tutorbin

computer networks homework help

Boost your journey with 24/7 access to skilled experts, offering unmatched computer networks homework help

tutorbin

Trusted by 1.1 M+ Happy Students

Recently Asked computer networks Questions

Expert help when you need it
  • Q1:We are going to implement version 1.0 of HTTP, as defined in RFC 1945, where separate HTTP requests are sent for each component of the Web page. The server will be able to handle multiple simultaneous service requests in parallel. This means that the Web server is multi-threaded. In the main thread, the server listens to a fixed port. When it receives a TCP connection request, it sets up a TCP connection through another port and services the request in a separate thread. To simplify this programming task, we will develop the code in two stages. In the first stage, you will write a multi-threaded server that simply displays the contents of the HTTP request message that it receives. After this program is running properly, you will add the code required to generate an appropriate response.See Answer
  • Q2: 1. (20 points) Consider demand paging. You are given the following reference string, page replacement policy and the number of frames available. Calculate the number of page faults in each case. To answer the question, write down the # of page fault, and also copy the referencestring and circle all references that causes a page fault. Notice that we assume no pages exists in the frames in the beginning, thus, the initial pages being loaded into the frames should count as page faults. Another way to look at it is to assume page faults = number of times a page need to be loaded into main memory (assume nothing is there in the first place).See Answer
  • Q3: P15. Consider the cross-country example shown in Figure 3.17. How big would the window size have to be for the channel utilization to be greater than 98 percent? Suppose that the size of a packet is 1,500 bytes, including both header fields and data.See Answer
  • Q4: P23. Consider the GBN and SR protocols. Suppose the sequence number space is of size k.What is the largest allowable sender window that will avoid the occurrence of problems such as that in Figure 3.27 for each of these protocols?See Answer
  • Q5:Please further the conversation below with a substantive response of your own. Respond to discussion below with a reply with at least one or two sources Communicate the content information accurately and logically. Connect to key content concepts and likely personal experience. Wide area networks, usually referred to as WANS, are used to finish designing networks. Because a WAN provider facilitates communication, information sharing, and other activities between devices from all over the world, WANs are enormous information networks that are not confined to a single area. Given that the internet is regarded as the world's largest WAN, this is crucial for both international business and daily use. The architecture of a major organization's network will be discussed, and the network will include connectivity between sites in the US, Europe, Africa, and Japan as well as within regions. And to specify the WAN and remote access technologies that will be used. These will be defined by the policies, the standardization of technology, and the creation of virtual private networks, different corporate locations, and data security. The first step to multi-location business connectivity is standardized technological processes and policies; this doesn't begin with having the appropriate hardware or networks set up; rather, it begins with aligning the team. Standardizing technological processes and standards for any company with various locations makes it possible for all branches or sites, both local and outside, to communicate and work together more successfully. Broadband services like DSL, cable, and satellite access are used by the public WAN service provider to give Internet access. This will make it possible to offer access across all links, including wireless networks, cellular networks, virtual private networks (VPNs), lines, etc. Choosing the appropriate topology, router, switch, media, etc. This depends on the types, needs, and sizes of the organizations. How many routers or switches are required will depend on the project's number of ports. For the best connectivity, SD-WAN uses specific technology to prioritize the most crucial systems. It enables organizations to manage and link several departments, local users, and remote users to a secure, high-performance network. It evenly distributes the bandwidth between two redundant internet connections to give priority to important business programs like VOIP calls. The local loop will be connected to the enterprise edge using a variety of WAN access connectivity options provided by the ISPs.See Answer
  • Q6:Research at least one future technology that can improve the present campus WIFI network either from the aspects of coverage, connectivity experience, security, etc. Justify the suitability of the technology. See Answer
  • Q7:Read the paper: https://pdos.csail.mit.edu/papers/chord:sigcomm01/chord sigcomm.pdf. This paper is one of the foundational papers about P2P networks and DHT in particular. This will give you an introduction into the idea of routing and storage in a distributed fashion. In our P2P project we are doing a much limited version of this, but hopefully you can see the parallels! The summary should be a single page-ish (assuming it's single spaced). Focus your summary on a few aspects that you found interesting about the paper, you don't need to thoroughly walk through the entire thing. Keep it pithy!See Answer
  • Q8:Policing Social Media In light of the Capitol Riots and other social unrest, do you agree with tech companies who shut down access to apps such as Parlor? Where should they stop?See Answer
  • Q9:Should social networking companies monitor content In light of the fact that the vast majority believe that social networking has been the most important trend over the past 10-years, do you believe these companies have an obligation to monitor content? If so, how do they determine what is acceptable?See Answer
  • Q10:Is large tech too large? When you think of the most valuable companies in the world (Apple/Amazon), the richest person in the world (Musk), and the companies with the most data (Facebook and Google)... are they too powerful and too large?See Answer
  • Q11:Write instructions for a task of your choosing. (choose task own your own, student is doing network engineering, See Answer
  • Q12:During your study of T215A, you have studied the different technologies such as cellular, WIFI, Zigbee and Bluetooth. Using the internet and other resources (e.g. books and AOU e- library), write a short report about these technologies that answers the following questions: ■ What are the physical layers details of each of these technologies? ■ What are the MAC layers specification for each of these technologies? See Answer
  • Q13:a. If nine users are connected to a wireless network that offers a maximum data rate of 54 Mbit/s and a throughput of 45%, what is the typical average practical message data rate available for each user? b. A student is trying to download a file from the internet, which has the size of 100 MB and is using internet of download speed of 600 Kbps. 1. How long does it take to download the file by the student, express your answer in seconds and minutes? 2. The students decided to compress the files before storing it to CD. He need to compress the file to 40 MB file, what is the compression ratio? c. If student (A) starts copying his compressed file to CD with writing speed of 980 Kbps: 1. How much time needed to finish copying his compressed file (40 MB), express your answer in seconds and minutes? 2. How much time needed to finish copying his original file (uncompressed file) to CD, express your answer in seconds, minutes? See Answer
  • Q14:Consider the figure in Problem 4 above. Provide MAC addresses and IP addresses for the interfaces at Host A, both routers, and Host F. Suppose Host A sends a datagram to Host F. Give the source and destination MAC addresses in the frame encapsulating this IP datagram as the frame is transmitted (i) from A to the left router, (ii) from the left router to the right router, (iii) from the right router to F. Also give the source and destination IP addresses in the IP datagram encapsulated within the frame at each of these points in time.See Answer
  • Q15:Pick two example of error detection that might be really helpful when it comes to: 1) Network Media---> first find out what is network media, then find out what is error detection, it should be in your lecture, the same thing for network protocols 2) Network protocolsSee Answer
  • Q16:Build the network shown on packet tracer and document each of the steps, with screen shots in a word document. Each step should be clearly marked/numbered in your Microsoft Word report. R1 GO/1 FO/5 S1 F0/6 PC-A GO/0 GO/0 Loo Lo1 T R3 S3 G0/1 FO/5 FO/18 PC-C Step 1: Network Topology (15%) a. Build the network as shown using packet tracer. b. Subnet your allocated IP address range, for each of the 3 networks, using fixed size sub netting. Step 2: Configure an IP address on PC-A and PC-C (5%). a. Select a suitable IP Address and mask for your PCs b. Assign the IP address and subnet mask to the PC in windows. Step 3: Configure basic router settings (20%). a. Connect to your building router using the CLI and set hostnames as your student number (b123456_R1) b. Configure suitable IP Addresses on your routers interfaces. c. Test connectivity on each individual link using the PING command to show that each interface has an IP Address and is correctly configured./nStep 4: Configure OSPF router settings (20%). a. Enable OSPF routing protocol on building router (see lab sheet 7) b. Advertise your directly connected networks to the building router (see lab sheet 7) c. Demonstrate that your building router is now neighbors with the campus router. (see lab sheet 7) Step 5: Test end-to-end connectivity (10%). Verify using ping at the command prompt that the two end PCs can communicate across the network. MECH 3019 Part Time Assignment March 2023 Step 6: Reflection (30%) a) Explain why routing needs to be configured on both the routers? What problem is it solving? b) Explain the benefits of OSPF over Static Routing? c) Explain how redundancy could be added to this network, what would need to be modified.See Answer
  • Q17:TO DO Respond to the following in a minimum of 225 words: Compare artificial and biological neural networks. Consider which aspects of biological networks can be mimicked by artificial ones and which ones cannot.See Answer
  • Q18:Assessment Part 2: Complete the following questions in an MS Word Document in APA format. 1. If you connected your laptop to a wireless hotspot, opened your email program and sent an email to someone, what connections would you make? Describe the series of connections that would be made, the equipment you would use for the wireless hotspot, the protocols which would be used and the TCP/IP layers which the email would go through. 2. The addition of control information to a packet as it moves through the layers is called encapsulation. Provide a brief overview of the process that requested pieces of data (packets) undergo as it is sent over the Internet. Include the difference between the size of a typical packet and the size of a typical Ethernet frame? 3. Define data communication? Briefly discuss how signals are clocked, include what is meant when a signal is self-clocking and how does the way in which signals are clocked affect data transmission? What is the relationship between frequency and Baud Rate? 4. Provide the results of these calculations: What is the frequency, in Hertz, of a signal that repeats 60,000 times within one minute? What is its period (the length of one complete cycle)? What is the bandwidth of a signal composed of frequencies from 60 Hz to 600 Hz?See Answer
  • Q19:Part 4: Complete the following questions in an MS Word Document in APA format. 1. Provide a technical description of 4B/5B Digital Encoding Scheme. Contrast it with the Manchester scheme. Explain how and why it provides better data rates. 2. Create a ranked table (see below) based on transmission speed, comparing three types of twisted pair, coaxial cable, fiber-optic cable, microwave, and satellite. A total of seven media. Include distances and typical installation use cases. Type of Media Transmission Speed Distances Typical installation use cases 3. Using your favorite search engine, include an image or create a diagram comparing a low earth satellite deployment with a geosynchronous satellite deployment in a situation where you would need 24/7 coverage of the whole earth as your basic criteria. The image or diagram should include ground stations and appropriate locations. (Hint: all satellites (GEO and LEO) and ground stations need to be included and/or labeled). a. Provide a comparison of the difference in expense (cost) of the two different solutions (Cite your source)./nb. Include in the response the importance of satellites to wireless communication and connectivity. c. Include a relevant reference. 4. Discuss the data communication features of USB standards and implementation. What are the pros and cons of using USB drives? In your opinion, what is a portable alternative to the USB drive?See Answer
  • Q20:Assessment Part 2: Complete the following questions in an MS Word Document in APA format. Double space your work and use APA formatting sans-serif. (Example 12-point font using Times New Roman. You must include both a separate cover and reference page. 1. Research and compare cellular 3G, 4G-LTE and 5G - LTE Advanced. Include the technological differences between the implementations and include the importance of multiplexing and error correction. 2. List the three of the most common types of noise found in wireless technology? Provide a solution for correcting one of the listed noises and state whether the solution is or is not effective. 3. Name two common types of noise found on a computer network? Explain why noise is a bigger problem for analog transmission of data. Provide one specific example or reason. (Hint: consider how data is compressed when being transmitted). 4. Under what circumstances will error correction work, and when will it not work? Investigate and provide some detail on Forward Error Correction in the above context.See Answer

TutorBin Testimonials

I found TutorBin Computer Networks homework help when I was struggling with complex concepts. Experts provided step-wise explanations and examples to help me understand concepts clearly.

Rick Jordon

5

TutorBin experts resolve your doubts without making you wait for long. Their experts are responsive & available 24/7 whenever you need Computer Networks subject guidance.

Andrea Jacobs

5

I trust TutorBin for assisting me in completing Computer Networks assignments with quality and 100% accuracy. Experts are polite, listen to my problems, and have extensive experience in their domain.

Lilian King

5

I got my Computer Networks homework done on time. My assignment is proofread and edited by professionals. Got zero plagiarism as experts developed my assignment from scratch. Feel relieved and super excited.

Joey Dip

5

TutorBin helping students around the globe

TutorBin believes that distance should never be a barrier to learning. Over 500000+ orders and 100000+ happy customers explain TutorBin has become the name that keeps learning fun in the UK, USA, Canada, Australia, Singapore, and UAE.