Question

In: Computer Science

Answer the questions in full 1: What field in the IP header can be used to...

Answer the questions in full

1: What field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?

2: Do routers have IP addresses? If so, how many?

3: Suppose you wanted to implement a new routing protocol in the SDN control plane. At which layer would you implement the protocol? Explain

Solutions

Expert Solution

1. TTL (Time To Live )

Explanation :

i)TTL (Time To Live ) Field is used to ensure that a packet would be forwarded upto limited number of hops .

ii) It is a 8 -bit field used to define the life time of a packet .

iii) Each router to which a packet is forwarded decrements the TTL value by 1 .

iv) If TTL value of a packet becomes 0 before reaching the destination , it would be discarded from the network.

v) It is a 8 bit field can be forwarded through max of 255 routers .

PFA of IP Header :

2.) Yes Routers have IP addresses.

Explanation :

i) Routers are special because they have two IP addresses assigned to each of its two interfaces .

ii) First interface is called WAN (Wide Area Network) interface which faces the internet has its public IP address.

iii) Second interface is called LAN (Local Area Network) interface which faces the home network's computers and has a private IP address.

3) Layer 3 i.e Network Layer as we are implementing a routing protocol

Explanation :

i) SDN control plane provides layer-2 MAC reachability and layer -3 routing information to routing devices for forwarding of packets .

ii) Layer 3 provides routing and reachability information to all participating devices , other conventional routing protocols are distributed , while an SDN based system typically involves downloading controller - derived layer 3 forwarding tables to various devices using standardized or open protocols .

If you like please give thumbs up :)


Related Solutions

Answer all questions in full answer google the case 1- In continuing your understanding of IP...
Answer all questions in full answer google the case 1- In continuing your understanding of IP protection you are to research the concept of trade dress and how this was a factor in the case of Knitwaves vs Lolly Togs. What was the basis of the case and what was the outcome. 2- Research the case of Louis Vuitton vs Dooney & Burke and post your understanding of the IP violation that was involved and what was the outcome? 3-...
Can you pleasee answer these questions: 1. What are the mechanisms of tolerance used by resistant...
Can you pleasee answer these questions: 1. What are the mechanisms of tolerance used by resistant or engineered plants. Give an example. 2. What is the pesticidal crystal protein Bt. 3. What is Bt toxin mode of action, explain in detail. Thank you in advance, I would appreciate it a lot, and I am grateful forever!!!
Given the following frame, answer the questions that follow. No Ethernet header!
Given the following frame, answer the questions that follow. No Ethernet header!
Answer the following questions in your answer: 1. What specific metrics are being used? 2. What...
Answer the following questions in your answer: 1. What specific metrics are being used? 2. What value is the company getting from using this data? 3. What other metrics would you suggest they look at? 4. Are there any ethical concerns with what data they are using or how they are using it? The article: Why Fashion Stores Shouldn't Join Amazon's Data Behemoth Providing Amazon with more customer data will only make the e-commerce giant an even stronger opponent. Instead,...
Read the "Creating a Methodology" and then answer one (1) of the questions 1. What can...
Read the "Creating a Methodology" and then answer one (1) of the questions 1. What can you determine about the corporate culture from the fact that they waited this long to consider the development of an EPM system? 2. Can a PMO accelerate the implementation process? 3. Is it acceptable for the PMO to report to the chief information officer or to someone else? 4. Why is it best to have six or less life-cycle phases in an EPM system?...
Confidence Interval 1 All of the questions with the header "Confidence Interval 1" are based on...
Confidence Interval 1 All of the questions with the header "Confidence Interval 1" are based on the data in this problem. A researcher at the Annenberg School of Communication is interested in studying the use of smartphones among young adults. She wants to know the average amount of time that college students in the United States hold a smartphone in their hand each day. The researcher obtains data for one day from a random sample of 25 college students (who...
Answer the following true & false questions: The count property can be used to determine the...
Answer the following true & false questions: The count property can be used to determine the number of elements contained in an array. True False The Navigator object is commonly used to determine which type of Web browser is running. True False Since a browser window never displays more than one document object at one time, you can shorten references to objects contained within a document by omitting the word window from the object path. True False The setInterval( )...
Answer the following questions regarding the common measures that can be used to assess the viability...
Answer the following questions regarding the common measures that can be used to assess the viability or feasibility of business opportunities. 4.1. Identify and explain four (4) security and risk measures you may consider or analyse to assess the financial and legal viability or feasibility of business opportunities in the international business context. 4.2. What are the characteristics of a good business opportunity? Identify and explain five (5) in your own 10-50 words each.
Answer the following questions: 1) In what ways can you show the probability distribution of a...
Answer the following questions: 1) In what ways can you show the probability distribution of a situation? 2) What does E(X) calculate? Can you rely on this value always? 3) How can we determine whether or a not a situation represents a uniform distribution? 4) How can we tell whether or a not situation is considered "fair game"? Provide an example within your explaination. 5) Provide an example of a situation (that has not be been mentioned) that illustrates binomial...
This is the full extent of the infomation given. Answer the questions. The Starbucks Corporation is...
This is the full extent of the infomation given. Answer the questions. The Starbucks Corporation is serving up Internet connectivity, along with its coffee to its customers in all 3,000 of its North American outlets. This connectivity comes in the form of high-speed wireless LAN access. Prior to the implementation of this strategy, Starbucks conducted 80% of its business in the morning hours. By introducing access to this technology, Starbucks intends to drive more customer traffic into the Starbucks coffee...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT