Topic 4 Question 5 The LCC sublayer provide the flow management and control, and also the provision of automatic repeat request which is an error controlling mechanisms which is within the multipoint network. This are some of the provisions of the multiplexing mechanism therefore the main reason as to why the LCC is said to be providing the mechanisms. Question 7 The routers are made up of multiple network interface cards, this is simply because of the main two reasons. Routers are needed to connect to more than one physical network , for this to be more viable, the network interface card needed must be more than one so that this can be facilitated perfectly. Again, there is problems of redundancy in the network, for the routers to operate well, they need more than one network interface card to reduce redundancy in any case one NIC card has spoilt, another network card can be used for the same purpose. Question 19 A new entry for the MAC address is added to the Address Resolution Protocol when the Internet protocol is mapped to the MAC address successfully. Under normal circumstances, the entries are always added to the Address Resolution Protocol dynamically. This also allows the addition of the static entries. The MAC address can be removed from the address resolution protocol just after the timeout which was pre determined is over. This can be any time which is set out or after the disconnection of the network. Question 20 The modification on the Ethernet header happens to the router in order to accommodate the newly added address in the destination part.
Topic 6 Question 5 The number of bits is which are used storing port number destination are 65536. There are located from value zero to 65535, therefore counting the number of bits starting from zero it adds one to the 65535 hence becomes 65536. Question 8 Each and every connection which are made by opening a new tab in a browser is allocated a new port on the same computer in a network. Therefore the packet requests does not mess up since the packets are labelled with the port it will go to. Question 14 In the first step, the client initiates the connection to the server. Then the server responds to the connection. Then lastly the clients will acknowledge the response of the server. Question 15 Flow control is implemented by the TCP window size field. The maximum byte number as sender receives without acknowledgement is specified, then the receiver can stop or slow the sending of data from the sender by delaying acknowledgement. Topic 8 Question 5 Type 1 virtualization , are the virtualization products which operates right on the firmware whereas the type 2 are products which operates right on the operating system.
Question 8 1G only supported voice, with frequency of 30HZ, and having the circuit switching. 2G supported voice, SMS, MMS, internet access. The circuit switching was for voice and packet for data. 3G started the high data speed , they were grounded on technologies of CDMA. 4G comprises of very high rates of data, with LTE being the main technology based on IP Question 9 The cell is used in the distribution of the network over the land Mobile switching centre it controls the interface with network and the telephone network of the public Base station is used as a fixed communication point on a network for the user mobile phone. Question 10 The Mobile switching centre controls and manages the changing of mobile phones from cell to cell. The base station is where the new traffic of network will be directed after the transition. Bibliography Choyi, V. K., & Vinokurov, D. (2012).U.S. Patent No. 8,191,106. Washington, DC: U.S. Patent and Trademark Office. Wang, J. (2009).Computer network security: theory and practice. Springer Publishing Company, Incorporated. Satkunanathan, L., Sunkammurali, K., & Watson, E. B. (2012).U.S. Patent No. 8,239,943. Washington, DC: U.S. Patent and Trademark Office. Han, W., & Lei, C. (2012). A survey on policy languages in network and security management.Computer Networks,56(1), 477-489.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Sankaran, C. B. (2009). Network access security in next-generation 3GPP systems: A tutorial.IEEE Communications Magazine,47(2), 84-91. Choi, M. K., Robles, R. J., Hong, C. H., & Kim, T. H. (2008). Wireless network security: Vulnerabilities, threats and countermeasures.International Journal of Multimedia and Ubiquitous Engineering,3(3), 77-86. Elliot, H. A., & Elliot, D. (2009).U.S. Patent No. 7,593,512. Washington, DC: U.S. Patent and Trademark Office.