Determine the round trip time, Computer Network Security

Assignment Help:

QUESTION

a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a one-way propagation delay of 10 µs and that the request and header response messages are of negligible size and all other delays are zero.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give a illustration of a transmitted byte-stream by using the subsequent module of data type declarations and its corresponding instances:

title ::= OCTET STRING, year ::= INTEGER, hit ::= BOOLEAN

{title, "Gladiator"}, {year, 2000}, {hit, "1"}

c) Give the format of a typical get message and a trap message under SNMPv1.

d)

i) Show the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Describe the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field generally?

iii) What is the purpose of the DSU or CSU in a Frame Relay network?


Related Discussions:- Determine the round trip time

Guided media, Guided Media These are those that give a conduit from on...

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

What do you meant by the term bastion host, Question : (a) What do you...

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

Issue specific security policy, Why an organization need the issue specific...

Why an organization need the issue specific security policy

Explain the term virtual private network, Question: (a) Besides privac...

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

Security services, (a) Mention the five main security services. (b) What...

(a) Mention the five main security services. (b) What is a passive attack? Give an example of passive attack? (c) What four types of active attacks and mention their respecti

Secure routing protocols for wireless sensor networks, Q. Secure routing Pr...

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

Incident response, Incident Response: Complete the following sections as id...

Incident Response: Complete the following sections as identified from your Incident Response template (in MS Word format): Update the table of contents (autogenerated) Separate

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

What do you understand by the concept web of trust, Question: a) Name ...

Question: a) Name a method to allow a person to send a confidential email to another person, without risks of a third-party reading the email. Describe briefly the operations

Complexity of network systems, Computer networks is a complex subject due t...

Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd