Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1)a) Describe in detail the ISO-OSI reference model with neat diagram.

b) Describe the reasons for congestion with neat diagram.

c) A large slotted ALOHA system generates 50 requests/sec which includes both originals & retransmissions. A time-slot is 40 msec. Find the

(i) Chance of success in first attempt.

(ii) Probability of success after 5 collisions.

problem 2)a) Find the relationship between m & r. Compute the number of r bits required to correct a given number of data bits m with respect to Hamming code. The code word received is 10011100101. Identify errors if any. Describe a method to detect errors. If any correct it.

b) Compare OSI & TCP reference model with respect to computer networks.

c) Determine the length of 3-byte token for a 16 Mbps token ring LAN. The speed of propagation is 2/3 of velocity of light.

problem 3) Classify routing algorithms in the network layer. Describe with the ex Dijkstra’s algorithm with neat diagram.

b) prepare a note on Ethernets with neat sketches.

c) Twenty four voice signals are to be multiplexed & transmitted over twisted pair. What is the bandwidth required for FDM. Assuming a bandwidth efficiency of 1bit/sec per Hz, what is the bandwidth required for TDM using PCM with neat diagrams.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96334

Have any Question? 


Related Questions in Computer Network & Security

Network troubleshooting knowledgebasecreate knowledgebase

Network Troubleshooting Knowledgebase Create knowledgebase documentation/article(s) covering the topics below. These would be documents that you could store in a department knowledgebase that would provide a quick refere ...

Network routing and switching assignment- instructionsyou

Network Routing and Switching Assignment- Instructions You must do this assignment individually, that is, on your own. Type all your answers in the Template for Your Answers Section of this document and upload only that ...

Describe the role and purpose of the router firewall dmz

Describe the role and purpose of the router, firewall, DMZ, IDPS, and honeypot within a network - include a specific focus on how each helps protect the network from being hacked from both inside and outside the network. ...

Goals1 to understand the challenges of protocol design2 to

Goals: 1. To understand the challenges of protocol design. 2. To discover and appreciate the challenges of developing complex, real-world network applications. 3. Make sense of real-world sockets programming APIs. 4. To ...

What are some of the major strategies and risks behind

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world? Make sure you include the following: 1. Include a summary paragraph/abstract at the beginni ...

Context this assignment involves preparation of a report

Context This assignment involves PREPARATION OF A REPORT. The report relates to the Scenario given below. Aim: You have been asked to present a proposal for an Internet/Intranet solution for a college. The college is esp ...

Task - provide short answers to the following six

Task - Provide short answers to the following six questions: Question 1: Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type. Question 2: Explain why th ...

Pcap challenge 1 objectivethe objective of this lab is

PCAP Challenge 1 Objective The objective of this lab is simple (although some of the questions will prove quite challenging), all you need to do is use the pcap file provided and investigate what transpired between 2 or ...

Discussionvalue please respond to the followingbullassess

Discussion "Value" Please respond to the following: • Assess BCP as a process that adds business value. Give your opinion on whether or not the argument that states BCP adds value is a credible argument. Explain why or w ...

You will be given an ip address block 183200100024 your

You will be given an IP address block 183.200.100.0/24. Your task is to devise a feasible network addressing scheme for a large company with a number of geographically distributed offices around the country. There are fi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate