the same direction over the bottleneck link). The transmissions of the files start at the same time. What is the transmission rate that TCP would like to give to each of the connections?

How to identify a UDP socket? How to identify a TCP socket? Are these data fields same? Why?

UDP and TCP use 1''s complement for their checksums. Suppose you have the following three 8-bit words: 01010100, 01111000, 10001100. What is the 1''s complement of the sum of these words? Show all work. Why UDP takes the 1''s complement of the sum, that is, why not just use the sum?

Suppose Client A initiates a Telnet session with server S. Provide possible source and destination port numbers for:

a. The segment sent from S to A. b. The segment sent from A to S.

Compare two pipelining protocols shown in the textbook - go-back-N and selective repeat.

In our textbook, protocol rdt 3.0 shows a data transfer protocols that uses only acknowledges. As an alternative, consider a reliable data transfer protocol that uses negative acknowledgements. Suppose the sender sends data only infrequently. Will a NAK-only protocol be preferable to protocol that uses ACKs? Why? Suppose the sender has a lot of data to send and the end-to-end connection experiences few losses. In the second case, would a NAK-only protocol be preferable to a protocol that uses ACKs? Why?

Let us assume that the roundtrip delay between sender and receiver is constant and known to the sender. Would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost? Please explain.

Briefly discuss the basic mechanisms adopted by TCP congestion control.

Describe two major network-layer functions in a datagram network.

Describe how packet loss can occur at input and outputs of a router. Is it possible to eliminate packet loss at these ports? If so, how? If not, please explain.

Suppose an application generates chunks of 360 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and then an IP datagram. What percentage of each datagram will be overhead, and what percentage will be application data?

Consider a datagram network using 8-bit host addresses. Suppose a router uses longest prefix matching and has the following forwarding table:

Prefix Match Interface 11 0 110 1 otherwise 2

For each of the 3 interfaces, give the associated range of destination host addresses and the number of addresses in the range.

Consider the following network. With the indicated link costs, use Dijkstra's shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to the textbook example. In cases when several candidate nodes have the same minimal costs, choose a node according to its alphabetical order.

Consider the count-to-infinity problem in the distance vector routing. Will the problem occur if we decrease the cost of a link? Why?

IPv6 adopts a fixed-length 40 byte IP header. What is the major advantage of this approach compared to that in IPv4?

Suppose an ISP owns the block of addresses of the form 200.200.128.0/20. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets?

Why are different inter-AS and intra-AS protocols used in the Internet?

JAVA - COMPLETE CODE ESTIMATE

Sending Email with Java

Java provides an API for interacting with the Internet mail system, which is called JavaMail. However, we will not be using this API, because it hides the details of SMTP and socket programming. Instead, you should write a simple Java program that establishes a TCP connection with a mail server through the socket interface, and sends an email message. 

Reference no: EM13673300

Questions Cloud

Evaluate statistical properties of a population of nuts : Evaluate the statistical properties of a population of the nuts and evaluate the statistical properties of a sample of nuts to infer data about the entire population. Did the factory create all the nuts equally?
Actual and projected sales follow : Actual and projected sales follow.
What is executable space protection : What is a buffer overflow attack, and what can be done to prevent them? Consider this question in terms of both the application and the hardware architecture/system itself.
Companies that engage in long-term sales : Companies that engage in long-term sales contracts such as construction projects often use the percentage of completion method to recognize revenue. This means that revenue is recognized in proportion to the project's completion. True or False..
How to identify udp socket and how to identify a tcp socket : How to identify a UDP socket and how to identify a TCP socket - Compare two pipelining protocols shown in the textbook
What needs to be done to the matrix : How will the matrix above result if we execute the command - What needs to be done to the matrix above for enforcing this policy?
Derive the firms inverse demand for labor : Derive the firm's inverse demand for labor in the short run and derive the firm's inverse demands for labor and capital in the long run.
Compute the taxable income for 2014 : Compute the taxable income for 2014
Two masses are suspended with cord that passes over a pulley : Two masses are suspended with cord that passes over a pulley with negligible mass. The cord also has negligible mass. One of the masses, m1, has a mass of 6.0 kg and the other mass, m2, has a mass of 4.0 kg. The force of the cord attached to m1 is:

Reviews

Write a Review

Computer Network Security Questions & Answers

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  Variation of rsa encryption and decryption

Why would a variation of RSA encryption/decryption where a single prime number is used the modolus insecure? How can someone recover a message x from the encrypted value.

  Suppose that you are amerchant find out the advantages and

the payment card industry data security standard pci dss is used by credit card companies to ensure the safety of the

  A friend is interested in installing a wireless lan in her

a friend is interested in installing a wireless lan in her small business. she has about a dozen employees. she is

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  What security functions are typically outsourced

What security functions are typically outsourced?

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Develop and ratify borderless cybersecurity policies

Establish international cybersecurity threat operation centers where international partnerships work together under the same roof to thwart cyberspace threats

  How asymmetric cryptography is used to provide encryption

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Encrypt block in block cipher using key

Suppose that there is block cipher ABC that always encrypts block of b=72 bits using key of k= 60 bits. Prove that XYZ doesn't give much stronger security than ABC.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd