Limited Time OfferFLAT 20% off & $20 bonus sign up. Order Now
New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now
Real example of Bus topology is the LAN connection in an institute or office.
Real example of Star topology is the ATM service provided by the banks.
Real example of Mesh topology is in the military market.
Explain encapsulation and decapsulation in a five layer TCP/IP protocol suite. How does multiplexing and de-multiplexing differ from encapsulation and decapsulation?
Encapsulation- In TCP/IP protocol suite when data moves from upper layer to lower level outgoing transmission each layer includes a bundle of relevant information combined in one packet which contains header and the actual data. The data package containing the header and the data from the upper layer then becomes the data that is repackaged at the next lower level with lower layer's header. Header is used as a supplemental data placed at the beginning of a block. This supplemental data is used at the receiving side to extract the data from the encapsulated data packets. This packing of data at each layer is known as data encapsulation.
Decapsulation- The whole process of Encapsulation is reversely repeated when data is reached in receiver side or destination computer. As the data flows from lower to upper levels each layer unpacks the corresponding header and uses the information contained in the header to deliver the packet to the exact network application waiting for the data. This reversed process of encapsulation is called Decapsulation.
Multiplexing is the technique which allows the simultaneous transmission of multiple signals across a single data link where encapsulation is the process of wrapping header and the data part together in one block during transmission from one layer to another layer in TCP/PT protocol network.
In case of the demultiplexing the stream is fed into a demultiplexer which separates it back to its component transmission and directs them to their correspondent lines where as in the decapsulation only the reverse encapsulation is performed.
Calculate the approximate bit rate and signal level(s) for a 6.8 MHz bandwidth system with a signal to noise ratio of 132.
Shanon’s formula to find the upper limit:
Data rate or bit rate =B log2 (1+SNR)
=106 log2 (1+132)
=106 log2133
= (2123851.641)/3
= 7Mbps
Explain why the OSI model is better than the TCP/IP model. Why hasn't it taken over from the TCP/IP model? Discuss the advantages and disadvantages of both models.
OSI (Open System interconnection) model is protocol independent acts as a communication gateway between the user and the network with a vertical approach through transport layer which guarantees the delivery of pockets. OSI model consists of 7 different layers and in each layers protocols are hidden and easily changeable with the change of technologies.
Where TCP/IP are two protocols of the model namely Transmission Control Protocol/Internet protocol having only four layers instead of 7.
What is the total delay (latency) for a frame of size 5 million bits that is being sent on a link with 10 routers each having a queuing time of 3.5 µs and a processing time of 1.8 µs. The length of the link is 1900 km, the speed of light inside the link is 2.2 x 108 m/s, the link has a bandwidth of 8 Mbps. Which component(s) of the total delay is/are dominant? Which one(s) is/are negligible?
Latency(Delay)= propagation time+ transmission time+ queuing time + processing delay
Here, queuing time = 3.5 µs =3.5 * 10-6 sec,
Distance =1900 km= 1900*1000=1900000 m
Propagation time= distance / propagation speed
= 1900000 / 2.2 * 108
= 8.6363 ms
Processing delay= time taken by the router to process
=no of routers * processing time
= 10 * 1.8 * 10-6 sec
= 1.8 * 10-5 sec
Transmission time= message size / bandwidth
= 5000000 * 8 /106 ms
= 40 ms
Now,
Latency (Delay)= propagation time+ transmission time+ queuing time + processing delay
=8.6363 + 40 + 1.8*10-5+3.5 * 10-6
=8.6363 + 40 + 0.00018 + 0.0000035
=48.6364 ms
The transmission time is the most dominant section in total delay and the processing delay is negligible.
Question 6: According to RFC1939, a POP3 session is one of the following states: closed, authorization, transaction or update. Draw a diagram and explain to show these four states and how POP3 moves between them.
POP3 stands for Post Office Protocol 3 which enables a server to host communication through email and to monitor the servers, domains and mailboxes. It is mainly used by a client to access and download messages from the mail server.
POP3 has some sessions which are explained below-
POP3 Authorization State- POP3 connection is started with listening for connection port 110. Now in authorization session TCP makes a connection with the server and client provide user command with its user identification. If server responses with a positive success indicator then user issue pass command in its password section and goes to transaction session
POP3 Transaction State- In this state client issues one or more commands and server returns positive or negative responses. Servers attends some messages, if it a valid message then it is marked as deleted and send a positive response and returns the highest no of accessed messages and enters to update session.
POP3 Update State- In the update state of POP3, the server deletes all messages marked for deletion, releases resources associated with the client's mail-drop, and closes the TCP connection.
Afanasyev, A., Burke, J., Zhang, L., Claffy, K., Wang, L., Jacobson, V., ... & Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73.
Comer, D. E. (2008). Computer networks and internets. Prentice Hall Press.
Comer, D. E., & Laverell, W. D. (2002). Hands-on networking with internet technologies. Prentice Hall Professional Technical Reference.
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14-76.
Kurose, J. F. (2005). Computer networking: A top-down approach featuring the internet, 3/E. Pearson Education India.
Rennie, F., & Morrison, T. (2013). E-learning and social networking handbook: Resources for higher education. Routledge.
Xia, W., Wen, Y., Foh, C. H., Niyato, D., & Xie, H. (2015). A survey on software-defined networking. IEEE Communications Surveys & Tutorials, 17(1), 27-51.
Xylomenos, G., Ververidis, C. N., Siris, V. A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., ... & Polyzos, G. C. (2014). A survey of information-centric networking research. IEEE Communications Surveys & Tutorials, 16(2), 1024-1049.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., ... & Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73.
No matter how close the deadline is, you will find quick solutions for your urgent assignments.
All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.
Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.
We offer academic help services for a wide array of subjects.
We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.
15,000+ happy customers and counting!