Problems 1. [40 pointsl Consider a three layer protocol in which Layer 3 encapsulates Layer 2 and Layer 2 encapsulates Layer 1. Assume minimalist headers with fixed length packets. Assume the followi...
2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...
Dears,, I want unique, complete and correct answers to these questions: Q 1. Assume an organization has the classless address 15.25.16.8/17, then find the following: The first address The last address The total number of addresses The network address Does the address 15.25.15.127 belongs to this address space? Does the address 15.25.128.0 belongs to this address space? Q2. a) In an IPv4 packet, the value of HLEN is (1010)2 , and the value of the total length field is (005A)16....
1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...
EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...
1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where DNS protocols (from two hosts) gets two different IP address for the same hostname. 3. If you have a 100% reliable network layer, should you use TCP or UDP at the Transport layer? Explain your answer? 4.Is it is possible for an application on top of UDP to have a reliable data transfer? Explain? 5.Suppose that a Web server runs in Host C on...
help with computer network questions 1. What is the difference between circuit switching and packet switching? 2. What are the different layers in today’s Internet? Why do we create layers? 3. Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on Earth. Every minute the satellite takes a digital photo and sends it to the base station. Assume a propagation speed of 2.4 * 10^8 meters/sec. a. What is the propagation delay of...
check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....
1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel separation issues and interoperability? 802.11n 802.11b 802.11g 802.11a 2. WPA2 uses IEEE 802.X with the Extensible Authentication Protocol (EAP) to perform mutual authentication, either via a _________ server or by means of a changing key generated on the basis of a shared secret pass-phrase. AES RADIUS WEP Common 3. At the MAC level, 802.11 LANs involve the use of ______ for medium access control....
In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...