QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrive? 1. 135.46.63.10 Ans: The router will check the routing entry starting with the longest prefix (/23), 192.53.40.0/23. /23 mean network address is 23 bit and the corresponding network mask is 255.255.255.0. 135.45.63.10 and 255.255.254.0 = 135.45.62.0 != 192.53.40.0 therefore this entry does not match. Next longest prefix is /22. 135.45.63.10 and 255.255.252.0=135.45.60.0. it matches 135.45.60.0/22 routing entry, therefore that packet will be routed out over …show more content…
3. 135.46.52.2 Ans: The given address is lower than 135.45.56.0/22. The default route will be used and the packets will be routed out over router 1. 4. 192.53.40.7 Ans: 192.53.40.7 and 255.255.254.0= 192.53.40.0. it matches 192.53.40.0/23 routing entry and the packet will be routed out over router 1. 5. 192.53.56.7 Ans: 192.53.56.7 and 255.255.254.0 = 192.53.56.0. The default route will be used and that packet will be routed out over router 2. QUES 2. A Large number of consecutive IP address are available starting at 198.16.0.0. Suppose that four organizations, A, B, C, D request 4000, 2000, 4000, and 8000 addresses, respectively, in that order. For each of these, give a. the first IP address assigned, b. the last IP address assigned c. and the mask in the w.x.y.z/s …show more content…
Therefore,
• its network mask should be 198.16.01100000/19, or 198.16.96.0/19
• its first IP address assigned is 198.16.96.1
• its last IP address assigned is 198.16.01111111.01000001 or 198.16.127.65
QUES 3. PPP is closely based on HDLC, which uses bit stuffing to prevent accidental flag bytes with the payload from causing confusion.
Give one reason why PPP uses byte stuffing instead of bit stuffing?
The PPP was clearly designed to be implemented in software, not in hardware as bit-stuffing protocols.
With a software implementation, working entirely with bytes is much simpler than working with individual bits. In addition, PPP was designed to be used with modems, and modems accept and transmit data in units of 1 byte, not 1
Software application development at my company was initiated first out of security concerns. There were increasing numbers of security breaches reported in hospitals, banks, Yahoo, and other places that paused potential hazards (Snyder, 2014). We are in the financial Industry with huge volumes of sensitive data. Our Information Technology department expressed concerns that our SQL server was an easy target to those that may want to hack the system. Existing security measures and periodic training were very strict but they were not enough to protect customers from hackers.
When using routers, you need many routers in order to route the information to the correct location, as one router will not be able to manage this task. Explain how the routing schemes handle this problem.
2010 was the year for Jets fans they made it out of the regular season and into the playoffs, all the way into the Conference Finals. But no surprise, the Jets came up short again, losing to the Pittsburgh Steelers 24-19. After that, it all went down hill. The rankings of the Jets defense and offense decrease and with that so does their record, 8-8, 6-10, 8-8, 4-12, 10-6(glimps of hope), 5-11. With the decrease of wins most people, me included, you lose hope, and wonder when is that next year going to happen. If you want the easy answer as to why there is such a big difference between the years, just look at the Jets overall rating. It is like a roller coaster, from good one year to bad the next. But the real question is why was there this
Dodger was being sent off to Australia, he got caught for stealing. Fagin freaked out, he was thinking that Dodger would rat them out and it would be over for them. Soon after Fagin got the news, Monks showed up… He wanted Charley out of the room. He was about to tell him what Nancy did. Bill flipped out, thinking that she turned against him. He went to go find Nancy. On the way to find her, everyone got out of his way; nobody wanted his attention. He asked everyone if they have seen her and they all said “no.” Then, Bill found Nancy… Seconds later there was a loud scream. Everyone ran to see what happened and saw Nancy’s lifeless body with Bill running away. People chased after Bill, he went to Fagin’s place asking for money to get away.
It was November 12 when spacecraft Rosetta caught up with the comet called Churyumov-Gerasimenko better know as 67P (Lauren, 2014). The journey took 6.4 billion miles to complete (Lauren, 2014). Also Rosetta sent a lander called Philae to explore the comet and take picture among other things (Lauren, 2014). Interestingly enough when the media reported the comet landing I thing is trumped Kim kardashian attempt at breaking the internet with her nude photos which the media was cover at about the same time as the comet landing. With all that being said you might be asking why should I care? You should care about this comet because comets came from and can tell us about our solar system, also there has not been any unique and important mission as this one, further more it might be the last space mission we get to experience for a while. Now I am going to get in to what comets are and how they got here and talk a little bit
3) In the Drop_NoFast scenario, obtain the overlaid graph that compares Sent Segment Sequence Number with Received Segment ACK Number for Server_West. Explain the graph.
The marketing idea is tied in with accomplishing corporate objectives by meeting and surpassing client needs superior to the opposition. The best approach to do this is for organizations to consider what value they are proposing to offer to their clients and once this choice is made, choose how to impart this message to their clients/commercial center (Fahy and Jobber, 2012). It is viewed as that there are 3 principle components to the marketing communication mix: tools, media and messages (Baines and Fill, 2014). This essay focuses on the diagram and critique of the initial two of these, tools and media.
The teacher will review with the whole class that living things must be able to move, grow, and reproduce and nonliving things cannot. She will then ask if any students still have questions and answer any questions they may have. The students will take a computerized multiplication test to assess their mastery (McCarty, Living nonliving assessment, 2015).
It's important to gather information that is understandable by your students. The procces of gathering evendce in childrens learning can make a huge difference. there are many different kinds of assesments that help you as a teacher better educate your students. your lessons plans and what you teacer is very important to what they understand and how they learn.
This means that the punishment will take place in jails. Another key provision of AB 109
Numeracy is a mathematical skill that is needed to be a confident teacher. This unit of study has allowed students to build their knowledge in the mathematical areas of competency and disposition towards numeracy in mathematics. The six areas of mathematics under the Australian Curriculum that were the focus of this unit were; algebra, number, geometry, measurements, statistics and probability. Covering these components of the curriculum made it evident where more study and knowledge was needed to build confidence in all areas of mathematics. Studying this unit also challenges students to think about how we use numeracy in our everyday lives. Without the knowledge if numeracy, it can make it very challenging to work out may problems that can arise in our day to day activities. The knowledge of numeracy in mathematics I have has strengthened during the duration of this unit. This has been evident in the mathematics support I do with year 9 students at school, as I now have a confident and clear understanding of algebra, number, geometry, measurements, statistics and probability.
With this degree I hope to fill a gap in this industry, but also to use this as a starting point
SLIP and PPP are two communication protocols which allow a computer connected to a server via a serial line (such as a modem) to become an actual node on the internet. This allows you to run network applications on your home computer directly. While SLIP and PPP are largely similar, there are some key differences. PPP is a newer protocol, better designed, and more acceptable to the sort of people who like to standardize protocol specifications.
4. A. Crespo and H. Garcia-Molina. Routing indices for peer-to-peer systems. In Proc. of the 28th International Conference on Distributed Computing Systems, July 2002.
Let's use these two addresses for some examples: 171.68.3.3 and 171.68.2.3. If the subnet mask is 255.255.255.0, the first 24 bits are masked, so the router compares the first 3 octets of the two addresses. Since the masked bits are not the same, the router knows that these addresses belong to different subnets.