Calculate the total latency, Computer Network Security

Assignment Help:

Question

(a) Inspect the following ifconfig output of an IPv6 interface:

1903_Calculate the total latency1.png

i. What is the hidden Hardware Address of the interface on Line #1?
ii. What is the hidden subnet mask on Line #2?
iii. What does /10 mean on line #3?
iv. Why does line #4 have /64?

(b) Consider that a host is sending a frame of 1500 bytes to another host found 10 kilometers away. determine the total latency (from the first bit transmitted by sending host to the last bit buffered by receiving host) on a 100 Base-FX Ethernet network with a "store-N-forward" switch in the path. Consider that the speed of light in a fiber-optic cable is 2 x 108ms-1and that the switch begins retransmitting immediately (i.e. switching delay is negligible) after it has finished buffering the frame completely.

(c) Please refer to the Figure below and answer the following:

i. Consider Host X intend to transfer an IP datagram to Host Y, which is on the same LAN: LAN1 with network id 129.105.0.0 /16. Briefly explain the different interactions that take place by Host X at both the network layer and data-link layers for sending this datagram to Host Y. (The ARP cache of host X at that moment is shown above.)

ii. Suppose now that Host X wants to send a datagram to Host W, which is connected to an 802.11g router R1 via a wireless LAN (network id for this WLAN is 110.11.12.8 /24). Should Host X use ARP to query for Host W's MAC address?

iii. Suppose that router R1 is the default gateway for Host X, briefly describe the steps taken by Host X and R1 at both the network layer and data-link layer for sending a datagram to host W. (The routing table of R1 is shown above. Assume R1 has the MAC address of W in its ARP cache.)

iv. Host X now wants to send a datagram to Host Z on LAN 2 (network id: 111.10.128.0 /20). Assume that Host X has default gateway as R1. Describe the actions taken by R1 (and hence at R2) at both the network layer and data-link layer for routing this datagram to host Z.

v. Consider Host X intends to send another datagram to Host Z. Will Host X still send it to R1? Or will it send it to R2? Since Host X does not have R2's MAC address. Explian how Host X obtains R2's MAC address using the ARP protocol.

2229_Calculate the total latency.png


Related Discussions:- Calculate the total latency

Find the possible deciphering transformations, Question: (a) A string o...

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

Explain security, W h a t do you understand by the terms security, netwo...

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

Define protocol, For simplicity, each character is regarded as one data pac...

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

What do you meant by network address translation, Problem: (a) What do ...

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

Sending an arp message, Normal 0 false false false EN-U...

Normal 0 false false false EN-US X-NONE X-NONE

Explain the term virtual private network, Question: (a) Besides privac...

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Network analysis and network representation of a project, Question: Net...

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Address resolution with closed-form computation, ADDRESS RESOLUTION WITH CL...

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd