Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / QUESTION 1 1)Consider the below network diagram and refer to this diagram when composing your answer to the question that follows

QUESTION 1 1)Consider the below network diagram and refer to this diagram when composing your answer to the question that follows

Computer Science

QUESTION 1 1)Consider the below network diagram and refer to this diagram when composing your answer to the question that follows. Describe in as much detail as possible what happens after a computer user clicks a web link. The user's computer, shown as "your workstation" in the diagram above, is connected to a wired Ethernet LAN and has access to the Internet through its gateway router that connects to a NAT router and then to a backbone service provider (part of the Internet cloud). Explain technically how the computer establishes an internetwork connection to an Internet web server (within the Internet cloud on the diagram) and retrieves the following (ficticious) resource: http://www.boringarchives.com:8217/index.html Your answer to this question should be about 1000 to 2500 words and you might want to consider discussion of the following concepts in your writing (to the best of your ability): (1) Router, (2) Switch, (3) Ethernet, (4) Internet cloud, (5) DNS Server on local LAN, (6) ARP, (7) Proxy ARP, (8) encapsulation, (9) broadcast, (10) unicast, (11) file, (12) segment, (13) packet, (14) frame, (15) bit, (16) signal, (17) frame addressing, (18) frame forwarding, (19) packet addressing, (20) packet forwarding, (21) IP, (22) TCP, (23) sliding window flow control, (24) selective reject error control, (25) three-way handshaking, (26) header fields, (27) CSMA/CD, (28) collision, (29) backoff, (30) time out, (31) soft state, (32) address translation, (33) ANDing process, (34) routing table, (35) client, (36) server, and (37) other concepts as needed (NAT for example). Do not number the concepts in your essay. For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). Paragraph Arial 14px P 0 WORDSPOWERED BY TINY QUESTION 2 1. An ICMPv4 message indicating a packet could not be fragmented would have the TYPE field set to 00000011 and the CODE field set to 00000100. 1. TFTP runs on UDP port 69 while FTP runs on TCP ports 20 and 21. 1. If the CODE bits in a TCP segment are set to 000001, the packet is a SYN packet. 1. If a router receives a datagram but the incoming datagram queue is already full, the router will discard the datagram. True False QUESTION 3 True False QUESTION 4 True False QUESTION 5 True False QUESTION 6 1. Ethernet uses 'counted-effort' delivery semantics and has distributed access control. True False QUESTION 7 1. SPF algorithms scale better than distance vector algorithms. True False QUESTION 8 1. DOCSIS established universal ground rules for the transmission of packets across cable networks. True False QUESTION 9 1. Because TFTP does not allow directory browsing a user must specify the desired directory before logging in to the TFTP server. True False QUESTION 10 1. Short-term variance in packet travel time is known as jitter. True False QUESTION 11 1. Routers store forwarding information in routing tables that include the nexthop IP address and the internet protocol address of each host. True False QUESTION 12 1. DWDM can handle gradually increasing demand for capacity from customers. 1. An IP packet destined for 10.20.20.81 arrives at a router. Which of the following routes from the routing table will be selected to forward the packet? True False QUESTION 13 a) Send packets destined for 0.0.0.0/0 out port Eth0 b) Send packets destined for 10.0.0.0/8 out port Eth1 c) Send packets destined for 10.20.0.0/16 out port Eth2 d) Send packets destined for 10.20.20.0/24 out port Eth3 e) Send packets destined for 10.20.20.0/25 out port Eth4 f) Send packets destined for 10.20.20.0/26 out port Eth5 QUESTION 14 1. With standard subnetting and assuming that subnet 0 cannot be used, the 12,345th useable host on the 678th useable subnet of 9.0.0.0 when borrowing 10 bits is 9.14.240.57. True False QUESTION 15 1. Mapping from high level addresses to low level addresses is known as address resolution. True False QUESTION 16 1. A directed broadcast puts all ones except the least significant bit in the host portion of the IP address. True False QUESTION 17 1. The IAB organization has two main subgroups, the IRSG and the IETF. True False QUESTION 18 1. Research that eventually led to the establishment of the Internet was started by the Advanced Research Projects Agency. True False QUESTION 19 1. True False QUESTION 20 Classful addressing helps relieve the IPv4 address exhaustion problem by allowing appropriately sized blocks of addresses to be assigned. 1. NAT, PAT and IP Subnetting are techniques that have extended the life of IPv4 by delaying the consumption of IP addresses. True False QUESTION 21 1. To reduce waste when subnetting, borrow exactly half the host bits. True False QUESTION 22 1. Theoretically, the fifth useable subnet of 101.0.0.0 using mask 255.1.1.1 is 101.1.0.1 assuming subnet 0 cannot be used. True False QUESTION 23 1. Which one of the following addresses is a valid IPv6 address? 2001:1:0:4F3A:206:AE14 2001:1:0:4F3A:0:206:AE14 2001:1:0:4F3A::206:AE14 2001:1::4F3A:206::AE14 None of the above QUESTION 24 1. What IPv4 header fields have been removed from the IPv6 header? Version, fragmentation fields, Header Checksum, and Padding. Version, Header Length, fragmentation fields, and Header Checksum. Header Length, fragmentation fields, Header Checksum, and Flow Label. Header Length, fragmentation fields, Header Checksum, and Padding. None of the above QUESTION 25 1. What type of transport did the ADSL Forum recommend in the first phase of VoDSL? Internet Protocol version 4 Asynchronous Transfer Mode Frame Relay SONET STM-1 All of the above None of the above QUESTION 26 1. Which of the following is present in VoDSL, VoCable and conventional POTS networks? queueing delay and jitter jitter and echo echo and signaling cross talk and lost packets Queuing delay, jitter and echo cross talk, lost packets, and signaling QUESTION 27 1. What differs from PPTP by allowing tunnels to support more than one connection? L2TP L2F IPSec All of the above L2TP and L2F only None of the above QUESTION 28 1. A VPN must provide which critical function to ensure security for data? Authentication Authorization Accounting Data Transparency All of the above None of the above QUESTION 29 1. What does DWDM allow the transmission of over the optical layer? Voice and e-mail Video and multimedia Data All of the above Voice, e-mail and data only None of the above QUESTION 30 1. Which technology provides a means of securing the interactions between domain name servers? 1. A 100 hour DHCP lease is granted to a workstation. A) How long can the workstation wait in the rebind state before it's lease expires? ... and B) How long can the workstation use the lease in the bound state before it has to request an extension of it's lease? PreshareDNSA DNSAuth DNSSEC AutoDSP IPSEC None of the above QUESTION 31 A: 12.5 hours B: 37.5 hours A: 12.5 hours B: 50 hours A: 50 hours B: 37.5 hours A: 50 hours B: 12.5 hours A: 87.5 hours B: 12.5 hours A: 12.5 hours B: 87.5 hours QUESTION 32 1. After reviewing the graphic, read the statements below and place a check mark beside each statement that is true. Leave false statements unchecked. a. TFTP and DNS protocols belong in Box 2. b. DHCP and IMAP belong in Box 1. c. Ethernet, 802.11 (WiFi), PPP and BGP belong in Box 6. d. IPv4 may be in Box 5 if IPv6 is in Box 4 and vice versa. e. When ICMPv6 is in Box 4, ICMPv4 may be in Box 5. f. SNMP may occur in either Box 1 or Box 2. QUESTION 33 1. Review the following diagram. By reviewing the diagram and the potential packet filters listed, match the filtering concepts presented below with the right packet filters (identified by an OPTION letter). Option a. Would block packets coming in from the Internet A that have a source IP address that is part of the reserved private address space. Option b. Prevents forwarding limited broadcasts. B Option c. Prevents forwarding of directed broacasts. C d. Prevents Dormitory LAN hosts from connecting Option to the TFTP server on the Campus LAN. D e. Prevent hosts on the Dormitory LAN from Option connecting to FTP servers on the Internet. E f. Prevent hosts on the Campus LAN from Option connecting to a sendmail server not on the F 10.1.0.0/16 network segment.

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions