Investigate and discuss the external memory storage trends.
Write an assembly program using MARIE's assembly Instruction set that prompts
the user to enter a non-negative integer that is less than 10. The program should
include a subroutine that keeps prompting until a valid value is obtained. When a
valid number is entered, it will be displayed. (Hint: Use JNS & JUMPI instructions
to implement the subroutine)
N.B: You should include the MARIE code in your Answer, with an
explanation of each instruction in your code beside it (not a screenshot!)
Task 2:
You are a network engineer and asked to connect 5 departments such as Language,
science, humanities, English and Math in a reputed school. How will you connect those
departments to exchange smooth flow of information between them? List out the
networking tools and protocols required to establish the connectivity between them.
Analyze and write a report by analyzing and describing the network requirement for the
above and demonstrate switch and router configuration.
MOV AX, 05ABH
MOV AL, 34H
ADD AH, A5H
MOV BX, 0000H
MOV BL, AH
MOV BH, AL
Despite being adjacent in a protocol stack, Data Link Layer protocols and Network Layer protocols each employ a number of similar fields in their headers (i.e. a field named 'X' appears in the headers of both layers, and the role of 'X' is similar for both layers).
For each of these three fields:
a. describe its typical role, and
b. provide an example to demonstrate why their 'duplication' does not introduce unnecessary redundancy.
Consider the delivery of messages in an internetworked environment in which the source and destination nodes are many hops apart. Communication between distant nodes passes through a series of routers, and there may be multiple pathways between any source and destination. Large messages must be fragmented and reassembled using one of two possible strategies:
a. the first strategy involves fragmenting each message at the source node, and then reassembling them at the destination node.
b. the second strategy involves fragmenting each message at the source node, reassembling and re-fragmenting them at intermediate routers, and final reassembly at the destination node.
c. For each strategy, describe the fields of a Network Layer header necessary to support the strategy.
d. With reference to two distinct examples, describe circumstances where each of the strategies would be preferred over the other.
View captured traffic in Wireshark
View wireless and wired NIC information
Determine the MAC address of a Host
Suppose that you have a computer with a memory unit of 24 bits per word. In this computer, the assembly program’s instruction set consists of 198 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. a. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. How many additional instructions could be added to this instruction set without exceeding the assigned number of bits? Discuss and show your calculations. d. What is the largest unsigned binary number that the address can hold?