Question

a. Find the checksum of this UDP packet: Source Port #: 1111111111111110 Destination Port#: 0000000000000010 Length...

a. Find the checksum of this UDP packet:

Source Port #: 1111111111111110
Destination Port#: 0000000000000010

Length # : 0000000000001100
Data: 00000000000000100000000000010000

b. When the receiving host receives this packet, how would it check the checksum? What value would it need to compute in order to assume that the packet has no bit errors?

Homework Answers

Answer #1

Answer A)-

  • firstly add source and destination port—  1111111111111110 + 1111111111111110
  • 0000000000000001

now, use the wraparound

  • 0000000000000001 + 0000000000001100 + 0000000000000010 + 0000000000010000 ⇒
  • ⇒ 0000000000011111

using 1's complement = 1111111111100000

checksum= 1111111111100000

Answer 2)-

  • It determines to append the every 16bit integers in the packet with the checksum and it also required for the computer single 16bit respected 1's in state to expect the packet has no bit errors.

Note- Please do upvote, if any problem then comment in box sure I will help.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Assume that a source sends a message containing 8 packets to the destination and there are...
Assume that a source sends a message containing 8 packets to the destination and there are 4 routers on the path. Assume the bandwidth of each link is 200 Mbps, and the size of each packet is 16 Kb. Assume the length of each link is 20 kilometers, and the propagation speed is 2 x 108 meters per second. Assume each router begins retransmitting a packet after it has finished receiving the packet and processed it for 4 microseconds (dproc...
1.       In modern packet- switched networks, including the Internet, the source host segments long, application- layer messages...
1.       In modern packet- switched networks, including the Internet, the source host segments long, application- layer messages (for example, an image or a music file) into smaller packets and sends the packets into the network. The receiver then reassembles the packets back into the original message. We refer to this process as message segmentation. Figure 1.27 illustrates the end- to- end transport of a message with and without message segmentation. Consider a message that is 8 · 106 bits long that is...
Host A and B are communicating over a TCP connection, and Host B has already received...
Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment...
Hosts A and B are communicating over a TCP connection, and Host B has already received...
Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment...
R.1 Suppose the network layer provides the following service. The network layer in the source host...
R.1 Suppose the network layer provides the following service. The network layer in the source host accepsts a segment maximum size 1,200 bytes and guarantees to deliver the segment to the transport layer at the destination host. Suppose many network application processes can be running at the destination host. A. Design the simplest possible transport-layer protocol that will get application data to the desired process at the destination host. Assume the operation system in the destination host has assigned a...
A data transmission technology uses CRC of eight bit to detect errors in packet headers with...
A data transmission technology uses CRC of eight bit to detect errors in packet headers with generator polynomial is g(x)= X8+X2+X+1. The header contains the following fields in order for left to right: GFC, 4 bits; VPI, 8 bits; VCI, 16 bits; Type, 3 bits; CLP, 2 bits; CRC, 8 bits. (a) Find the last 8 bits of the header if the GFC, VPI, Type, and CLP fields are all zero and the VCI field is 00000000 00010111. (b) Under...
1.1) A convex lens has focal length 50cm. An object is 60cm from the lens. Compute...
1.1) A convex lens has focal length 50cm. An object is 60cm from the lens. Compute the location of the image. (a) 0.003cm (b) 27cm (c) −27cm (d) −300cm (e) 300cm 1.2) As part of an hon- ors project, a student wishes to construct a series of lenses with different focal lengths. Not having glass grinding equipment, the student makes a series of lenses by partially filling cylindrical con- tainers with water (n = 4/3). For the container to the...
Objectives: ⦁   Declare and initialize null-terminated string ⦁   Apply indirect address ⦁   Write loop ⦁   Apply...
Objectives: ⦁   Declare and initialize null-terminated string ⦁   Apply indirect address ⦁   Write loop ⦁   Apply Irvine.inc library functions to display a string Problem Description: Write a program with a loop and indirect address that copies a string from source to target. Revising the character order in the process. Use the following variables: source BYTE “This is the string that will be reversed”, 0 target BYTE SIZEOF source DUP(‘#’) You may refer to the Programming Exercise #7 on Page 138...
1. Please use only the C as the language of programming. 2. Please submit/upload on Canvas,...
1. Please use only the C as the language of programming. 2. Please submit/upload on Canvas, the following les for each of your programs: (1) the client and the server source les each (2) the client and the serve executable les each (3) a brief Readme le that shows the usage of the program. 3. Please appropriately comment your program and name all the identiers suitable, to enable enhanced readability of the code. Problems 1. Write an ftp client that...
A recent penetration test revealed several issues with a public-facing website used by customers. The testers...
A recent penetration test revealed several issues with a public-facing website used by customers. The testers were able to: Enter long lines of code and special characters Crash the system Gain unauthorized access to the internal application server Map the internal network The development team has stated they will need to rewrite a significant portion of the code used, and it will take more than a year to deliver the finished product. Which of the following would be the BEST...