Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged tanenbaum
0
votes
0
answers
361
Andrew S. Tanenbaum Edition 5th Exercise 6 Question 3 (Page No. 607)
In the underlying model of Fig. it is assumed that packets may be lost by the network layer and thus must be individually acknowledged. Suppose that the network layer is 100 percent reliable and never loses packets. What changes, if any, are needed to Fig.?
In the underlying model of Fig. it is assumed that packets may be lost by the networklayer and thus must be individually acknowledged. Suppose that the networklayer is 10...
ajaysoni1924
361
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
transport-layer
+
–
1
votes
1
answer
362
Andrew S. Tanenbaum Edition 5th Exercise 6 Question 2 (Page No. 606)
Primitives of transport service assume asymmetry between the two end points during connection establishment, one end (server) executes LISTEN while the other end (client) executes CONNECT. However, in peer to peer ... client functionality. How can transport service primitives may be used to build such peer to peer applications?
Primitives of transport service assume asymmetry between the two end points during connection establishment, one end (server) executes LISTEN while the other end (client)...
ajaysoni1924
641
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
descriptive
transport-layer
+
–
0
votes
0
answers
363
Andrew S. Tanenbaum Edition 5th Exercise 6 Question 1 (Page No. 606)
In transport primitives , LISTEN is a blocking call. Is this strictly necessary? If not, explain how a nonblocking primitive could be used. What advantage would this have over the scheme described in the text?
In transport primitives , LISTEN is a blocking call. Is thisstrictly necessary? If not, explain how a nonblocking primitive could be used. Whatadvantage would this have ...
ajaysoni1924
424
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
transport-layer
descriptive
+
–
0
votes
1
answer
364
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 46 (Page No. 494)
Use the traceroute (UNIX) or tracert (Windows) programs to trace the route from your computer to various universities on other continents. Make a list of transoceanic links you have discovered. Some sites to try are www.berkeley.edu ( ... London) www.usyd.edu.au (Sydney) www.u-tokyo.ac.jp (Tokyo) www.uct.ac.za (Cape Town)
Use the traceroute (UNIX) or tracert (Windows) programs to trace the route fromyour computer to various universities on other continents. Make a list of transoceaniclinks...
ajaysoni1924
1.1k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
program
+
–
0
votes
1
answer
365
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 45 (Page No. 494)
Write a function to do forwarding in an IP router. The procedure has one parameter, an IP address. It also has access to a global table consisting of an array of triples. Each triple contains three integers: an IP address, ... The function looks up the IP address in the table using CIDR and returns the line to use as its value.
Write a function to do forwarding in an IP router. The procedure has one parameter,an IP address. It also has access to a global table consisting of an array of triples.E...
ajaysoni1924
439
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
program
+
–
0
votes
0
answers
366
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 44 (Page No. 494)
Write a program that simulates a computer network using discrete time. The first packet on each router queue makes one hop per time interval. Each router has only a finite number of buffers. If a packet arrives and ... the throughput of the network as a function of the end-to-end timeout interval, parameterized by error rate.
Write a program that simulates a computer network using discrete time. The first packet on each router queue makes one hop per time interval. Each router has only a finit...
ajaysoni1924
448
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
program
+
–
0
votes
0
answers
367
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 43 (Page No. 494)
Write a program to simulate routing using flooding. Each packet should contain a counter that is decremented on each hop. When the counter gets to zero, the packet is discarded. Time is discrete, with each line handling ... flooded. Compare flooding with deterministic routing (k = 1) in terms of both delay and the bandwidth used.
Write a program to simulate routing using flooding. Each packet should contain acounter that is decremented on each hop. When the counter gets to zero, the packet isdisca...
ajaysoni1924
716
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
network-layer
tanenbaum
program
+
–
0
votes
1
answer
368
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 42 (Page No. 494)
When the IPv6 protocol is introduced, does the ARP protocol have to be changed? If so, are the changes conceptual or technical?
When the IPv6 protocol is introduced, does the ARP protocol have to be changed? Ifso, are the changes conceptual or technical?
ajaysoni1924
546
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ipv6
+
–
0
votes
1
answer
369
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 41 (Page No. 494)
The Protocol field used in the IPv4 header is not present in the fixed IPv6 header. Why not?
The Protocol field used in the IPv4 header is not present in the fixed IPv6 header.Why not?
ajaysoni1924
1.0k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
descriptive
ipv6
+
–
0
votes
1
answer
370
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 40 (Page No. 494)
IPv6 uses 16-byte addresses. If a block of 1 million addresses is allocated every picosecond, how long will the addresses last?
IPv6 uses 16-byte addresses. If a block of 1 million addresses is allocated everypicosecond, how long will the addresses last?
ajaysoni1924
2.1k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ipv6
+
–
0
votes
1
answer
371
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 38 (Page No. 494)
n IP, the checksum covers only the header and not the data. Why do you suppose this design was chosen?
n IP, the checksum covers only the header and not the data. Why do you suppose thisdesign was chosen?
ajaysoni1924
1.1k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
0
votes
0
answers
372
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 37 (Page No. 494)
Most IP datagram reassembly algorithms have a timer to avoid having a lost fragment tie up reassembly buffers forever. Suppose that a datagram is fragmented into four fragments. The first three fragments arrive, but the last one ... memory are discarded. A little later, the last fragment stumbles in. What should be done with it?
Most IP datagram reassembly algorithms have a timer to avoid having a lost fragmenttie up reassembly buffers forever. Suppose that a datagram is fragmented into fourfragm...
ajaysoni1924
608
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
fragmentation
descriptive
+
–
0
votes
2
answers
373
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 36 (Page No. 494)
Describe a way to reassemble IP fragments at the destination.
Describe a way to reassemble IP fragments at the destination.
ajaysoni1924
507
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
fragmentation
descriptive
+
–
1
votes
0
answers
374
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 35 (Page No. 494)
You have just explained the ARP protocol to a friend. When you are all done, he says: ‘‘I’ve got it. ARP provides a service to the network layer, so it is part of the data link layer.’’ What do you say to him?
You have just explained the ARP protocol to a friend. When you are all done, hesays: ‘‘I’ve got it. ARP provides a service to the network layer, so it is part of th...
ajaysoni1924
372
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
network-protocols
descriptive
+
–
0
votes
0
answers
375
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 34 (Page No. 493)
Many companies have a policy of having two (or more) routers connecting the company to the Internet to provide some redundancy in case one of them goes down. Is this policy still possible with NAT? Explain your answer.
Many companies have a policy of having two (or more) routers connecting the companyto the Internet to provide some redundancy in case one of them goes down. Isthis policy...
ajaysoni1924
502
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
descriptive
+
–
3
votes
1
answer
376
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 33 (Page No. 492)
A router has the following (CIDR) entries in its routing table: Address/Mask Next hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 default Router 2 For each of the following IP addresses, what does the router do if a ... 135.46.63.10 (b) 135.46.57.14 (c) 135.46.52.2 (d) 192.53.40.7 (e) 192.53.56.7
A router has the following (CIDR) entries in its routing table: Address/MaskNext hop135.46.56.0/22Interface 0135.46.60.0/22Interface 1192.53.40.0/23Router 1defaultRouter...
ajaysoni1924
5.3k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
subnetting
+
–
0
votes
1
answer
377
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 32 (Page No. 492)
The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to 29.18.0.0/17. However, there is a gap of 1024 unassigned addresses from 29.18.60.0 to 29.18.63.255 that are now suddenly assigned to ... , add the new block to the table, and then see if any reaggregation is possible? If not, what can be done instead?
The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to29.18.0.0/17. However, there is a gap of 1024 unassigned addresses from 29.18.60.0to 29.18.6...
ajaysoni1924
2.8k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
subnetting
+
–
0
votes
1
answer
378
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 31 (Page No. 492)
A router has just received the following new IP addresses: 57.6.96.0/21, 57.6.104.0/21, 57.6.112.0/21, and 57.6.120.0/21. If all of them use the same outgoing line, can they be aggregated? If so, to what? If not, why not?
A router has just received the following new IP addresses: 57.6.96.0/21,57.6.104.0/21, 57.6.112.0/21, and 57.6.120.0/21. If all of them use the same outgoingline, can the...
ajaysoni1924
4.3k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
descriptive
+
–
1
votes
2
answers
379
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 30 (Page No. 492)
A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 addresses, respectively, and in that order. For each of ... the first IP address assigned, the last IP address assigned, and the mask in the w.x.y.z/s notation.
A large number of consecutive IP addresses are available starting at 198.16.0.0. Supposethat four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 addres...
ajaysoni1924
15.4k
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
0
votes
0
answers
380
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 29 (Page No. 492)
While IP addresses are tried to specific networks, Ethernet addresses are not. Can you think of a good reason why they are not?
While IP addresses are tried to specific networks, Ethernet addresses are not. Can youthink of a good reason why they are not?
ajaysoni1924
561
views
ajaysoni1924
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
network-layer
descriptive
+
–
1
votes
1
answer
381
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 28 (Page No. 492)
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle?
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximumnumber of hosts it can handle?
ajaysoni1924
912
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
0
votes
1
answer
382
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 27 (Page No. 492)
Convert the IP address whose hexadecimal representation is C22F1582 to dotted decimal notation.
Convert the IP address whose hexadecimal representation is C22F1582 to dotteddecimal notation.
ajaysoni1924
4.8k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
network-layer
tanenbaum
ip-addressing
+
–
2
votes
0
answers
383
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 26 (Page No. 492)
Suppose that instead of using 16 bits for the network part of a class B address originally, 20 bits had been used. How many class B networks would there have been?
Suppose that instead of using 16 bits for the network part of a class B address originally,20 bits had been used. How many class B networks would there have been?
ajaysoni1924
1.4k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
subnetting
+
–
0
votes
1
answer
384
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 24 (Page No. 492)
A router is blasting out IP packets whose total length (data plus header) is 1024 bytes. Assuming that packets live for 10 sec, what is the maximum line speed the router can operate at without danger of cycling through the IP datagram ID number space?
A router is blasting out IP packets whose total length (data plus header) is 1024 bytes.Assuming that packets live for 10 sec, what is the maximum line speed the router c...
ajaysoni1924
351
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
+
–
0
votes
0
answers
385
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 23 (Page No. 492)
Suppose that host A is connected to a router R 1, R 1 is connected to another router, R 2, and R 2 is connected to host B. Suppose that a TCP message that contains 900 bytes of data and 20 bytes of TCP header is ... 8-byte frame header, and link R2-B can support a maximum frame size of 512 bytes including a 12-byte frame header
Suppose that host A is connected to a router R 1, R 1 is connected to another router,R 2, and R 2 is connected to host B. Suppose that a TCP message that contains 900byte...
ajaysoni1924
384
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
network-flow
ip-addressing
+
–
0
votes
2
answers
386
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 19 (Page No. 491)
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can the computer transmit at the full 6 Mbps?
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket isfilled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long...
ajaysoni1924
7.4k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
token-bucket
+
–
0
votes
1
answer
387
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 18 (Page No. 491)
A token bucket scheme is used for traffic shaping. A new token is put into the bucket every 5 μsec. Each token is good for one short packet, which contains 48 bytes of data. What is the maximum sustainable data rate?
A token bucket scheme is used for traffic shaping. A new token is put into the bucketevery 5 μsec. Each token is good for one short packet, which contains 48 bytes ofdat...
ajaysoni1924
6.6k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
token-bucket
+
–
0
votes
1
answer
388
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 16 (Page No. 491)
A datagram network allows routers to drop packets whenever they need to. The probability of a router discarding a packet is p. Consider the case of a source host connected to the source router, which is connected to ... hops a packet makes per transmission? (b) transmissions a packet makes? (c) hops required per received packet?
A datagram network allows routers to drop packets whenever they need to. Theprobability of a router discarding a packet is p. Consider the case of a source hostconnected ...
ajaysoni1924
645
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
network-switching
+
–
0
votes
0
answers
389
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 15 (Page No. 491)
As a possible congestion control mechanism in a network using virtual circuits internally, a router could refrain from acknowledging a received packet until (1) it knows its last transmission along the virtual circuit ... host? Assume that transmission errors are rare and that the host-router connection is infinitely fast.
As a possible congestion control mechanism in a network using virtual circuits internally,a router could refrain from acknowledging a received packet until (1) it knowsit...
ajaysoni1924
560
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
+
–
1
votes
1
answer
390
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 6 (Page No. 490)
Consider the network of Figure. Distance vector routing is used, and the following vectors have just come in to router C: from B: (5, 0, 8, 12, 6, 2); from D: (16, 12, 6, 0, 9, 10); and from E: (7, 6, 3, 9, 0 ... , and E, are 6, 3, and 5, respectively. What is C's new routing table? Give both the outgoing line to use and the cost.
Consider the network of Figure. Distance vector routing is used, and the followingvectors have just come in to router C: from B: (5, 0, 8, 12, 6, 2); from D: (16, 12,6, 0...
ajaysoni1924
11.7k
views
ajaysoni1924
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
data-link-layer
distance-vector-routing
+
–
Page:
« prev
1
...
8
9
10
11
12
13
14
15
16
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register