a) Assume that we are using datagram switching (i.e. we are not
using virtual circuits). Is it possible to guarantee bandwidth to
each source-destination pair? Are there disadvantages of doing this
using datagram switching?
b) What is the big-O complexity of processing the header of a
packet if we are using virtual circuits? Briefly explain why.
a) Is it possible to guarantee bandwidth to each source-destination pair? - Yes, it is possible to guarantee b/w to each source-destination pair as it is connectionless service. There is no need of reservation of resources as there is no dedicated path for a connection session. But because it is connectionless, we will need bandwidth of the network to transfer data packets from source to destination, so bandwidth needs to be guaranteed.
Are there disadvantages of doing this using datagram switching? - Yes, Since the datagrams consist of the full destination address, they generate more overhead and thus lead to wastage of the bandwidth. This in turn makes using datagram approach quite costly.
b) What is the big-O complexity of processing the header of a packet if we are using virtual circuits? Briefly explain why.
ANS - O(1) = it makes sense to consider adding fields to packet headers to speed up the packet processing, so Source Hashing, which is a technique for adding an index field to protocol identifiers at all layers to reduce lookup costs and protocol processing. Source hash indices are similar to Virtual Circuit Identifiers (VCIs) in that they reduce lookup times from O(log(n)) to O(1), where n is the number of flows. So by applying Source Hashing in Virtual Circuits the packet headers can now be processed in O(1) only, which is comparatively fast wrt O(log N).
Please let me know in case of any clarifications required. Thanks!
a) Assume that we are using datagram switching (i.e. we are not using virtual circuits). Is...
a) Why can we have the packet header in virtual circuit switching to be much smaller than the typical header in datagram switching? b) Assume that we are using datagram switching (i.e. we are not using virtual circuits). Is it possible to guarantee bandwidth to each source-destination pair? Are there disadvantages of doing this using datagram switching? c) What is the big-O complexity of processing the header of a packet if we are using virtual circuits? Briefly explain why. d)...
Final Cxa am CSIT 340 Computer Networks, fall 2018 received at the receiver b) Assume that we send a packet transmission delay? What's the total deluy et with 100 Mega bytes from one nade to the other. What's the isnoring queueing delay and nodal processing delay)? rors B. Wwhat's the meaning for (c) Calculate the Propagation value? e the Propugation Delay and Bandwidth product, Le, da te ale be forwarded to the link interfaces using the prefix entries tching" to...
At this stage, you should be a Wireshark expert. Thus, we are not going to spell out the steps as explicitly as in earlier labs. In particular, we are not going to provide example screenshots for all the steps. 1. Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets (Note that DNS is using UDP for communications. You can use nslookup commands in Lab 4 to generate DNS...
In this question, we will think about how to answer shortest path problems where we have more than just a single source and destination. Answer each of the following in English (not code or pseudocode). Each subpart requires at most a few sentences to answer. Answers significantly longer than required will not receive full credit You are in charge of routing ambulances to emergency calls. You have k ambulances in your fleet that are parked at different locations, and you...
Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...
VideoDev Ltd is a video and production development company which works for clients across Australia and New Zealand. The company is considering moving some of its computer infrastructure into the Cloud. The VideoDev Board is contemplating this move as a way to increase the company’s flexibility and responsiveness, as well as to achieve some savings on the cost of maintaining their ICT infrastructure. VideoDev has engaged you as a consultant to advise them on the use of Cloud Computing in...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is used to measure bandwidth? Question 1 options: a. msec b. bit/sec c. bytes d. number of packets/sec Question 2 (1 point) Saved Ethernet is one of access network technologies. Question 2 options: True False Question 3 (1 point) Saved Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters,...
PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers in the Examination Answer Booklet. Each question is worth 1.5 marks (14 x 1.5 = 21 marks). Question 1 An organisation has been granted a block of addresses with the mask /22. If the organisation creates 8 equal-sized subnets, how many addresses (including the special addresses) are available in each subnet? Show your calculations. Question 2 Give an example of a valid classful address...
5. Resonance provides the basis for a large portion of organic chemistry and helps us identify sites of high and low electron density. We will see that the electron source (nucleophile) is attracted to the site of electron sinks or deficiency (electrophile). For the following, draw the curved arrow that shows the movement of electrons that takes you from one resonance structure to the other. Remember to always start your arrow at the source of electrons (r-bond or lone pair)....