Elaborate in detail the transition strategies from the IPv4 to the IPv6 with the help of a
suitable example
An organization is granted a block of addresses with the beginning address
150.25.0.0/24. The organization needs to have 3 subblocks of addresses to use in its three
subnets: one subblock of 11 addresses, one subblock of 40 addresses, and one subblock of
125 addresses. Design the network and plot it completely with respective subnets, IP range,
Network IDs
a) Create a java project named school
b) Add two classes, namely student and lect
c) In student class, create the following methods:
i. calculate_stud_age – This method should take year of birth of the student as a
parameter and calculate and return the student’s age
ii. calculate_ave_mark – This method should take three marks of the student ,
Math, English and Physics marks as parameters and return the average mark.
d) In the lect class, create the following methods:
i. get_name – This method should take a string (name of the lect) and
an integer (experience of the lect in years). This method should
output the name of the Lect together with his designation
based on the years of experiences determined by the following:
Professor – if experience is >= 20 years
Associate professor – if experience is >=15 years
Senior lecturer – if experience is >= 10 years
Associate lecturer – if experience is >=5 years
Junior lecturer – if experience is <5 years
Read two Journal papers (impact factor) related to Unstructured data security and share summary of each paper comprising the following sections:
(1) Research gap identified by the authors.
(2) Proposed solution.
(3) Evaluation Mechanism - How they evaluated the proposed solution?
(4) Results
(5) Conclusion and Future Work.
(6) Your critical comments on the proposed solution and evaluation procedure.
based on packet switching and routing as well as te other problems of media resistance and interference.discuss the network performance characteristics
Q3: A network is given as 190.28.0.0/16. Eight subnets are to be created.
(a) What will be the CIDR network prefix?
(b) Express last subnet in dotted decimal notation with mask.
(c) What is the maximum number of hosts in each subnet?
(d) What is the address range for hosts in second subnet?
(e) What is the subnet broadcast address for the first subnet?(10 marks)
Q2: (a) Two 8 bit numbers in a hexadecimal are 05 and 06. Obtain the checksum. (5 marks )
(b) Explain in detail each field of IPv6 header. (5 marks)
Q1. (a) Find CRC code for message bits to be transmitted which is 11001110 with generator value 1011 known to receiver. (5 marks)
(b) Explain in detail Go-Back-N ARQ Protocol with timeline diagram. (5 marks)
We've been dealing with integers too much, it's time for float to shine!
Instructions:
Input five float numbers.
Print out the float numbers in one line, separated by spaces, and make sure you only print up to 1 decimal place.
Add the first four float numbers and check if their sum is greater than the fifth float number. Print out "Yes" if they are.
Input
1. First float number
2. Second float number
3. Third float number
4. Fourth float number
5. Fifth float number
Output
The first five lines will contain message prompts to input the five float numbers.
The next line contains the inputted float numbers.
The last line contains "Yes" if the condition is true.
Enter·the·first·number:·1.1
Enter·the·second·number:·1.2
Enter·the·third·number:·1.3
Enter·the·fourth·number:·1.4
Enter·the·fifth·number:·1.1
1.1·1.2·1.3·1.4·1.1
Yes
Write Linux Shell script to check whether a sample file is readable, writable, and executable