Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1)a) Describe in detail the ISO-OSI reference model with neat diagram.

b) Describe the reasons for congestion with neat diagram.

c) A large slotted ALOHA system generates 50 requests/sec which includes both originals & retransmissions. A time-slot is 40 msec. Find the

(i) Chance of success in first attempt.

(ii) Probability of success after 5 collisions.

problem 2)a) Find the relationship between m & r. Compute the number of r bits required to correct a given number of data bits m with respect to Hamming code. The code word received is 10011100101. Identify errors if any. Describe a method to detect errors. If any correct it.

b) Compare OSI & TCP reference model with respect to computer networks.

c) Determine the length of 3-byte token for a 16 Mbps token ring LAN. The speed of propagation is 2/3 of velocity of light.

problem 3) Classify routing algorithms in the network layer. Describe with the ex Dijkstra’s algorithm with neat diagram.

b) prepare a note on Ethernets with neat sketches.

c) Twenty four voice signals are to be multiplexed & transmitted over twisted pair. What is the bandwidth required for FDM. Assuming a bandwidth efficiency of 1bit/sec per Hz, what is the bandwidth required for TDM using PCM with neat diagrams.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96334

Have any Question? 


Related Questions in Computer Network & Security

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

Security management assessmentimplementing basic security

Security Management Assessment Implementing basic security management is an important task for system administrators, as security is important to today's organizations. IT specialists are on the front lines of protecting ...

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

Global asset inc gaiglobal asset inc gai is a financial

GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GAI specializes in financial ...

Dqfacebook email electronic commerce and collaborative

DQ Facebook, email, electronic commerce, and collaborative sites for both work and leisure are a normal part of our everyday computing activities. Personal information entered on these websites become partially owned by ...

Why do networking components need more examination from an

Why do networking components need more examination from an InfoSec perspective than from a systems development perspective? What value would an automated asset inventory system have for the risk identification process? W ...

Assignment windows network servicesproposalovervieweach

Assignment: Windows Network ServicesProposal Overview Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at lea ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

What special function does a cache server perform why does

What special function does a cache server perform? Why does this function have value for larger organizations? How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers ...

Assignmentwan technologies paper research point-to-point

Assignment WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies as ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen