Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged tanenbaum
411
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 6 Question 3 (Page No. 607)
In the underlying model of Fig. it is assumed that packets may be lost by the networklayer and thus must be individually acknowledged. Suppose that the networklayer ... and never loses packets. What changes, if any, areneeded to Fig.?
ajaysoni1924
411
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
transport-layer
+
–
691
views
1
answers
1
votes
Andrew S. Tanenbaum Edition 5th Exercise 6 Question 2 (Page No. 606)
Primitives of transport service assume asymmetry between the two end points during connection establishment, one end (server) executes LISTEN while the other end ( ... service primitives may be used to build such peer to peer applications?
ajaysoni1924
691
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
descriptive
transport-layer
+
–
444
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 6 Question 1 (Page No. 606)
In transport primitives , LISTEN is a blocking call. Is thisstrictly necessary? If not, explain how a nonblocking primitive could be used. Whatadvantage would this have over the scheme described in the text?
ajaysoni1924
444
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
transport-layer
descriptive
+
–
1.2k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 46 (Page No. 494)
Use the traceroute (UNIX) or tracert (Windows) programs to trace the route fromyour computer to various universities on other continents. Make a list of transoceaniclinks you ... (Sydney)www.u-tokyo.ac.jp (Tokyo)www.uct.ac.za (Cape Town)
ajaysoni1924
1.2k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
program
+
–
473
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 45 (Page No. 494)
Write a function to do forwarding in an IP router. The procedure has one parameter,an IP address. It also has access to a global table consisting of an array ... IP address in the table using CIDR and returns theline to use as its value.
ajaysoni1924
473
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
program
+
–
485
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 44 (Page No. 494)
Write a program that simulates a computer network using discrete time. The first packet on each router queue makes one hop per time interval. Each router has ... a function of the end-to-end timeout interval, parameterized by error rate.
ajaysoni1924
485
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
program
+
–
723
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 43 (Page No. 494)
Write a program to simulate routing using flooding. Each packet should contain acounter that is decremented on each hop. When the counter gets to zero, the ... deterministic routing (k = 1) in terms of both delay and the bandwidthused.
ajaysoni1924
723
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
network-layer
tanenbaum
program
+
–
592
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 42 (Page No. 494)
When the IPv6 protocol is introduced, does the ARP protocol have to be changed? Ifso, are the changes conceptual or technical?
ajaysoni1924
592
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ipv6
+
–
1.1k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 41 (Page No. 494)
The Protocol field used in the IPv4 header is not present in the fixed IPv6 header.Why not?
ajaysoni1924
1.1k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
descriptive
ipv6
+
–
2.2k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 40 (Page No. 494)
IPv6 uses 16-byte addresses. If a block of 1 million addresses is allocated everypicosecond, how long will the addresses last?
ajaysoni1924
2.2k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ipv6
+
–
1.1k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 38 (Page No. 494)
n IP, the checksum covers only the header and not the data. Why do you suppose thisdesign was chosen?
ajaysoni1924
1.1k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
651
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 37 (Page No. 494)
Most IP datagram reassembly algorithms have a timer to avoid having a lost fragmenttie up reassembly buffers forever. Suppose that a datagram is fragmented into ... later, the last fragment stumbles in. What should be done with it?
ajaysoni1924
651
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
fragmentation
descriptive
+
–
635
views
2
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 36 (Page No. 494)
Describe a way to reassemble IP fragments at the destination.
ajaysoni1924
635
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
fragmentation
descriptive
+
–
392
views
0
answers
1
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 35 (Page No. 494)
You have just explained the ARP protocol to a friend. When you are all done, hesays: ‘‘I’ve got it. ARP provides a service to the network layer, so it is part of the datalink layer.’’ What do you say to him?
ajaysoni1924
392
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
network-protocols
descriptive
+
–
545
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 34 (Page No. 493)
Many companies have a policy of having two (or more) routers connecting the companyto the Internet to provide some redundancy in case one of them goes down. Isthis policy still possible with NAT? Explain your answer.
ajaysoni1924
545
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
descriptive
+
–
5.8k
views
1
answers
3
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 33 (Page No. 492)
A router has the following (CIDR) entries in its routing table: Address/MaskNext hop135.46.56.0/22Interface 0135.46.60.0/22Interface 1192.53.40.0/23Router 1defaultRouter 2For each of the ... .14(c) 135.46.52.2(d) 192.53.40.7(e) 192.53.56.7
ajaysoni1924
5.8k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
subnetting
+
–
3.0k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 32 (Page No. 492)
The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to29.18.0.0/17. However, there is a gap of 1024 unassigned addresses from ... table, and then see if any reaggregation is possible? If not,what can be done instead?
ajaysoni1924
3.0k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
subnetting
+
–
4.7k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 31 (Page No. 492)
A router has just received the following new IP addresses: 57.6.96.0/21,57.6.104.0/21, 57.6.112.0/21, and 57.6.120.0/21. If all of them use the same outgoingline, can they be aggregated? If so, to what? If not, why not?
ajaysoni1924
4.7k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
descriptive
+
–
16.3k
views
2
answers
1
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 30 (Page No. 492)
A large number of consecutive IP addresses are available starting at 198.16.0.0. Supposethat four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 ... ,the last IP address assigned, and the mask in the w.x.y.z/s notation.
ajaysoni1924
16.3k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
599
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 29 (Page No. 492)
While IP addresses are tried to specific networks, Ethernet addresses are not. Can youthink of a good reason why they are not?
ajaysoni1924
599
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
network-layer
descriptive
+
–
964
views
1
answers
1
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 28 (Page No. 492)
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximumnumber of hosts it can handle?
ajaysoni1924
964
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
5.1k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 27 (Page No. 492)
Convert the IP address whose hexadecimal representation is C22F1582 to dotteddecimal notation.
ajaysoni1924
5.1k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
network-layer
tanenbaum
ip-addressing
+
–
1.5k
views
0
answers
2
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 26 (Page No. 492)
Suppose that instead of using 16 bits for the network part of a class B address originally,20 bits had been used. How many class B networks would there have been?
ajaysoni1924
1.5k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
subnetting
+
–
399
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 24 (Page No. 492)
A router is blasting out IP packets whose total length (data plus header) is 1024 bytes.Assuming that packets live for 10 sec, what is the maximum ... router canoperate at without danger of cycling through the IP datagram ID number space?
ajaysoni1924
399
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
+
–
405
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 23 (Page No. 492)
Suppose that host A is connected to a router R 1, R 1 is connected to another router,R 2, and R 2 is connected to host B. Suppose that a TCP ... link R2-B can support a maximum frame size of 512 bytes including a12-byte frame header
ajaysoni1924
405
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
network-flow
ip-addressing
+
–
7.8k
views
2
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 19 (Page No. 491)
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket isfilled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How longcan the computer transmit at the full 6 Mbps?
ajaysoni1924
7.8k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
token-bucket
+
–
6.9k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 18 (Page No. 491)
A token bucket scheme is used for traffic shaping. A new token is put into the bucketevery 5 μsec. Each token is good for one short packet, which contains 48 bytes ofdata. What is the maximum sustainable data rate?
ajaysoni1924
6.9k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
token-bucket
+
–
697
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 16 (Page No. 491)
A datagram network allows routers to drop packets whenever they need to. Theprobability of a router discarding a packet is p. Consider the case of a source ... ?(b) transmissions a packet makes?(c) hops required per received packet?
ajaysoni1924
697
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
network-switching
+
–
613
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 15 (Page No. 491)
As a possible congestion control mechanism in a network using virtual circuits internally,a router could refrain from acknowledging a received packet until ( ... errors are rare and that the host-router connection is infinitelyfast.
ajaysoni1924
613
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
+
–
12.5k
views
1
answers
1
votes
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 6 (Page No. 490)
Consider the network of Figure. Distance vector routing is used, and the followingvectors have just come in to router C: from B: (5, 0, 8, 12, 6, 2); from ... . What is C's new routing table? Give both the outgoingline to use and the cost.
ajaysoni1924
12.5k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
data-link-layer
distance-vector-routing
+
–
Page:
« prev
1
...
8
9
10
11
12
13
14
15
16
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register