What is the structure of ip multicast address, Computer Networking

Assignment Help:

Question :

(a) Several techniques are now available for users to connect to the Internet.

(i) A modem is commonly used to dial up to the Internet. Why is a modem needed for data communications over the telephone system?

(ii) Another way to connect to the Internet is by using ADSL technology. "ADSL is asymmetric". Explain this statement.

(b) What is multicasting? What is the structure of IP Multicast address?

(c) How is the routing of multicast datagrams different from the routing of other IP datagrams?

(d) The IP Address of a Computer is, using the modern notation, 149.144.21.3/24. What are the network, subnet and subnet mask of the computer's IP address?

(e) IP packet delivery in the Internet is characteristed as unreliable, connectionless and best-effort. Describe very briefly what each of these terms means in regard to the IP protocol.

(f) IP packet delivery is unreliable, yet the Internet is commonly used for reliable interprocess communications. How is this reliability achieved? Explain briefly.

(g) Explain what is meant by Quality of Service (QoS).

(h) Describe the two ways for implementing quality of service in the Internet?


Related Discussions:- What is the structure of ip multicast address

Different kinds of firewall architectures, What are the different kinds of ...

What are the different kinds of firewall architectures?

Two metrics used to make routing decisions, In Novell's use of RIP, there a...

In Novell's use of RIP, there are two metrics used to make routing decisions.  What are they? Ans) A. Ticks. B. Hops

Password authentication protocols (pap), Password Authentication Protocols ...

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

What is uniform resource locator, What is Uniform Resource Locator A...

What is Uniform Resource Locator Address of location for accessing Web pages. Clicking on an icon or "hot text" is the most common means of accessing and using a URL. Typing

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Mobile interent technology, Question 3:4 By experimentation, work out the l...

Question 3:4 By experimentation, work out the lowest SNR, under which 4 users can si- multaneously communicate, without error, via this system. For SNR, simply report the largest v

Discuss about the jpeg and ldap, Discuss  about the JPEG and LDAP J...

Discuss  about the JPEG and LDAP JPEG: Stands for Joint Photographic Experts Group.  A standard format of storing digitized, colour, or black-and-white photographs. JPEG fi

Show the vulnerability of the internet, Q. Show the Vulnerability of the In...

Q. Show the Vulnerability of the Internet? More vulnerable than private network. Wide inter-network connection. Easy access by mass public world-wide. Lack of build in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd