Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Investigate and discuss the external memory storage trends.


Write an assembly program using MARIE's assembly Instruction set that prompts

the user to enter a non-negative integer that is less than 10. The program should

include a subroutine that keeps prompting until a valid value is obtained. When a

valid number is entered, it will be displayed. (Hint: Use JNS & JUMPI instructions

to implement the subroutine)

N.B: You should include the MARIE code in your Answer, with an

explanation of each instruction in your code beside it (not a screenshot!)


Task 2:

You are a network engineer and asked to connect 5 departments such as Language,

science, humanities, English and Math in a reputed school. How will you connect those

departments to exchange smooth flow of information between them? List out the

networking tools and protocols required to establish the connectivity between them.

Analyze and write a report by analyzing and describing the network requirement for the

above and demonstrate switch and router configuration.



  • Trace the attached program showing the contents of the effected 16 bit register after each instruction is executed.


MOV AX, 05ABH

MOV  AL, 34H

ADD  AH, A5H

MOV  BX, 0000H

MOV  BL, AH

MOV  BH, AL


Despite being adjacent in a protocol stack, Data Link Layer protocols and Network Layer protocols each employ a number of similar fields in their headers (i.e. a field named 'X' appears in the headers of both layers, and the role of 'X' is similar for both layers).


For each of these three fields:

a. describe its typical role, and

b. provide an example to demonstrate why their 'duplication' does not introduce unnecessary redundancy.



Consider the delivery of messages in an internetworked environment in which the source and destination nodes are many hops apart. Communication between distant nodes passes through a series of routers, and there may be multiple pathways between any source and destination. Large messages must be fragmented and reassembled using one of two possible strategies:


a. the first strategy involves fragmenting each message at the source node, and then reassembling them at the destination node.

b. the second strategy involves fragmenting each message at the source node, reassembling and re-fragmenting them at intermediate routers, and final reassembly at the destination node.

c. For each strategy, describe the fields of a Network Layer header necessary to support the strategy.

d. With reference to two distinct examples, describe circumstances where each of the strategies would be preferred over the other.




View captured traffic in Wireshark

View wireless and wired NIC information

Determine the MAC address of a Host

Suppose that you have a computer with a memory unit of 24 bits per word. In this computer, the assembly program’s instruction set consists of 198 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. a. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. How many additional instructions could be added to this instruction set without exceeding the assigned number of bits? Discuss and show your calculations. d. What is the largest unsigned binary number that the address can hold?


LATEST TUTORIALS
APPROVED BY CLIENTS