Calculate the total latency, Computer Network Security

Assignment Help:

Question

(a) Inspect the following ifconfig output of an IPv6 interface:

1903_Calculate the total latency1.png

i. What is the hidden Hardware Address of the interface on Line #1?
ii. What is the hidden subnet mask on Line #2?
iii. What does /10 mean on line #3?
iv. Why does line #4 have /64?

(b) Consider that a host is sending a frame of 1500 bytes to another host found 10 kilometers away. determine the total latency (from the first bit transmitted by sending host to the last bit buffered by receiving host) on a 100 Base-FX Ethernet network with a "store-N-forward" switch in the path. Consider that the speed of light in a fiber-optic cable is 2 x 108ms-1and that the switch begins retransmitting immediately (i.e. switching delay is negligible) after it has finished buffering the frame completely.

(c) Please refer to the Figure below and answer the following:

i. Consider Host X intend to transfer an IP datagram to Host Y, which is on the same LAN: LAN1 with network id 129.105.0.0 /16. Briefly explain the different interactions that take place by Host X at both the network layer and data-link layers for sending this datagram to Host Y. (The ARP cache of host X at that moment is shown above.)

ii. Suppose now that Host X wants to send a datagram to Host W, which is connected to an 802.11g router R1 via a wireless LAN (network id for this WLAN is 110.11.12.8 /24). Should Host X use ARP to query for Host W's MAC address?

iii. Suppose that router R1 is the default gateway for Host X, briefly describe the steps taken by Host X and R1 at both the network layer and data-link layer for sending a datagram to host W. (The routing table of R1 is shown above. Assume R1 has the MAC address of W in its ARP cache.)

iv. Host X now wants to send a datagram to Host Z on LAN 2 (network id: 111.10.128.0 /20). Assume that Host X has default gateway as R1. Describe the actions taken by R1 (and hence at R2) at both the network layer and data-link layer for routing this datagram to host Z.

v. Consider Host X intends to send another datagram to Host Z. Will Host X still send it to R1? Or will it send it to R2? Since Host X does not have R2's MAC address. Explian how Host X obtains R2's MAC address using the ARP protocol.

2229_Calculate the total latency.png


Related Discussions:- Calculate the total latency

Local talk, LOCAL TALK Apple discovered the LAN technology that uses b...

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

Semester 2, Do you have assignment solutions for CCE UPES MBA for oil and g...

Do you have assignment solutions for CCE UPES MBA for oil and gas semester 2

Architecture of www named world wide web, Write down short notes on the arc...

Write down short notes on the architecture of WWW which is World Wide Web. WWW which means The World Wide web or the web is a repository of information spread worldwide and rel

Digital certificates, A Certificate presents an organization in an official...

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Produce a pcap file from a wireshark capture, Question requires you to prod...

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Ipv6 next header, IPV6 NEXT HEADER It is given in the figure below:

IPV6 NEXT HEADER It is given in the figure below:

Explain how ftp works, QUESTION (a) FTP is a protocol used for the de...

QUESTION (a) FTP is a protocol used for the delivery of files across networks. Explain how FTP works (support your answer with a diagram). (b) How does TCP perform the gi

What do you meant by the term bastion host, Question : (a) What do you...

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

Address resolution with table lookup, ADDRESS RESOLUTION WITH TABLE LOOKUP ...

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

Explain how the key exchange algorithm works, Question: (a) Explain how...

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd