Question

a. Find the checksum of this UDP packet: Source Port #: 1111111111111110 Destination Port#: 0000000000000010 Length...

a. Find the checksum of this UDP packet:

Source Port #: 1111111111111110
Destination Port#: 0000000000000010

Length # : 0000000000001100
Data: 00000000000000100000000000010000

b. When the receiving host receives this packet, how would it check the checksum? What value would it need to compute in order to assume that the packet has no bit errors?

Homework Answers

Answer #1

Answer A)-

  • firstly add source and destination port—  1111111111111110 + 1111111111111110
  • 0000000000000001

now, use the wraparound

  • 0000000000000001 + 0000000000001100 + 0000000000000010 + 0000000000010000 ⇒
  • ⇒ 0000000000011111

using 1's complement = 1111111111100000

checksum= 1111111111100000

Answer 2)-

  • It determines to append the every 16bit integers in the packet with the checksum and it also required for the computer single 16bit respected 1's in state to expect the packet has no bit errors.

Note- Please do upvote, if any problem then comment in box sure I will help.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Assume that a source sends a message containing 8 packets to the destination and there are...
Assume that a source sends a message containing 8 packets to the destination and there are 4 routers on the path. Assume the bandwidth of each link is 200 Mbps, and the size of each packet is 16 Kb. Assume the length of each link is 20 kilometers, and the propagation speed is 2 x 108 meters per second. Assume each router begins retransmitting a packet after it has finished receiving the packet and processed it for 4 microseconds (dproc...
1.       In modern packet- switched networks, including the Internet, the source host segments long, application- layer messages...
1.       In modern packet- switched networks, including the Internet, the source host segments long, application- layer messages (for example, an image or a music file) into smaller packets and sends the packets into the network. The receiver then reassembles the packets back into the original message. We refer to this process as message segmentation. Figure 1.27 illustrates the end- to- end transport of a message with and without message segmentation. Consider a message that is 8 · 106 bits long that is...
Host A and B are communicating over a TCP connection, and Host B has already received...
Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment...
P27. Host A and B are communicating over a TCP connection, and Host B has already...
P27. Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B backto-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a...
Hosts A and B are communicating over a TCP connection, and Host B has already received...
Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment...
R.1 Suppose the network layer provides the following service. The network layer in the source host...
R.1 Suppose the network layer provides the following service. The network layer in the source host accepsts a segment maximum size 1,200 bytes and guarantees to deliver the segment to the transport layer at the destination host. Suppose many network application processes can be running at the destination host. A. Design the simplest possible transport-layer protocol that will get application data to the desired process at the destination host. Assume the operation system in the destination host has assigned a...
A data transmission technology uses CRC of eight bit to detect errors in packet headers with...
A data transmission technology uses CRC of eight bit to detect errors in packet headers with generator polynomial is g(x)= X8+X2+X+1. The header contains the following fields in order for left to right: GFC, 4 bits; VPI, 8 bits; VCI, 16 bits; Type, 3 bits; CLP, 2 bits; CRC, 8 bits. (a) Find the last 8 bits of the header if the GFC, VPI, Type, and CLP fields are all zero and the VCI field is 00000000 00010111. (b) Under...
Hello, I am having difficulties understand the way we should find phyiscal addresses. Specify the addressing...
Hello, I am having difficulties understand the way we should find phyiscal addresses. Specify the addressing mode and compute the physical address of the data (to be written into or to be read from the memory) in each of the following instructions. Assume (CS) = 0B50 H, (DS) = 0AA0 H, (SI) = 0220 H, (DI) = 0100 H, (BX) = 0500 H a) MOV BH, 22H b) MOV [SI], BX This is an example. The first one is immediate...
1.1) A convex lens has focal length 50cm. An object is 60cm from the lens. Compute...
1.1) A convex lens has focal length 50cm. An object is 60cm from the lens. Compute the location of the image. (a) 0.003cm (b) 27cm (c) −27cm (d) −300cm (e) 300cm 1.2) As part of an hon- ors project, a student wishes to construct a series of lenses with different focal lengths. Not having glass grinding equipment, the student makes a series of lenses by partially filling cylindrical con- tainers with water (n = 4/3). For the container to the...
Objectives: ⦁   Declare and initialize null-terminated string ⦁   Apply indirect address ⦁   Write loop ⦁   Apply...
Objectives: ⦁   Declare and initialize null-terminated string ⦁   Apply indirect address ⦁   Write loop ⦁   Apply Irvine.inc library functions to display a string Problem Description: Write a program with a loop and indirect address that copies a string from source to target. Revising the character order in the process. Use the following variables: source BYTE “This is the string that will be reversed”, 0 target BYTE SIZEOF source DUP(‘#’) You may refer to the Programming Exercise #7 on Page 138...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT