What are the differences between a hub, switch and router

Assignment Help Computer Networking
Reference no: EM13332601

a. A TCP segment consisting of 1300 bits of data and 160 bits of header is sent to the IP layer, which appends another 160 bits of header. This is then transmitted through two networks, each of which uses a 24-bit packet header. The destination network has a maximum packet size of 600 bits. How many bits including headers are delivered to the network layer protocol at the destination?

b. What are the differences between a hub, switch and router? Describe scenarios when you would use a switch instead of a router and vice versa.

Reference no: EM13332601

Questions Cloud

Who are the stakeholders and what are the ethical issues : What are the ethical issues and what is your recommendation to the financial officer of your company
Explain the rate of disappearance of io4- : For the aqueous reaction 2Cr3+ + 3IO4- +10OH- = 2CrO42- + 3IO3- + 5H2O, under a given set of conditions, the rate of appearance of CrO42- is 3.0 x 10-4 mol/L•s. What is the rate of disappearance of IO4-
Explain stop-and-wait error control : Explain Stop-and-Wait Error Control and Sliding Window Error Control techniques.
State how many calories are require to convert 125g of water : How many calories are require to convert 125g of water at 75.0 Celsius to steam at 100.0 Celsius? (heat of vaporization of H2O = 540.0/ H20(LIQUID) = 1.00 / steam = 0.47
What are the differences between a hub, switch and router : What are the differences between a hub, switch and router? Describe scenarios when you would use a switch instead of a router and vice versa.
Determine the mass of the sphere : A 0.70-m-diameter solid sphere can be rotated about an axis through its center by a torque of 12.8m?N which accelerates it uniformly from rest through a total of 170 revolutions in 14.0s
Explain which one is the strongest reducing agent : a)which is the strongest oxidizing agent? Cu, Pb, Sn, Zn, Al, Mg.......... b)Which one is the strongest reducing agent?................c)If you want to design a battery from relatively common materials that produced a voltage of about 1 V which ce..
What is her new direction : An astronaut (mass of 100 kg, with equipment) is headed back to her space station at a speed of 0.750 m/s but at the wrong angle. What is her new direction (relative to the initial direction)
What is the required bandwidth for the transmission : Calculate the Network ID/Subnet ID of the host having an IP address 192.32.24.70 with a subnet mask 255.255.255.224. What would be the IP address of the 1st host and the last host of the subnet?

Reviews

Write a Review

Computer Networking Questions & Answers

  Osi model

In the meantime, CEO of the first company transmits e-mail to CEO of second company in order to provide a couple suggestions related to the joint venture. Explain whether this scenario follow OSI model? Describe it in detail.

  Advantage-disadvantage of simple network management protocol

Differentiate network monitoring tools and their uses. Write one major advantage and one major disadvantage of "Simple Network Management Protocol (SNMP)".

  Bob pings the local ip address

Bob checks his network but makes no changes. Steve does some checking on his network, the only change Steve makes is to turn on a host device

  Solution for real-time analytical processing diminishes

When merging transaction and analytical processing problem occurs. Real-time analytical processing diminishes performance of transaction processing. Find the solution to this problem which many companies use?

  Sketch the fsm specification for protocol

Sketch the FSM specification for this protocol (one FSM for X, one for Y, and one for Z). udtsend() function must include name of recipient.

  Equalities by induction on n

Be the sum of the first n cubes. Prove the following equalities by induction on n, to arrive at the curious conclusion

  Solution for biometric device in the office and at home

Write a narrative describing the advantages of each option recommending a solution. Include web references to each to each of the solution alternatives

  Implementing wireless technologies

it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

  Explaining security-aware caching resolver

Suppose a security-aware caching resolver receives DNS RRset at time t0 with signatures on it which expire at time t1 (where t0

  The transmitter and receiver are separated

The transmitter and receiver are separated by a channel (medium of transmission). What types of channels are available?  Please keep it short and simple and please no copy and paste.

  How many times message m is modified before destination

When a message travels from source to destination through two routers, how many times the message M is modified before it reaches to the destination as M. Show your work to determine this number.

  Demonstrate with a high degree of confidence that errors

The goal of testing is to demonstrate that the software satisfies its requirements and to demonstrate with a high degree of confidence that errors, which could lead to unacceptable failure condition, have been removed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd