What is the structure of ip multicast address, Computer Networking

Assignment Help:

Question :

(a) Several techniques are now available for users to connect to the Internet.

(i) A modem is commonly used to dial up to the Internet. Why is a modem needed for data communications over the telephone system?

(ii) Another way to connect to the Internet is by using ADSL technology. "ADSL is asymmetric". Explain this statement.

(b) What is multicasting? What is the structure of IP Multicast address?

(c) How is the routing of multicast datagrams different from the routing of other IP datagrams?

(d) The IP Address of a Computer is, using the modern notation, 149.144.21.3/24. What are the network, subnet and subnet mask of the computer's IP address?

(e) IP packet delivery in the Internet is characteristed as unreliable, connectionless and best-effort. Describe very briefly what each of these terms means in regard to the IP protocol.

(f) IP packet delivery is unreliable, yet the Internet is commonly used for reliable interprocess communications. How is this reliability achieved? Explain briefly.

(g) Explain what is meant by Quality of Service (QoS).

(h) Describe the two ways for implementing quality of service in the Internet?


Related Discussions:- What is the structure of ip multicast address

Determine about the security systems, Determine about the Security Systems ...

Determine about the Security Systems If the company intends to connect to the Internet, then it should pay great attention to the configuration of firewalls. Just as no one wo

Networking services, Your Windows client failed to broadcast to all servers...

Your Windows client failed to broadcast to all servers that it has accepted an IP address offer. What step is this in the four-step DORA process? a. Discovery b. Offering c. Reques

What is mesh topology, What is mesh topology Mesh topology is a setup w...

What is mesh topology Mesh topology is a setup wherein every device is linked directly to each other device on the network. Consequently, it needs that each device has at least

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Protocol comes under hybrid dynamic type, Which protocol comes under Hybrid...

Which protocol comes under Hybrid dynamic type? Ans)  EIGRP (ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL) comes under hybrid dynamic.

Networking project for 20 computers, can i get a sample networking project ...

can i get a sample networking project for 20 computer with all network components?

Delay, It is a basic quantitative property of networks. Delay is a calculat...

It is a basic quantitative property of networks. Delay is a calculate how long it takes for a bit of data to cross across the network from one end to the other. It is calculated in

Define the term socks- network security, Define the term Socks- Network sec...

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

Describe the following topics, Describe the following topics A . LAN B . M...

Describe the following topics A . LAN B . MAN C . WAN D . ARPANET

Show the bidirectional transmission, Q. Show the Bidirectional Transmission...

Q. Show the Bidirectional Transmission? Bidirectional Transmission Each party must maintain S and R to track frames sent and expected Piggybacking hooking ACK wit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd