What is the structure of ip multicast address, Computer Networking

Assignment Help:

Question :

(a) Several techniques are now available for users to connect to the Internet.

(i) A modem is commonly used to dial up to the Internet. Why is a modem needed for data communications over the telephone system?

(ii) Another way to connect to the Internet is by using ADSL technology. "ADSL is asymmetric". Explain this statement.

(b) What is multicasting? What is the structure of IP Multicast address?

(c) How is the routing of multicast datagrams different from the routing of other IP datagrams?

(d) The IP Address of a Computer is, using the modern notation, 149.144.21.3/24. What are the network, subnet and subnet mask of the computer's IP address?

(e) IP packet delivery in the Internet is characteristed as unreliable, connectionless and best-effort. Describe very briefly what each of these terms means in regard to the IP protocol.

(f) IP packet delivery is unreliable, yet the Internet is commonly used for reliable interprocess communications. How is this reliability achieved? Explain briefly.

(g) Explain what is meant by Quality of Service (QoS).

(h) Describe the two ways for implementing quality of service in the Internet?


Related Discussions:- What is the structure of ip multicast address

Comparing transport for tcp/ip and osi model, Q. Comparing Transport for TC...

Q. Comparing Transport for TCP/IP and osi model? - The features of TCP and UDP defined at TCP/IP Transport Layer correspond to many of the requirements of the OSI Transport Lay

Security impact of not having a public key infrastructure, (a) You are pro...

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

Fiber modems, FIBER MODEMS: LAN methods are discovered to perform with...

FIBER MODEMS: LAN methods are discovered to perform within the same building. However most institutions have offices located far apart from one other. DISTANCE LIMITATION A

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Running netware 4.11 and you cant commune with your router, You are a syst...

You are a system administrator on a NetWare network, you are running  NetWare 4.11 and you cannot commune with your router. What do think what problem is? Ans)NetWare 4.11 defau

Firewall rules based on a fictitious organisation, Question 1 requires you ...

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t

Simple mail transfer protocoland secure sockets layer, Simple Mail Transfer...

Simple Mail Transfer Protocoland Secure Sockets Layer SMTP: Simple Mail Transfer Protocol is a server-to-server protocol for delivering electronic mail. SSL: Secure Sockets

Disadvantages of ip sec tunnelling mode, Disadvantages of IP sec  Tunnelli...

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

Wide area network, XYZ INC. is a large manufacturing firm that operates 5 f...

XYZ INC. is a large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories in Albany, New York. It operates a tightly connected order m

WAN, what is a WAN

what is a WAN

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd