Determine the round trip time, Computer Network Security

Assignment Help:

QUESTION

a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a one-way propagation delay of 10 µs and that the request and header response messages are of negligible size and all other delays are zero.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give a illustration of a transmitted byte-stream by using the subsequent module of data type declarations and its corresponding instances:

title ::= OCTET STRING, year ::= INTEGER, hit ::= BOOLEAN

{title, "Gladiator"}, {year, 2000}, {hit, "1"}

c) Give the format of a typical get message and a trap message under SNMPv1.

d)

i) Show the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Describe the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field generally?

iii) What is the purpose of the DSU or CSU in a Frame Relay network?


Related Discussions:- Determine the round trip time

Encapsulation, ENCAPSULATION Network interface layer adds IP datagram ...

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Determine the round trip time, a) determine the RTT (round trip time) betwe...

a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati

Structure of a typical frame relay, Problem a) Consider a 1000 Mbps Eth...

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Compare and contrast the trust models-pgp, a. PKI and PGP are two methods f...

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

It service support within the itil framework, Problem (a) IT Service Suppo...

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Marketing, what are the participant of marketing channal?

what are the participant of marketing channal?

Ip datagram header format, IP DATAGRAM HEADER FORMAT:  It is given in...

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Host-based ids, Host-Based IDS A host-based IDS (HIDS) resides on a part...

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Explain how the diffie-hellman key agreement protocol works, (a) Using Fer...

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

Softbank theft of consumer data -information security, Example : Softbank –...

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd