Calculate the total latency, Computer Network Security

Assignment Help:

Question

(a) Inspect the following ifconfig output of an IPv6 interface:

1903_Calculate the total latency1.png

i. What is the hidden Hardware Address of the interface on Line #1?
ii. What is the hidden subnet mask on Line #2?
iii. What does /10 mean on line #3?
iv. Why does line #4 have /64?

(b) Consider that a host is sending a frame of 1500 bytes to another host found 10 kilometers away. determine the total latency (from the first bit transmitted by sending host to the last bit buffered by receiving host) on a 100 Base-FX Ethernet network with a "store-N-forward" switch in the path. Consider that the speed of light in a fiber-optic cable is 2 x 108ms-1and that the switch begins retransmitting immediately (i.e. switching delay is negligible) after it has finished buffering the frame completely.

(c) Please refer to the Figure below and answer the following:

i. Consider Host X intend to transfer an IP datagram to Host Y, which is on the same LAN: LAN1 with network id 129.105.0.0 /16. Briefly explain the different interactions that take place by Host X at both the network layer and data-link layers for sending this datagram to Host Y. (The ARP cache of host X at that moment is shown above.)

ii. Suppose now that Host X wants to send a datagram to Host W, which is connected to an 802.11g router R1 via a wireless LAN (network id for this WLAN is 110.11.12.8 /24). Should Host X use ARP to query for Host W's MAC address?

iii. Suppose that router R1 is the default gateway for Host X, briefly describe the steps taken by Host X and R1 at both the network layer and data-link layer for sending a datagram to host W. (The routing table of R1 is shown above. Assume R1 has the MAC address of W in its ARP cache.)

iv. Host X now wants to send a datagram to Host Z on LAN 2 (network id: 111.10.128.0 /20). Assume that Host X has default gateway as R1. Describe the actions taken by R1 (and hence at R2) at both the network layer and data-link layer for routing this datagram to host Z.

v. Consider Host X intends to send another datagram to Host Z. Will Host X still send it to R1? Or will it send it to R2? Since Host X does not have R2's MAC address. Explian how Host X obtains R2's MAC address using the ARP protocol.

2229_Calculate the total latency.png


Related Discussions:- Calculate the total latency

Designing and coding of job search mechanism, Designing and coding of Job s...

Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

How to create a security policy, Five years ago, Calgary Kids' Cloth Ltd wa...

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Firewall architectures-screened subnet architecture, Screened Subnet Archit...

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

Cyber troll case, According to the case, The EZ Company introduced a new te...

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

Cryptographic hash functions, (a) (i) Bob has public RSA key (n = 77, e...

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

Fragmentation format, FRAGMENTATION Fragmentation information is kept...

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

Security goals, what is relation ship between computer security goals?

what is relation ship between computer security goals?

History, how did slavery influence life in the colonies

how did slavery influence life in the colonies

What is the benefit of adopting a password aging policy, QUESTION (a) H...

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

What is network address translation, Question: (a) What is Network Add...

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd