Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

An Internet user have put in a set top box offered by his ISP (Internet Service Provider). This box is connected to the ISP via ADSL througth the telephone line and can provide Internet access service. 1. Through this Internet access, which kind of application could be used? Does the characteristics of the line meet the requirements of those applications? Justfy your answer. 2. What is the average download rate of the full web page in persistant non pipelined mode (Ignore time processing at the application layer)?


There is a Network Attached Storage device used as NFS share for a file server. NAS is built using RAID 6 array. Please describe the consequences for the file server if 1 disk fails on the NAS. If 2 disks fail? And finally, if 3 disks fail on the NAS simultaneously.


We created a snapshot (A) of a virtual machine on our VMware ESX host. Then we deleted 100 GB of data from the machine and made a snapshot (B), reverted back to snapshot (A), enabled CBT option, uploaded 100 GB of data to the machine and made a snapshot (C). Which snapshot would be bigger, B or C? Please explain why.


There is a Network Attached Storage device used as NFS share for a file server. NAS is built using RAID 6 array. Please describe the consequences for the file server if 1 disk fails on the NAS. If 2 disks fail? And finally, if 3 disks fail on the NAS simultaneously.


Perform the following tasks

·       Create a text file and save it on your Desktop. Edit the file and write a sentence and then save it back.

·       Apply Hash to the file using any MD5 Hash software utility. Note down the Hash value of the file.

·       Make changes to the file and save it again with the same name.

·       Apply Hash to the file again using the same utility. Note down the Hash value.

·       Write down the result interpreted.

A company wants to deploy 4 new studio offices to their network. the company headquarters in Los Angeles with 50000 users. The other 4 new branches are in Australia, BranchA(10000 users), BranchB(8000), BranchC(6000), and BranchD(4700). Each branch's building has 8 levels and 6 servers on the fifth floor of each branch.

The internet access for each office as well as inter-branch-office networking is crucial. The connectivity between Los Angeles and the cities in Australia is a must. you need to think about cost-effectiveness and creating a VPN for this company. What would be the best choice of network, network topology, and hardware to be used in this example?


You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination computer is on another network, so you know data has to travel through one or more routers. The network technology on your network is Ethernet, but the technology on the destination network is Wi-Fi. From what you have learned about networking, should this document transfer work? Why or why not? Which layers of the OSI model are involved in the italicized parts of this description?


What is the importance of knowing the IP addressing?

Convert the following to binary numbers to decimals using the long method.


1. 1101001


2. 10001.1101


3. 101110


4. 101010.1111


5. 111001



Convert the following decimal numbers to binary.


1. 76


2. 119


3. 1032


4. 1010


5. 242



Convert the following to binary numbers to decimals using the long method.


1. 1101001


2. 10001.1101


3. 101110


4. 101010.1111


5. 111001




Convert the following decimal numbers to binary.


1. 76


2. 119


3. 1032


4. 1010


5. 242



LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS