QUES 1. A router has the following CIDR entries in the routing table:
For each of the following IP addresses, what does the router do if a packet with that address arrives?
g entirely with bytes is much simpler than working with individual bits.
Using the first 22 bits of it as the network address, we have 188.8.131.52. the bit pattern of 184.108.40.206 is 10000111.00101110.00111111.00001010 at this point when we perform the bit and operation with a 22 leading bit the 1s and 10 bit 0s, this the same and similar of making the ultimate or the last zero. We accept the subsequent network address bit pattern: 10000111.00101110.00111100.00000000. At this period, the first two bytes are not changed. However, the 3rd type shifts from 63 to 60 while the 4th bytes convert zero. Match with the network address in the routing table. The 2nd-row matches. The router will transmit the packet to interface 1.
Using the first 22 bits of the above IP address as a network address, we have 220.127.116.11. This matches the network address of the first row. The packet will be forwarded to interface 0.
Using the first 22 of the above-given IP address as the network address, we have 18.104.22.168. This does not match the network address of the first given three…
SECTION A: ARDUINO BOARD
Fig 1. Arduino Uno board
1. ATMEGA328P MICROCONTROLLER
FUNCTION: ATMEGA328P is a microcontroller from the AVR family; it is an 8-bit device, which means that its data-bus architecture and internal registers are designed to handle 8 parallel data signals.
It has 3 types of memory:
• FLASH MEMORY: It is used for storing application, which explains why you don’t need to upload your application every time you unplug Arduino from its power source.
• SRAM MEMORY: Storing…
1. (5 points) Compare and contrast the three types of addresses used in a network.
Application layer – A port is assigned to an application for direct routing of incoming and or outgoing data.
Network layer – IP addresses are assigned to each individual computer. The IP addresses can change and are often assigned by the DHCP server.
Data link layer – Mac Addresses are used to identify which hardware is the sender and which is the receiver. All hardware items have a MAC address. For example:…
The primary goal of this lab was to establish a base network in RLES that will be built on in future labs. We worked with new PFSense, a routing interface with which I was unfamiliar. I learned how to configure internal and external interfaces with PFSense, and was able to modify the rest of the necessary settings via the Web GUI. We learned how to configure RHEL, and also got to experiment with setting up a Wiki. Finally, we had a chance to configure and work with a monitoring…
This protocol is classified into rounds; every round composed of two phases;
(1) Advertisement Phase
(2) Cluster Set-up Phase
(1) Schedule Creation
(2) Data Transmission
A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs.…
At this point, WIFI technology is very inexpensive, and found in many homes across the world. Although its original purpose, and the first one everyone thinks of, is its utility in connecting computers wirelessly to the internet, it also works quite well to network computers, allowing the computers in a home to share files, internet access, and printers. The ability to share a printer over a network is extremely helpful. Rather than having to maintain multiple printers, (which will work less…
ABC Accounting, Inc. is a quickly growing company looking to upgrade its current network. The company has grown from 5 to 200 employees in the past year and a half. The company is expected to grow to 350 employees in one year. ABC Accounting, Inc. will add more offices in the current building, which will span three floors. To accommodate their growth ABC Accounting is seeking the necessary solution to build an affordable, expandable, and secure network. This proposal will provide a…
RAID level 5 works with any number of disk equal or greater than 3 and places a parity sum on one disks in the set to be able to recover from a disk failure. (Striped blocks with distributed parity.) The parity calculations are done in a RAID 5 set using XOR.
We assume a small RAID 5 set of four disks and some data is written to it. On the first three disks we have the binary information 1010, 1100 and 0011, here representing some data, and now calculate the parity information for the…
It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols.
samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map. The number of QAM states in the array must be 2N, where N is the number of bits per…
Communication is key, regardless of where you work. Communication can be between people or a computer communicating data to a person. When obtaining data from a computer, people want to be able to trust the data that they are receiving and that none of the packets got lost somewhere along the way. Packets are units of data that are routed between an origin and a destination on the Internet. Networks use Ethernet cables, called Category (more commonly referred to as CAT)…