Determine the round trip time, Computer Network Security

Assignment Help:

QUESTION

a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a one-way propagation delay of 10 µs and that the request and header response messages are of negligible size and all other delays are zero.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give a illustration of a transmitted byte-stream by using the subsequent module of data type declarations and its corresponding instances:

title ::= OCTET STRING, year ::= INTEGER, hit ::= BOOLEAN

{title, "Gladiator"}, {year, 2000}, {hit, "1"}

c) Give the format of a typical get message and a trap message under SNMPv1.

d)

i) Show the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Describe the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field generally?

iii) What is the purpose of the DSU or CSU in a Frame Relay network?


Related Discussions:- Determine the round trip time

Locality of reference , LOCALITY OF REFERENCE PRINCIPLE:  Principle of...

LOCALITY OF REFERENCE PRINCIPLE:  Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows: a) Spatial loca

Emulation, In this section, you should create a program that emulates a GBN...

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Access controls-information security, Access Controls Access controls ad...

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

Public key cryptography encryption, What do you understand by the term encr...

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

Ids deployment overview, IDS Deployment Overview The decision regarding ...

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

Characteristics of radial basis function neural networks, Problem : (a)...

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net

Describe how access control is implemented, Question: (a) How can you ...

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd