Submission guidelines: • Deadline for submission on Moodle is by 5pm Friday 9 October 2020. • You must submit a word document that provides answers to the questions given below. Your answers must be...

1 answer below »
Submission guidelines: • Deadline for submission on Moodle is by 5pm Friday 9 October 2020. • You must submit a word document that provides answers to the questions given below. Your answers must be concise and brief. • You can use online material present on the Internet in relevant research articles/books, however, you have to cite them in proper APA format or Harvard format. • Remember not to copy/paste anything directly from above mentioned resources, you should provide answer to the questions in your own words. • Avoid any sort of plagiarism (Do not copy anything from your class fellows). Your similarity index should not be more than 20%. • This tutorial carries 7.5% weightage. • All questions do not carry equal marks. Question 1: Adam, sitting in his small home office in Sydney, Australia, wants to access the Facebook’s Web Server residing in United States of America (USA). Suppose that there are 30 internetworking devices between Adam and the Facebook Web Server. Answer the following questions considering the above scenario. (8 marks) a) Which application layer protocol will be used to find the IP address of the Facebook’s Web Server? Which destination port number will be used for this query? (1+ 1 = 2 marks) b) Which application layer protocol will be used to get the content of the Facebook’s Web Server on Adam’s browser assuming secured communication between Adam and the server? Also write the destination port number used for this query. (1 + 1 = 2 marks) c) Which transport layer protocol will be used in this case? Explain your answer (2 marks) d) If Time To Live (TTL) value is 18 in the IP header initiated by the Adam’s machine, what will happen in this case? What will the internetworking device do in this case? (2 marks) Question 2: Briefly explain the Flow Control mechanism in Transmission Control Protocol (TCP). (3 marks) BISY2002 Information Systems Networking Essentials Question 3: What is IP fragmentation? Why is it needed? Write the names of header fields used to find whether an IP packet is fragmented or not. (1 +2 +1 = 4 marks)
Answered Same DayOct 07, 2021BISY2002

Answer To: Submission guidelines: • Deadline for submission on Moodle is by 5pm Friday 9 October 2020. • You...

Amit answered on Oct 08 2021
138 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 10/8/2020
Table of Contents

1.    Answer -1    3
a)    3
b)    3
c)    3
d)    3
2.    Answer - 2    3
3.    Answer - 3    4
4.    References:    6
1. Answer -1
a)
Mr. Adam can make use of DNS (Domain name system) for finding the required IP address of the Facebook server. The naming system of this protocol will provide the corresponding IP address of Facebook server. The port number 53 can be used as the destination port for the same purpose.
b)
The telnet protocol will be used for developing the secured communication among facebook server and Mr. Adam's browser. The port number 23 can be used as the destination port for the same purpose.
c)
The TCP protocol of the transport layer will be used for developing the secured communication among facebook server and Mr. Adam. The reliable services provided by TCP allows me to make this recommendation.
d)
The total created hops before discarding any passed packet are mainly represented by TTL. As it is provided that 18 TTL value is maintained so, 18 hops will be created in this case. As the provided case shows that there are 30 internetworking devices, so, these devices will help in creating these hops.
2. Answer - 2 ...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here