Determine the round trip time, Computer Network Security

Assignment Help:

QUESTION

a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a one-way propagation delay of 10 µs and that the request and header response messages are of negligible size and all other delays are zero.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give a illustration of a transmitted byte-stream by using the subsequent module of data type declarations and its corresponding instances:

title ::= OCTET STRING, year ::= INTEGER, hit ::= BOOLEAN

{title, "Gladiator"}, {year, 2000}, {hit, "1"}

c) Give the format of a typical get message and a trap message under SNMPv1.

d)

i) Show the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Describe the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field generally?

iii) What is the purpose of the DSU or CSU in a Frame Relay network?


Related Discussions:- Determine the round trip time

Negative cycle algorithm in minimum cost flows, QUESTION: (a) Show the...

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

Corresponding access control matrix, Consider a computer system with three ...

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Electronic mail, Electronic Mail: Electronic mail which is famous as e-...

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

Digital signature, A digital signature is a stamp on the data, which is uni...

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

Kasonet pinging system, KASONet Pinging System: Project Title:       ...

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

What is the benefit of adopting a password aging policy, QUESTION (a) H...

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

Configure a router from command line interface, QUESTION (a) Describe ...

QUESTION (a) Describe the difference between static routing and dynamic routing algorithms. (b) List four functions that are performed by the Cisco IOS software during b

Base lining-information security, Base lining •    Organizations do not ...

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

CRC, CRC in matlab

CRC in matlab

TCP/ ip, Q1 (15 marks, 5 marks each part): This question has three parts: ...

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd