Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by ajaysoni1924
0
votes
1
answer
521
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 42 (Page No. 494)
When the IPv6 protocol is introduced, does the ARP protocol have to be changed? If so, are the changes conceptual or technical?
When the IPv6 protocol is introduced, does the ARP protocol have to be changed? Ifso, are the changes conceptual or technical?
551
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ipv6
+
–
0
votes
1
answer
522
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 41 (Page No. 494)
The Protocol field used in the IPv4 header is not present in the fixed IPv6 header. Why not?
The Protocol field used in the IPv4 header is not present in the fixed IPv6 header.Why not?
1.0k
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
descriptive
ipv6
+
–
0
votes
1
answer
523
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 40 (Page No. 494)
IPv6 uses 16-byte addresses. If a block of 1 million addresses is allocated every picosecond, how long will the addresses last?
IPv6 uses 16-byte addresses. If a block of 1 million addresses is allocated everypicosecond, how long will the addresses last?
2.1k
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ipv6
+
–
0
votes
1
answer
524
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 38 (Page No. 494)
n IP, the checksum covers only the header and not the data. Why do you suppose this design was chosen?
n IP, the checksum covers only the header and not the data. Why do you suppose thisdesign was chosen?
1.1k
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
0
votes
0
answers
525
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 37 (Page No. 494)
Most IP datagram reassembly algorithms have a timer to avoid having a lost fragment tie up reassembly buffers forever. Suppose that a datagram is fragmented into four fragments. The first three fragments arrive, but the last one ... memory are discarded. A little later, the last fragment stumbles in. What should be done with it?
Most IP datagram reassembly algorithms have a timer to avoid having a lost fragmenttie up reassembly buffers forever. Suppose that a datagram is fragmented into fourfragm...
609
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
fragmentation
descriptive
+
–
0
votes
2
answers
526
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 36 (Page No. 494)
Describe a way to reassemble IP fragments at the destination.
Describe a way to reassemble IP fragments at the destination.
515
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
fragmentation
descriptive
+
–
1
votes
0
answers
527
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 35 (Page No. 494)
You have just explained the ARP protocol to a friend. When you are all done, he says: ‘‘I’ve got it. ARP provides a service to the network layer, so it is part of the data link layer.’’ What do you say to him?
You have just explained the ARP protocol to a friend. When you are all done, hesays: ‘‘I’ve got it. ARP provides a service to the network layer, so it is part of th...
373
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
network-protocols
descriptive
+
–
0
votes
0
answers
528
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 34 (Page No. 493)
Many companies have a policy of having two (or more) routers connecting the company to the Internet to provide some redundancy in case one of them goes down. Is this policy still possible with NAT? Explain your answer.
Many companies have a policy of having two (or more) routers connecting the companyto the Internet to provide some redundancy in case one of them goes down. Isthis policy...
506
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
descriptive
+
–
3
votes
1
answer
529
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 33 (Page No. 492)
A router has the following (CIDR) entries in its routing table: Address/Mask Next hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 default Router 2 For each of the following IP addresses, what does the router do if a ... 135.46.63.10 (b) 135.46.57.14 (c) 135.46.52.2 (d) 192.53.40.7 (e) 192.53.56.7
A router has the following (CIDR) entries in its routing table: Address/MaskNext hop135.46.56.0/22Interface 0135.46.60.0/22Interface 1192.53.40.0/23Router 1defaultRouter...
5.4k
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
subnetting
+
–
0
votes
1
answer
530
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 32 (Page No. 492)
The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to 29.18.0.0/17. However, there is a gap of 1024 unassigned addresses from 29.18.60.0 to 29.18.63.255 that are now suddenly assigned to ... , add the new block to the table, and then see if any reaggregation is possible? If not, what can be done instead?
The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to29.18.0.0/17. However, there is a gap of 1024 unassigned addresses from 29.18.60.0to 29.18.6...
2.8k
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
subnetting
+
–
0
votes
1
answer
531
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 31 (Page No. 492)
A router has just received the following new IP addresses: 57.6.96.0/21, 57.6.104.0/21, 57.6.112.0/21, and 57.6.120.0/21. If all of them use the same outgoing line, can they be aggregated? If so, to what? If not, why not?
A router has just received the following new IP addresses: 57.6.96.0/21,57.6.104.0/21, 57.6.112.0/21, and 57.6.120.0/21. If all of them use the same outgoingline, can the...
4.4k
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
descriptive
+
–
1
votes
2
answers
532
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 30 (Page No. 492)
A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 addresses, respectively, and in that order. For each of ... the first IP address assigned, the last IP address assigned, and the mask in the w.x.y.z/s notation.
A large number of consecutive IP addresses are available starting at 198.16.0.0. Supposethat four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 addres...
15.5k
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
0
votes
0
answers
533
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 29 (Page No. 492)
While IP addresses are tried to specific networks, Ethernet addresses are not. Can you think of a good reason why they are not?
While IP addresses are tried to specific networks, Ethernet addresses are not. Can youthink of a good reason why they are not?
568
views
asked
Mar 18, 2019
Computer Networks
computer-networks
tanenbaum
ip-addressing
network-layer
descriptive
+
–
1
votes
1
answer
534
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 28 (Page No. 492)
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle?
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximumnumber of hosts it can handle?
915
views
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
ip-addressing
+
–
0
votes
1
answer
535
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 27 (Page No. 492)
Convert the IP address whose hexadecimal representation is C22F1582 to dotted decimal notation.
Convert the IP address whose hexadecimal representation is C22F1582 to dotteddecimal notation.
4.9k
views
asked
Mar 16, 2019
Computer Networks
computer-networks
network-layer
tanenbaum
ip-addressing
+
–
2
votes
0
answers
536
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 26 (Page No. 492)
Suppose that instead of using 16 bits for the network part of a class B address originally, 20 bits had been used. How many class B networks would there have been?
Suppose that instead of using 16 bits for the network part of a class B address originally,20 bits had been used. How many class B networks would there have been?
1.4k
views
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
subnetting
+
–
0
votes
1
answer
537
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 24 (Page No. 492)
A router is blasting out IP packets whose total length (data plus header) is 1024 bytes. Assuming that packets live for 10 sec, what is the maximum line speed the router can operate at without danger of cycling through the IP datagram ID number space?
A router is blasting out IP packets whose total length (data plus header) is 1024 bytes.Assuming that packets live for 10 sec, what is the maximum line speed the router c...
352
views
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
+
–
0
votes
0
answers
538
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 23 (Page No. 492)
Suppose that host A is connected to a router R 1, R 1 is connected to another router, R 2, and R 2 is connected to host B. Suppose that a TCP message that contains 900 bytes of data and 20 bytes of TCP header is ... 8-byte frame header, and link R2-B can support a maximum frame size of 512 bytes including a 12-byte frame header
Suppose that host A is connected to a router R 1, R 1 is connected to another router,R 2, and R 2 is connected to host B. Suppose that a TCP message that contains 900byte...
388
views
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
network-flow
ip-addressing
+
–
0
votes
2
answers
539
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 19 (Page No. 491)
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can the computer transmit at the full 6 Mbps?
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket isfilled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long...
7.5k
views
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
token-bucket
+
–
0
votes
1
answer
540
Andrew S. Tanenbaum Edition 5th Exercise 5 Question 18 (Page No. 491)
A token bucket scheme is used for traffic shaping. A new token is put into the bucket every 5 μsec. Each token is good for one short packet, which contains 48 bytes of data. What is the maximum sustainable data rate?
A token bucket scheme is used for traffic shaping. A new token is put into the bucketevery 5 μsec. Each token is good for one short packet, which contains 48 bytes ofdat...
6.6k
views
asked
Mar 16, 2019
Computer Networks
computer-networks
tanenbaum
network-layer
token-bucket
+
–
Page:
« prev
1
...
22
23
24
25
26
27
28
29
30
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register