Question

a. Find the checksum of this UDP packet: Source Port #: 1111111111111110 Destination Port#: 0000000000000010 Length...

a. Find the checksum of this UDP packet:

Source Port #: 1111111111111110
Destination Port#: 0000000000000010

Length # : 0000000000001100
Data: 00000000000000100000000000010000

b. When the receiving host receives this packet, how would it check the checksum? What value would it need to compute in order to assume that the packet has no bit errors?

Homework Answers

Answer #1

Answer A)-

  • firstly add source and destination port—  1111111111111110 + 1111111111111110
  • 0000000000000001

now, use the wraparound

  • 0000000000000001 + 0000000000001100 + 0000000000000010 + 0000000000010000 ⇒
  • ⇒ 0000000000011111

using 1's complement = 1111111111100000

checksum= 1111111111100000

Answer 2)-

  • It determines to append the every 16bit integers in the packet with the checksum and it also required for the computer single 16bit respected 1's in state to expect the packet has no bit errors.

Note- Please do upvote, if any problem then comment in box sure I will help.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Host A and B are communicating over a TCP connection, and Host B has already received...
Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment...
Hosts A and B are communicating over a TCP connection, and Host B has already received...
Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment...
R.1 Suppose the network layer provides the following service. The network layer in the source host...
R.1 Suppose the network layer provides the following service. The network layer in the source host accepsts a segment maximum size 1,200 bytes and guarantees to deliver the segment to the transport layer at the destination host. Suppose many network application processes can be running at the destination host. A. Design the simplest possible transport-layer protocol that will get application data to the desired process at the destination host. Assume the operation system in the destination host has assigned a...
A data transmission technology uses CRC of eight bit to detect errors in packet headers with...
A data transmission technology uses CRC of eight bit to detect errors in packet headers with generator polynomial is g(x)= X8+X2+X+1. The header contains the following fields in order for left to right: GFC, 4 bits; VPI, 8 bits; VCI, 16 bits; Type, 3 bits; CLP, 2 bits; CRC, 8 bits. (a) Find the last 8 bits of the header if the GFC, VPI, Type, and CLP fields are all zero and the VCI field is 00000000 00010111. (b) Under...
1.1) A convex lens has focal length 50cm. An object is 60cm from the lens. Compute...
1.1) A convex lens has focal length 50cm. An object is 60cm from the lens. Compute the location of the image. (a) 0.003cm (b) 27cm (c) −27cm (d) −300cm (e) 300cm 1.2) As part of an hon- ors project, a student wishes to construct a series of lenses with different focal lengths. Not having glass grinding equipment, the student makes a series of lenses by partially filling cylindrical con- tainers with water (n = 4/3). For the container to the...
1. Please use only the C as the language of programming. 2. Please submit/upload on Canvas,...
1. Please use only the C as the language of programming. 2. Please submit/upload on Canvas, the following les for each of your programs: (1) the client and the server source les each (2) the client and the serve executable les each (3) a brief Readme le that shows the usage of the program. 3. Please appropriately comment your program and name all the identiers suitable, to enable enhanced readability of the code. Problems 1. Write an ftp client that...
A recent penetration test revealed several issues with a public-facing website used by customers. The testers...
A recent penetration test revealed several issues with a public-facing website used by customers. The testers were able to: Enter long lines of code and special characters Crash the system Gain unauthorized access to the internal application server Map the internal network The development team has stated they will need to rewrite a significant portion of the code used, and it will take more than a year to deliver the finished product. Which of the following would be the BEST...
1. In the past, the average guest check at a local restaurant was $19.35 After the...
1. In the past, the average guest check at a local restaurant was $19.35 After the menu has been redesigned, a random sample of 20 guest checks was taken, the sample mean was $17.85 with the sample standard deviation of $3.88. Assume that the guest check amounts are approximately normally distributed. Is this enough evidence to believe that the average guest check has decreased? Use A. )A=0.10 Hypotheses: B.)Test Statistic: C.)Analyze data (assuming H0 is true): D.)State a Conclusion: 2....
2) Allowing (or requiring) users to use numerical digits (including 0) and one of 28 “special...
2) Allowing (or requiring) users to use numerical digits (including 0) and one of 28 “special characters” dramatically increases the number of possible passwords. Furthermore, passwords often are case-sensitive, effectively doubling the size of the alphabet by defining 52 distinct letter characters.    Assuming that passwords are case-sensitive and can include numerical digits and special characters, how many possible 6, 8 and 10 character passwords can be created? (8 points) 3) Allowing digits and special characters creates an enormous number...
1) Find the sample size necessary to estimate the mean IQ score of statistics students such...
1) Find the sample size necessary to estimate the mean IQ score of statistics students such that it can be said with 95​% confidence that the sample mean is ±7 IQ points of the true mean. Assume that the standard deviation is 19 and determine the required sample size. 2) There are many reasons adults use credit cards. A recent survey found that 47​% of adults used credit cards for convenience. a. To conduct a​ follow-up study that would provide...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT