Recent questions tagged tanenbaum

411
views
0 answers
0 votes
In the underlying model of Fig. it is assumed that packets may be lost by the networklayer and thus must be individually acknowledged. Suppose that the networklayer ... and never loses packets. What changes, if any, areneeded to Fig.?
691
views
1 answers
1 votes
Primitives of transport service assume asymmetry between the two end points during connection establishment, one end (server) executes LISTEN while the other end ( ... service primitives may be used to build such peer to peer applications?
444
views
0 answers
0 votes
In transport primitives , LISTEN is a blocking call. Is thisstrictly necessary? If not, explain how a nonblocking primitive could be used. Whatadvantage would this have over the scheme described in the text?
1.2k
views
1 answers
0 votes
Use the traceroute (UNIX) or tracert (Windows) programs to trace the route fromyour computer to various universities on other continents. Make a list of transoceaniclinks you ... (Sydney)www.u-tokyo.ac.jp (Tokyo)www.uct.ac.za (Cape Town)
473
views
1 answers
0 votes
Write a function to do forwarding in an IP router. The procedure has one parameter,an IP address. It also has access to a global table consisting of an array ... IP address in the table using CIDR and returns theline to use as its value.
485
views
0 answers
0 votes
Write a program that simulates a computer network using discrete time. The first packet on each router queue makes one hop per time interval. Each router has ... a function of the end-to-end timeout interval, parameterized by error rate.
723
views
0 answers
0 votes
Write a program to simulate routing using flooding. Each packet should contain acounter that is decremented on each hop. When the counter gets to zero, the ... deterministic routing (k = 1) in terms of both delay and the bandwidthused.
592
views
1 answers
0 votes
When the IPv6 protocol is introduced, does the ARP protocol have to be changed? Ifso, are the changes conceptual or technical?
1.1k
views
1 answers
0 votes
The Protocol field used in the IPv4 header is not present in the fixed IPv6 header.Why not?
2.2k
views
1 answers
0 votes
IPv6 uses 16-byte addresses. If a block of 1 million addresses is allocated everypicosecond, how long will the addresses last?
1.1k
views
1 answers
0 votes
n IP, the checksum covers only the header and not the data. Why do you suppose thisdesign was chosen?
651
views
0 answers
0 votes
Most IP datagram reassembly algorithms have a timer to avoid having a lost fragmenttie up reassembly buffers forever. Suppose that a datagram is fragmented into ... later, the last fragment stumbles in. What should be done with it?
635
views
2 answers
0 votes
392
views
0 answers
1 votes
You have just explained the ARP protocol to a friend. When you are all done, hesays: ‘‘I’ve got it. ARP provides a service to the network layer, so it is part of the datalink layer.’’ What do you say to him?
545
views
0 answers
0 votes
Many companies have a policy of having two (or more) routers connecting the companyto the Internet to provide some redundancy in case one of them goes down. Isthis policy still possible with NAT? Explain your answer.
5.8k
views
1 answers
3 votes
A router has the following (CIDR) entries in its routing table: Address/MaskNext hop135.46.56.0/22Interface 0135.46.60.0/22Interface 1192.53.40.0/23Router 1defaultRouter 2For each of the ... .14(c) 135.46.52.2(d) 192.53.40.7(e) 192.53.56.7
3.0k
views
1 answers
0 votes
The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to29.18.0.0/17. However, there is a gap of 1024 unassigned addresses from ... table, and then see if any reaggregation is possible? If not,what can be done instead?
4.7k
views
1 answers
0 votes
A router has just received the following new IP addresses: 57.6.96.0/21,57.6.104.0/21, 57.6.112.0/21, and 57.6.120.0/21. If all of them use the same outgoingline, can they be aggregated? If so, to what? If not, why not?
16.3k
views
2 answers
1 votes
A large number of consecutive IP addresses are available starting at 198.16.0.0. Supposethat four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 ... ,the last IP address assigned, and the mask in the w.x.y.z/s notation.
599
views
0 answers
0 votes
While IP addresses are tried to specific networks, Ethernet addresses are not. Can youthink of a good reason why they are not?
964
views
1 answers
1 votes
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximumnumber of hosts it can handle?
5.1k
views
1 answers
0 votes
Convert the IP address whose hexadecimal representation is C22F1582 to dotteddecimal notation.
1.5k
views
0 answers
2 votes
Suppose that instead of using 16 bits for the network part of a class B address originally,20 bits had been used. How many class B networks would there have been?
399
views
1 answers
0 votes
A router is blasting out IP packets whose total length (data plus header) is 1024 bytes.Assuming that packets live for 10 sec, what is the maximum ... router canoperate at without danger of cycling through the IP datagram ID number space?
405
views
0 answers
0 votes
Suppose that host A is connected to a router R 1, R 1 is connected to another router,R 2, and R 2 is connected to host B. Suppose that a TCP ... link R2-B can support a maximum frame size of 512 bytes including a12-byte frame header
7.8k
views
2 answers
0 votes
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket isfilled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How longcan the computer transmit at the full 6 Mbps?
6.9k
views
1 answers
0 votes
A token bucket scheme is used for traffic shaping. A new token is put into the bucketevery 5 μsec. Each token is good for one short packet, which contains 48 bytes ofdata. What is the maximum sustainable data rate?
697
views
1 answers
0 votes
A datagram network allows routers to drop packets whenever they need to. Theprobability of a router discarding a packet is p. Consider the case of a source ... ?(b) transmissions a packet makes?(c) hops required per received packet?
613
views
0 answers
0 votes
As a possible congestion control mechanism in a network using virtual circuits internally,a router could refrain from acknowledging a received packet until ( ... errors are rare and that the host-router connection is infinitelyfast.
12.5k
views
1 answers
1 votes
Consider the network of Figure. Distance vector routing is used, and the followingvectors have just come in to router C: from B: (5, 0, 8, 12, 6, 2); from ... . What is C's new routing table? Give both the outgoingline to use and the cost.