a. The transport layer of the OSI model deals with end to end communication between the hosts. The two fundamental correspondences administrations given by TCP and UDP are based on the connectionless bundle exchange benefit given by the Internet Protocol (IP). Many system interfaces are characterized to bolster IP. The remarkable piece of the figure below is that the greater part of the higher layer conventions get to the system interfaces through IP. This is the thing that gives the capacity to work over numerous systems.
The network layer use the UDP protocol which is connection less for sending the data packets in the network. On the off chance that the Transport layer gives an association situated support of the network layer, then the system layer must go before all exchange of data with an association setup strategy. In the event that the association situated administration incorporates confirmations that edges of data are moved effectively and in grouping by the Transport layer, the network layer can then accept that the parcels it sends to its neighbor navigate an error free transmission.
Then again, if the Transport layer is connectionless, then each edge is sent freely through the information interface, most likely in unverified way (without affirmations or retransmissions). For this situation the system layer can’t make suspicions about the sequencing or rightness of the bundles it trades with its neighbors.
The implementation of the UDP protocol in the network would help to consume less resource than the implementation of the TCP. A three way handshake protocol is required to be implemented for the prevention of the spoof attacks that are mainly based on the IP address. An SSL connection can be used for encrypting the connection and securing the network from DDOS attacks.
2.
Boolean Operation
= 00011101
OR Result
Result in binary |
11101110 |
Result in decimal |
238 |
Result in hexadecimal |
ee |
11100010 and 00001110
AND Result
Result in binary |
10 |
Result in decimal |
2 |
Result in hexadecimal |
2 |
/9 = 255.128.0.0
/17= 255.255.128.0
/31= 255.255.255.254
255.255.248.0= /21
255.224.252.0=
1111111.11100000.11111100.00000000
It is not a legal subnet mask because a subnet mask is required to be filled with 1 from the left hand side. For this reason the alternative notation is required to be used and with /x and the x is described as the number of 1 bits. It also specifies the bits from the left hand side that can be used for the identification of the network and the bits that can be ignored dues to their difference from each of the node in the subnet.
A valid Prefix for 4 bit wide net is /28 (32-4) with subnet mask 255.255.255.240 only. It results in 11111111 11111111 11111111 11110000.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
A |
250 |
254 |
205.67.32.0 |
/24 |
255.255.255.0 |
205.67.32.1 – 205.67.32.254 |
205.67.32.255 |
B |
250 |
254 |
205.67.33.0 |
/24 |
255.255.255.0 |
205.67.33.1 – 205.67.33.254 |
205.67.33.255 |
C |
250 |
254 |
205.67.34.0 |
/24 |
255.255.255.0 |
205.67.34.1 – 205.67.34.254 |
205.67.34.255 |
All the IPs are in class c network
The physical qualities of WiFi make it outlandish and unreasonable for the CSMA/CD system to be utilized. This is because of CSMA/CD’s tendency of “tuning in” if the medium is free before transmitting the data packets in the network. Utilizing CSMA/CD, if an impact is distinguished on the medium, end-gadgets would need to hold up an arbitrary measure of time before they can begin the retransmission procedure. Consequently, CSMA/CD functions admirably for wired systems, notwithstanding, in remote systems, there is no chance to get for the sender to distinguish impacts a similar way CSMA/CD does since the sender is just ready to transmit and get parcels on the medium however is not ready to detect information navigating that medium. In this manner, CSMA/CA is utilized on remote systems. CSMA/CA doesn’t recognize crashes (dissimilar to CSMA/CA) yet rather stays away from them using a control message. Ought to the control message crash into another control message from another hub, it implies that the medium is not accessible for transmission and the back-off calculation should be connected before endeavoring retransmission.
DeCusatis, C. ed., 2013. Handbook of fiber optic data communication: a practical guide to optical networking. Academic Press.
Gupta, V. and Joshi, H., Electronics For Imaging, Inc., 2016. Device discovery using broadcast technology. U.S. Patent 9,294,574.
Jagannathan, K., Markakis, M.G., Modiano, E. and Tsitsiklis, J.N., 2014. Throughput optimal scheduling over time-varying channels in the presence of heavy-tailed traffic. IEEE Transactions on Information Theory, 60(5), pp.2896-2909.
Jin, F., Chen, G., Liu, J. and Zhu, T., 2013. Model and layered calculation process for Chinese railway network vehicle flow estimation. Advances in Transportation Studies.
Manaf, A. and Bataona, D.S., 2014, November. Analysis and design of subnetting methods: Hybrid fixed length subnet masking (HFLSM). In Electrical Engineering and Computer Science (ICEECS), 2014 International Conference on (pp. 102-108). IEEE.
McNamara, J.E., 2014. Technical aspects of data communication. Digital Press.
Milic, D., Djosic, D., Stefanovic, C., Panic, S. and Stefanovic, M., 2016. Second order statistics of the SC receiver over Rician fading channels in the presence of multiple Nakagami?m interferers. International Journal of Numerical Modelling: Electronic Networks, Devices and Fields, 29(2), pp.222-229.
Moradi, S. and Indiveri, G., 2014. An event-based neural network architecture with an asynchronous programmable synaptic memory. IEEE transactions on biomedical circuits and systems, 8(1), pp.98-107.
Niu, C., He, X. and Zhou, S., 2014. The Design and Simulation Based on Ultrasonic and CSMA/CD Alike Tracking Method for Wireless Sensor Networks. In Advanced Technologies in Ad Hoc and Sensor Networks (pp. 275-286). Springer Berlin Heidelberg.
Slimane, S.B., Manssour, J. and Osseiran, A., Telefonaktiebolaget Lm Ericsson (Publ), 2016. Network coded data communication. U.S. Patent 9,425,885.
Song, L., Liao, Y., Bian, K., Song, L. and Han, Z., 2016. Cross-layer protocol design for CSMA/CD in full-duplex WiFi networks. IEEE Communications Letters, 20(4), pp.792-795.
Wen, G., Chen, M.Z. and Yu, X., 2016. Event-triggered master–slave synchronization with sampled-data communication. IEEE Transactions on Circuits and Systems II: Express Briefs, 63(3), pp.304-308.
Xie, P., Cai, Z., Guo, C., Liu, P., Chen, Z., Zhang, Y., Han, Y. and Li, L., 2016, October. Traffic flow calculation method for substation communication network. In PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), 2016 IEEE (pp. 1-6). IEEE.
Xue, Q. and Chen, A.M., Qualcomm Incorporated, 2013. Systems and methods for carrying broadcast services over a mobile broadcast network. U.S. Patent 8,526,350.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download