Message forwarding a computer in the computing department

Assignment Help Computer Networking
Reference no: EM13380325

Message forwarding

A computer in the Computing Department has just been turned on. The user starts up their web browser and requests to see the Macquarie University home page. The home page mq.edu.au resides on a server on the administration subnet.

Describe what happens in getting this request message to the server and how the server gets the response message back to the client.

You should assume (for now, because the MQ network is a bit more complex as will be explained in later lectures) there is one router that connects the Computing network to the Administration network. Each of these networks is a switched LAN.

You should tell the story of the messages, starting from how the browser formats the request, how it progresses through the stack layers. What happens when we get to the Internet layer (since this machine has not contacted the network before)? What happens in the Data Link layer? What does the switch do? What does the router do? What layers are involved at the switch and the router. How does the server stack deliver the packet to the HTTP server software?

This description will probably take between two and four pages

Reference no: EM13380325

Questions Cloud

Questionlearning for numeric predictiona let the weights of : questionlearning for numeric predictiona let the weights of a two-input perceptron be w0 02 w1 05 and w2 05.
Decision tree learninga describe the main steps in the : decision tree learninga describe the main steps in the basic decision tree learning algorithm. the table below contains
Concept learninga write an algorithm called find-g to nd a : concept learninga write an algorithm called find-g to nd a maximally-general consistent hypothesis. you can assume the
Well-posed machine learning problemsa what is required to : well-posed machine learning problemsa what is required to dene a well-posed learning problem ?b here are two potential
Message forwarding a computer in the computing department : message forwarding a computer in the computing department has just been turned on. the user starts up their web browser
Question - subnettingconsider the following scenarios -a : question - subnettingconsider the following scenarios -a you are an isp that has been assigned a class b network with
Bull an application on computer a in network 1 is sending a : bull an application on computer a in network 1 is sending a message to an application on computer b in network 2.nbsp
1 list the three fundamental security properties and for : 1. list the three fundamental security properties and for each give an example of failure. justify your answer based on
You are working on a new web site for cruzes inc the web : you are working on a new web site for cruzes inc. the web site is aimed at providing travel information to consumers

Reviews

Write a Review

Computer Networking Questions & Answers

  Question you work the night shift at a software development

question you work the night shift at a software development company and mange six web servers that host the

  In logicworks

In Logicworks, make a new design for an automobile third brake light. It will have 8 clock pulses (so use 3 D Flip Flops) and will sequence an LED stip of 15 red LED's as shown after each clock pulse. On the 7th clock pulse, the clock will become ..

  What is theoretical maximum channel capacity

What is the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Subnetting mask

Suppose a subnet with prefix 128.119.40.128/26. Provide an example of one IP address (of the form xxx.xxx.xxx.xxx) which can be allocated to this network.

  Kind of security drill typical in organization

Which kind of security drill do you believe is the most typical in an organization? Which type of security drill do you believe is the most effective? Why?

  Backbone networksa backbone network can be constructed as a

backbone networksa backbone network can be constructed as a switched backbone a routed backbone or a vlan backbone.

  Features to facilitate overcoming limits of security

What features do they incorporate to facilitate overcoming limits of security, merchant risk, cost, etc.? How do they validate cardholder identities?

  What is cgi

What is the difference between a Web server and an application server? What functionality do typical application servers provide?

  Key pieces of basic architecture of the internet

Research to see how the Internet is put together. What are some key pieces of the basic architecture of the Internet?

  Design a simple layout of omni directional antennas

Consider a warehouse that is 60m by 30m. Wireless networking is required so that up to 20 staff members working in the warehouse can track stock movements and perform stock checks using mobile devices.

  Write a description of the path a packet

Write a description of the path a packet takes across the Internet from destination A to destination B. What types of network devices does the packet pass through?

  Explain about backbone networks

Discuss the advantages and disadvantages of each approach and describe an example of a situation where a switched backbone would be preferred.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd