What is the structure of ip multicast address, Computer Networking

Assignment Help:

Question :

(a) Several techniques are now available for users to connect to the Internet.

(i) A modem is commonly used to dial up to the Internet. Why is a modem needed for data communications over the telephone system?

(ii) Another way to connect to the Internet is by using ADSL technology. "ADSL is asymmetric". Explain this statement.

(b) What is multicasting? What is the structure of IP Multicast address?

(c) How is the routing of multicast datagrams different from the routing of other IP datagrams?

(d) The IP Address of a Computer is, using the modern notation, 149.144.21.3/24. What are the network, subnet and subnet mask of the computer's IP address?

(e) IP packet delivery in the Internet is characteristed as unreliable, connectionless and best-effort. Describe very briefly what each of these terms means in regard to the IP protocol.

(f) IP packet delivery is unreliable, yet the Internet is commonly used for reliable interprocess communications. How is this reliability achieved? Explain briefly.

(g) Explain what is meant by Quality of Service (QoS).

(h) Describe the two ways for implementing quality of service in the Internet?


Related Discussions:- What is the structure of ip multicast address

Networking device, what is the best time to use brouter rather than router?...

what is the best time to use brouter rather than router? what are advantages of using brouter over router?

What is beaconing, What is Beaconing? The process that permits a networ...

What is Beaconing? The process that permits a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not rece

Factor price, who are experts who lecter on factor price?

who are experts who lecter on factor price?

What are the protocol support tools, What are the Protocol Support Tools ...

What are the Protocol Support Tools The Intranet should support the tools meant for providing various services on the Internet through the protocols. In addition to the convent

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

The application layer - fundamentals of networks, The application layer ...

The application layer This  layer enables users  to access the  network  by providing  a few  services to the user some of the protocols and services available to the  user ar

Off the shelf company, Draw a work breakdown structure (WBS) diagram for th...

Draw a work breakdown structure (WBS) diagram for the project, to show all the planned tasks. This WBS should contain at least two levels. b) Explain the main differences between

Show the tcp connections, Q. Show the TCP connections? Connection estab...

Q. Show the TCP connections? Connection establishment Three-way handshake Why is two-way handshake not enough? Connection termination Four steps

Why you require connecting two computers for file sharing, You require conn...

You require connecting two computers for file sharing. Is it possible to do this without using a hub or router? Yes, you can connect two computers together using only one cable

Determine the functioning of service support, Determine the functioning of ...

Determine the functioning of Service Support Service Support must be considered a strong point for hardware, especially for servers and should be available readily. Many brande

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd