Topic 3 Question 4 Peer to peer networks is considered more ideal since the with thin network architecture, the network management duties are supplied between each peer administrator, this is because each and every peer who is connected to the network can be the server. But for the case of the larger networks like the campus networks, the administration of the network can never be supplied the same was the peer network does. Question 7 The following is the structure of the ITECH1102 which is the new application client program protocol. The Flag which delimits the frame at each and both ends. The address, this identifies the receiver of the frame. Thee control , this specifies various types of the frame. The Information. This is the data which is shared to the client by the server. The FCS this is used to detect errors and the sequence of the frame. Question 8 This is how the ping program works. The Internet Protocol address is set using the concord to all the time show the computer. Therefore the ping to the Internet Protocol address set will all the time ping the computer hence reducing the delay. Question 9 The ping uses the TCP/IP protocol in its operation and workings. Topic 5 Question 10 The data link layer will use the MAC address which is similar to the network so that the destination and the source can accurately and correctly connect for the purpose of communication. Question 12 Computer A Address: 12.12.12.12/3 MAC : aa.aa.aa.aa Computer B Address: 12.12.12.12/3 MAC : bb.bb.bb.bb
Question 14 i.The interface entry contains the IP address for router which can receive the fastest data packet. ii.The next hop contains the most close router which the packet can go over. iii. Destination NetworkInterfaceNext Hop 141.132.128.0141.132.128.1141.132.128.1 141.132.32.0141.132.32.1141.132.32.1 141.132.96.0 141.132.64.0 iv. Destination NetworkInterfaceNext Hop 141.132.128.0 141.132.32.0 141.132.96.0141.132.96.7141.132.96.7 141.132.64.0141.132.64.1141.132.64.1 Question 18 If resolution is not possible then the DNS will request the assistance of the DNS servers which creates the part of the DNS servers which are in the world widepyramid. This is because the solution of the name is needed every time the Internet names are entered in the browsers since the Internet protocols addresses are all needed for the communication of the network to happen. Topic 7 Question 3 The half duplex permits the flow of data in all directions, though this is only allowed one flow of data at ago whereas the full duplex permits the flow of data in all directions at the same time. Question 4 The statistical time division multiplexing is able to allocate many admission to the devices which are needed by it. This also helps to reduce the channel bandwidth waste. Question 5
With the Manchester encoding , the components of the direct current signals does not carry any information. This helps the standards which under normal conditions does not carry power, they are able to transmit the information. Question 6 The terrestrial microwave link is utilized for the lengthy haul telecommunications and also the petite point to point links. The links are used where the coaxial fiber cables cannot be placed since this is an alternative of the cable. The areas includes the mountain areas. Bibliography Choyi, V. K., & Vinokurov, D. (2012).U.S. Patent No. 8,191,106. Washington, DC: U.S. Patent and Trademark Office. Choi, M. K., Robles, R. J., Hong, C. H., & Kim, T. H. (2008). Wireless network security: Vulnerabilities, threats and countermeasures.International Journal of Multimedia and Ubiquitous Engineering,3(3), 77-86. Elliot, H. A., & Elliot, D. (2009).U.S. Patent No. 7,593,512. Washington, DC: U.S. Patent and Trademark Office. Han, W., & Lei, C. (2012). A survey on policy languages in network and security management.Computer Networks,56(1), 477-489. Satkunanathan, L., Sunkammurali, K., & Watson, E. B. (2012).U.S. Patent No. 8,239,943. Washington, DC: U.S. Patent and Trademark Office. Sankaran, C. B. (2009). Network access security in next-generation 3GPP systems: A tutorial.IEEE Communications Magazine,47(2), 84-91. Wang, J. (2009).Computer network security: theory and practice. Springer Publishing Company, Incorporated.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser