Provide the definition and picture of intra-domain routing

Assignment Help Computer Networking
Reference no: EM13336357

CHAPTER 11: Unicast Routing Protocols (RIP, OSPF)

1. In regard to routing tables:
a. There exist two kinds of routing tables, What are` they?
Provide the definition of each one.
b. Provide the definition and picture of Intra-domain routing and Inter-domain routing.
c. How can we determine if an IP packet is carrying an ICMP packet?

2. From the practice exercise section 11.12, page 331.

a. Exercise 6. Use 40 entries.

b. Exercise 19 & provide the routing table for node A

c. Exercise 20 & Provide the routing table for node B

d. Exercise 21 & Provide the routing table for node G

CHAPTER 13: Transport Layer

3. A sender sends a series of packets to the same destination using 4-bit sequence of numbers. If the sequence number starts with 0, what is the sequence number of the 120th packet?

4. Redraw figure 13.18 with 5 packets exchanged (0, 1, 2, 3, and 4). Assume that packet 3 is lost, and packet 2 arrives after packet 4.

5. Redraw figure 13.28 if the sender sends 5 packets(0, 1, 2, 3, and 4). Packets 0, 1, and 2 are sent and acknowledged in one single ACK, which arrives at the sender site after all packets have been sent. Packet 3 is received and acknowledged in a single ACK. Packet 4 is lost and resent.

CHAPTER 14: User Datagram Protocol

6. a. In cases where reliability is not of primary importance, UDP would make a good transport protocol. Give examples of specific cases;
b. Give two examples of specific cases where UDP will not be a good transport protocol to send data;

7. Show the entries for the header of a UDP user datagram that carries a message from a TFTP client to a TFTP server. Fill the check sum with 0s. Choose an appropriate ephemeral port number and the correct well-known port number. The length of data is 40 bytes. Show the UDP packet using the format in figure 14.2.

8. a. A client uses UDP to send data to a server. The data length is 16 bytes. Calculate the efficiency of this transmission at the UDP level (ratio of useful bytes to total bytes).

b. Redo (a), calculating the efficiency of transmission at the IP level. Assume no options for the IP header.

CHAPTER 15: Transmission Control Protocol

9. a. What is the maximum size of the TCP header; What is the minimum size of the TCP header?

b. If the value of the HLEN = 0111, how many bytes of option are included in the segment?

10. a. Show the entries for the header of a TCP segment that carries a message from an FTP client to an FTP
server. Fill the check field with 0s. Choose an appropriate ephemeral port number and the correct well-know port number. The length of data is 50 bytes.

b. TCP is sending data at 1 megabyte per second. If the sequence number starts with 7,000, how long does it take before the sequence number goes back to zero?

11. In a TCP connection, the initial sequence number at the client site is 2,171. The client opens the connection the connection, sends only one segment carrying 1,000 bytes of data, and closes the connection. What is the value of the sequence number in each of the following segments sent by the client?

a. The SYN segment?
b. The data segment?
c. The FIN segment?

Text Book:

https://www.4shared.com/office/00ClB_ox/Advance_TCP.html

Reference no: EM13336357

Questions Cloud

Find the recoil speed of the archer : A 70.0kg archer, standing on frictionless ice, shoots a 200g arrow at a speed of 200m/s. What is the recoil speed of the archer
What adjustments should make to portfolio based on beliefs : Assume you are the manager of a $100 million portfolio of corporate bonds and you believe interest rates will fall. What adjustments should you make to your portfolio based on your beliefs
Find the work done by the shopper : A shopper in a supermarket pushes a cart with a force of 33 N directed at an angle of 25° below the horizontal. Find the work done by the shopper as she moves down a 44 m length aisle
Choose two companies from the same industry : Choose two companies from the same industry: one that is quite successful and one that is struggling. For each company, list every strength and weakness you believe it possesses (both the company and its products.) What could these companies lea..
Provide the definition and picture of intra-domain routing : TCP is sending data at 1 megabyte per second. If the sequence number starts with 7,000, how long does it take before the sequence number goes back to zero?
How much force pulls forward on the block of ice : A 1.8m -long, 600g rope pulls a 2.0kg block of ice across a horizontal, frictionless surface. The block accelerates at 4.0m/s2, How much force pulls forward on the block of ice
What are some threats of private label branding : What are some threats of private label branding? Why would a successful retailer such as WALMART want to produce a private label brand(they currently have over 20 private label brands).
What is the system optimal production quantity : What is the system optimal production quantity and expected profit under global optimization and what is the system optimal production quantity and expected profit under a payback scenario? What is the profit for the retailer and for the manufactur..
What customer database strategies and corresponding costs : Fully develop with significant supporting evidence or detail what customer database strategies and corresponding costs for customer relationship management

Reviews

Write a Review

Computer Networking Questions & Answers

  Security in bluetooth and other mobile devices

Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment.

  Computing propagation delay of the link

Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on earth. What is the propagation delay of the link?

  Explain system enforces both blp and biba properties

Integrity SL = security clearance for level L = integrity clearance for level L SC = security category set for cat. C = integrity category set for cat C. Prove that in this system subject can only read and write at his own level.

  Describe the function or purpose of a virtual machine

Which of the following is the best definition/description of the chroot jail Linux/Unix security control?

  Design a circuit with 3 inputs

Design a circuit with 3 inputs (x,y,z) representing the bits in a binary number, and three outputs (a,b,c) also representing bits in a binary number. When the input is 1,2,3, the binary output should be one less than the inpu

  Explain how you would go about using a viral campaign

Explain how you would go about using a viral campaign for your business and write a few sentencescomparing the results of the two search engines and explain the two results - why do you think they were similar/different?

  Describe relative speed of lans used at each location

Describe how relative speed of 100BaseT LANs used at each location compares to accessing WAN link between two sites.

  Find the required bit rate if sampling rate is given

Find out the required bit rate. Suppose that the sampling rate is 8000 samples per second and that one framing bit is added to each frame.

  Write a temperature conversion program usin constructor

Write a temperature conversion program. The GUI and event handling setup should be done in the constructor of the class that implements the GUI.

  Draw message sequence diagram using stop-and-wait arq

Consider the Stop-and-Wait ARQ. Drawing message sequence diagram illustrating that if network connection between sender and receiver can reorder messages,

  How does server stack deliver packet to http server software

A computer in the Computing Department has just been turned on. The user starts up their web browser and requests to see the Macquarie University home page. The home page www.mq.edu.au resides on a server on the administration subnet.!

  Transmit file using binary exponential backoff algorithm

Two CSMA/CD stations are each attempting to transmit long (multiframe) files. After each frame is sent, they contend for channel using binary exponential backoff algorithm.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd