Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

1. Suppose the company wants to secure its websites by implementing a VPN tunneling. 

Which tunneling approach is the most suitable solution for the company? Why?

2. An internet service provider (ISP) a site-to-site VPN service to its clients (mainly companies

that have multiple branch offices in different locations in the country). As an advanced 

computer network student which VPN implementation approach is best fitted for both ISP 

and the clients? Why?


1.A router can process 2 million packets/sec. The load offered to it is 1.5 million packets/sec

on average. If a route from source to destination contains 10 routers, how much time is spent

being queued and serviced by the router?

2.Exactly describe why we cannot use the CIDR notation for the following blocks of IP 

addresses:

a. AD HOC block with the range 224.0.2.0 to 224.0.255.255.

b. The first reserved block with the range 224.3.0.0 to 231.255.255.255.

c. The second reserved block with the range 234.0.0.0 to 238.255.255.255



The two most important protocols in the Transport Layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP provides a reliable data delivery service with end-to-end error detection and correction. UDP provides a low-overhead, connectionless datagram delivery service. Suppose as a network administrator, you are required to select the most suitable transport layer protocol for a video streaming website then which protocol you will choose from UDP and TCP. Discuss your choice with 2 proper reasons.


1. Rafiki Company is setting up a new branch in the outskirts of Nairobi. It has been assigned the network address 201.70.64.0 with a default subnet mask of 255.255.255.0. Assume that the company has the following departments: Department No. of Hosts HR and Administration 25 Production 20 Sales and Marketing 10 Accounts 14 Front Desk 2 a. List at least 4 possible hardware (both passive and active) that would be required in the data/server room for proper operation of this network. (2 Marks) b. List two benefits of subnetting (1 Mark) c. How many subnets will be required in total (based on FLSM)? (1 Mark) d. Draw a subnet chart based on Fixed Length Subnet Mask (FLSM) with the subheadings below to represent the scenario above (5 Marks) Dept. Subnet Address 1st Usable IP Address Last Usable IP Address Broadcast Address e. Repeat step number (d) above using Variable Length Subnet Mask (VLSM). (5 Marks)


10. find the class of each address.

a) 00000001 00001011 00001011 11101111

b) 11000001 10000011 00011011 11111111

c) 14.23.120.8

d) 252.5.15.111


Write short notes on:

a) Electronic mail

b) voice over IP

c) HTTP

d) FTP


 a) what are the difference between classful addressing and classless addressing in IPv4?

 b) what are the difference between routing and forwarding?

c) compare unicast and multicast routing protocols.


a) compare the TCP header and the UDP header. List the fields India the TCP header that are not present in UDP header. Give the reason for their absence.

 b) what is cognation? Explain any one of the cognation control mechanism.


6. a) what is the difference between a port address,a logical address,and a physical address?

  b) compare OSI model and TCP/IP protocol suit.


Is digital or analog signal is preferable (list reason )?

2. Explain line coding schemes with graphical representation.

3. Explain the reasons behind transmission impairments.

4. What is "signal encoding Techniques"?

5. Compare and contrast a circuit-switched network and datagram networks.


LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS