Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Explain the difference between a MAC address and an IP address. Answer should be related to the OSI model


What strategies would you recommend that Apple pursue to assure widespread consumer adoption of Apple Pay?


Give two applications each for repeaters, hubs and routers

Briefly explain the difference between Ethernet, Token Ring, FDDI and Wi‐Fi. You must make a recommendation about which technology he should use. A good answer will relate your recommendation to the business requirements of JP Marketing


The address of a computer on the Internet is commonly referred to as the IP Address (Internet Protocol).

What are the key elements of protocols? [ 6 Marks]

b)   In computer networking two versions of IP address are used i.e., IPv4 and IPv6.

Give your point of view, can IPv6 replace IPv4 or co-exist with IPv6? Justify your opinion with two solid reasons.                                             [ 7 Marks]

 

c)   What is the role of the IEEE in computer networking?                             [ 3 Marks]

 

d)   What are the important differences between MAC address and IP address? [ 4 Marks]


Explain the difference between a MAC address and an IP address. You should relate your answer to the OSI model.


What is the difference between a MAC address and an IP address. Relate your answer to the OSI model


2.1 Assuming the following relations from a customer database, write relational algebra expression
for each statement using symbolic notations.

Customer (cid, cname, rating, salary)
Item (iid, iname, type)
Order (cid, iid, day, qty)

2.1.1 Find the names of customers who have ordered item with id 087. (2)
2.1.2 Find the names of customers who have ordered a television i.e., an item of type television. (3)

BankZero allows all its clients to open accounts, increase their limits, and conduct high mount transfers irrespective of bank balance. Furthermore, once users are logged in, they can perform all other transactions with no restrictions. Is this bank violating any of the pervasive security principles? Support your answer by discussing those principles that are not being adhered to


 A person who lives in Bangalore travels to Pune with his laptop. The LAN at his destination in Pune is a wireless IP LAN, so he does not have to plug in.

a) Is it still necessary to go through the entire business with home agents and foreign agents to make email and other traffic arrive correctly? Explain it.    

b) When the IPv6 protocol is introduced, does the ARP protocol have to be changed? If

so, are the changes conceptual or technical?  

c) Generate the checksum for the two 16 bit data: 1101010110110100 and 1110100010101111 


LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS