Module 6 Assignments You Are Required To Complete
Module 6 Assignments for This Module You Are Required To Complete The F
For this module, you are required to complete the following assignments:
1. Chapter 10: exercises #. Does the U.S. government support the Internet? Explain.
2. Given an IP packet of size 540 bytes and a maximum packet size of 200 bytes, what are the IP Fragment Offsets and More flags for the appropriate packet fragments?
3. The Hop Limit field in IP version 6 is 8 bits long (the same size as the equivalent Time to Live field in IPv4). Since this hop count is decremented each time an IP datagram enters a router, what are the implications of such a small field size?
4. Suppose there is a small commercial retail building with essentially one room. On one side of the room is a real estate agency and on the other side is a person who sells tea. What is the relationship between this setup and the concept of IP addresses with TCP port numbers?
5. Somewhere in the middle of the United States are two Internet routers with routing tables that are all messed up. The two routers keep sending their packets back and forth to each other nonstop. Will an error message ever be generated from this action? If so, who will generate the error message and what might it look like?
Thinking Outside the Box #2: Two banks want to establish an electronic link between themselves, over which they can transmit money transfer. Can they use a virtual private network and a tunneling protocol, or is a better technique available? Defend your answer.
6. Chapter 11: exercises #.
1. The telephone line that connects your house or business to the central office (the local loop) carries your conversation and the conversation of the person to whom you are talking. What do you estimate is the bandwidth of a local loop?
2. If you play a CD for a friend over the telephone, will the friend hear high-quality music? If not, why not?
3. If you place a telephone call and it leaves your LATA and enters another LATA, what kind of telephone call have you placed? What kind of telephone company handles this telephone call?
4. For each of the following scenarios, state whether a telephone line or a trunk should be used:
- a. The connection from your home to the local telephone company
- b. The connection between a large company’s PBX and the telephone company
- c. The connection between two central offices
5. Many within the telephone industry feel we will eventually run out of area codes and telephone numbers. How many different area codes are currently available? What would you suggest to increase the number of telephone numbers?
6. State whether each of the following was a result of the Modified Final Judgment of 1984, the Telecommunications Act of 1996, or neither:
- a. The FCC was created to watch over interstate telephone systems
- b. AT&T had to sell off its local telephone companies
- c. The LATA was created
- d. Cable television companies could provide local telephone service
- e. Customers could choose between different long-distance telephone providers
- f. AT&T split off its technology division, which became Lucent
Thinking Outside the Box #2: You are consulting for a hospital that wants to send three-dimensional, high-resolution, color ultrasound images between the main hospital and an outpatient clinic. A patient will be receiving the ultrasound at the clinic, while a doctor at the main hospital observes the images in real time and talks to the ultrasound technician and patient via a telephone connection. What type of telecommunication service presented in this chapter might support this application? Identify the telecommunications service, and be sure to list the particular details concerning the service. Explain your reasoning.
Paper For Above instruction
The internet serves as a vital infrastructure supporting various sectors of society and the economy. Its support and implementation are subject to government policies and technological standards. In the United States, the government has generally supported the growth and development of the internet, recognizing its importance for economic growth, national security, and innovation. This support manifests through policies that promote open access, technological advancement, and security initiatives, although debates about regulation and net neutrality continue to shape this support framework.
Packet fragmentation is essential for transmitting data across networks with differing maximum transmission units (MTUs). Given a 540-byte IP packet and a maximum packet size of 200 bytes, fragmentation involves breaking the original packet into smaller fragments. The IP header includes flags such as the "More Fragments" bit and the fragment offset field, which indicate whether more fragments follow and the position of each fragment within the original packet. For this scenario, the packet would be divided into three fragments: two of 200 bytes each, and a final fragment of 140 bytes. The fragment offsets would be calculated based on byte positions—starting at 0 for the first fragment, 200 for the second, and 400 for the third—using 8-byte units. The "More Fragments" flag would be set for the first two fragments and cleared for the last.
The Hop Limit in IPv6, set at 8 bits, allows for 256 possible hop counts. While this may seem sufficient for small or well-controlled networks, it presents limitations in larger, global networks where datagrams may traverse many routers. The small size can lead to rapid expiration of packets before reaching their destination if not managed properly. Conversely, it necessitates careful route planning and possibly shorter hop limits to prevent premature discarding, impacting network reliability and performance.
The analogy of a single-room retail building with a real estate agency on one side and a tea seller on the other illustrates the relationship between IP addresses and TCP port numbers. The building’s address corresponds to the IP address, identifying the location on the network. Inside, different rooms or booths—represented by port numbers—indicate separate services or applications. Just as the real estate agency and tea seller are distinguished by different booths, network services are distinguished by port numbers, allowing multiple services to operate on the same IP address without interference.
Routers that continually send packets back and forth indicate a routing loop, which can cause network congestion and inefficiency. Usually, error messages such as ICMP Time Exceeded messages are generated when a packet's TTL or hop limit reaches zero, indicating to the sender that the packet could not reach its destination. In this case, the routers involved would generate such an error message, signaling a routing loop. The message typically includes information about the expired packet, helping administrators diagnose routing issues.
In establishing secure communication between banks, Virtual Private Networks (VPNs) with tunneling protocols like IPsec or SSL/TLS are commonly used. These protocols create encrypted "tunnels" over public networks, ensuring secure transfer of sensitive data such as financial transactions. While other techniques like dedicated leased lines offer higher security levels, VPNs provide cost-effective, flexible, and scalable solutions suitable for bank-to-bank communication, especially with proper security measures in place.
The bandwidth of a typical local loop—used to connect homes or businesses to the telephone network—is generally estimated between 56 kbps and 1 Mbps, depending on the technology (e.g., traditional copper wire or DSL variants). This bandwidth suffices for voice communication and basic internet access but is limited compared to modern broadband standards, constraining the quality of large data transfers or high-definition streaming.
Sending a CD over a conventional telephone line results in low audio quality due to the limited bandwidth and the nature of voice-frequency transmission, which is optimized for speech rather than high-fidelity music. The compression and bandwidth constraints lead to significant loss of audio detail, making it unsuitable for listening to high-quality music, which requires broader frequency response and higher data rates.
Placing a call that leaves your Local Access and Transport Area (LATA) involves an interLATA call, which is typically handled by interexchange carriers or long-distance service providers. These providers coordinate transmission between local exchange carriers, enabling long-distance communication across different geographic regions. Such calls often incur higher charges and require additional routing and billing arrangements.
The connection from your home to the local telephone company uses a standard telephone line—analog or digital—while the connection between a large company’s Private Branch Exchange (PBX) and the telephone company often employs trunk lines. Connecting two central offices, which are major switching points, requires trunk lines designed to handle high-capacity data transfer, usually Digital Trunk Lines capable of supporting multiple simultaneous calls.
Given the finite number of area codes (approximately 1,000 in the North American Numbering Plan), the industry faces potential exhaustion without intervention. To expand the capacity, strategies such as overlay area codes—adding new area codes to existing geographic regions—number pooling, and transitioning to 10-digit dialing are recommended. These measures help increase the available number space without disrupting existing services.
The Modified Final Judgment of 1984 primarily dealt with the breakup of AT&T’s Bell System monopoly, leading to the divestiture of local exchange carriers. The Telecommunications Act of 1996 aimed to deregulate the industry further by fostering competition, allowing new entrants into local and long-distance markets. Some measures, such as the creation of the FCC to oversee interstate telecommunications and the establishment of LATAs, resulted from these regulatory changes, while others are distinct or unrelated developments.
In supporting high-resolution, real-time ultrasound imaging between a hospital and outpatient clinic, a telecommunications service such as a dedicated high-bandwidth, low-latency Wide Area Network (WAN) using fiber optic connections or an advanced leased line could be employed. These services ensure the rapid, reliable transmission of large image files and facilitate real-time interaction between medical professionals and patients, enabling telemedicine applications with minimal delay and high data integrity.