Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment

Directions:

Formulate complete responses to the following fourteen questions. You may craft your response after each question and let the document grow as you respond. The questions have been highlighted to help delineate the questions from the responses. The questions cover topics that are discussed in Weeks 1 through 3.

1. What are the three characteristics of sine waves that can be manipulated to represent data?

The three sine waves characteristics that can be manipulated are;

• Amplitude-which is the measure of the wave power or height and is basically the maximum distance from a wave peak to its zero value. It occurs to remain the same if it is measured from the zero value to the positive peak or from the zero value to the negative peak.

• Phase-it refers to a certain time point within a wave's cycle. It is usually measured in degrees, whereby 00 represents the start of the cycle, whereas 3600 represents the end. The positive point peak is represented by 900 and the zero point within the positive and negative peak is considered to be 1800 and the negative peak point is 2700.

• Frequency-it is the term used in reference to the number of cycles that can be observed within one second and its unit of measure is hertz (HZ).

2. Why are waves important in communication?

Waves are of great essence in communication in that:

• Waves do propagate or in other words travel not only through space but also wires, as well as, fibers.
• Most importantly, patterns can possibly be encoded within waves.

3. Describe some options regarding light transmission in communication technology.

Wireless transmission through the use of light frequencies can take place within infrared, visible, or even ultraviolet light spectra. Theoretically, the raw transmission rates can happen to be relatively higher as compared to RF transmission as a result of the higher transmission frequency, as well as, available bandwidth. However, practically, atmospheric interference tends to create big barriers by rapidly attenuating light signals. Infrared transmissions turn out to be limited to just a few dozen meters, whereas laser transmissions within the visible spectrum happen to be restricted to several hundred meters. Another barrier to massive use is the need of a line of sight that is not obstructed.

4. What are the two main synchronization problems that can occur during message transmission?

The two major synchronization problems that can potentially emerge during message transmission include:

• Keeping the sender together with the receiver clocks synchronized in the course of transmission.
• Synchronization of the start of every message.

5. List two characteristics in which error detection and correction methods vary.

• Size, as well as, content of redundant transmission.
• The likelihood that the error free message will possible be detected as an error.

6. List and describe four physical topologies.

• Bus- the nodes are networked within a linear sequence that is terminated at both ends.

• Mesh-it connects each node to all other nodes and it is practically applicable for the considerably small networks only.

• Ring-The network takes the form of a ring, whereby tokens or packets move to the succeeding node within the ring. Just a single node has the packet at every given moment.

• Star-Refers to the network whereby all nodes are linked to a central point. It is disadvantageous in that all nodes get the same signal, increasing the chances of collisions together with security concerns.

7. What was ARPANET?

ARPANET refers to the network which turned out to be the foundation for the Internet. It was based on an idea initially published within 1967 and was developed under the U.S ARPA (Advanced Research Projects Agency). ARPANET capitalized on the concept of sending information within small bits termed as packets, which could be directed to diverse paths and redesigned at their destination. Further development of ARPANET led to the invention of the present-day Internet.

8. Describe the application layer of the TCP/IP model.

9. Describe the network interface layer in the TCP/IP model.

10. What are the call management functions that VoIP must perform?

11. Why were fourth-generation languages developed?

12. What does a programming language define?

13. List two capabilities of a symbolic debugger.

14. What are factors have caused Java's popularity to far exceed most initial expectations?

15. List three components that an integrated development environment generally includes.

16. Why has changed as a result of hardware cost declining over time as a proportion of total system costs?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92716533

Have any Question?


Related Questions in Computer Network & Security

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

True or false1 tcp ensures error free transmission2 the

TRUE or FALSE 1. TCP ensures error free transmission. 2. The process that initiates the communication is the server. 3. A host can serve as both server and client in a P2P network. 4. Audio and video applications cannot ...

Part auniversity of neverland offers more than 300

Part A University of Neverland offers more than 300 undergraduate programs. The Bachelor of Dreams is one of the highly regarded program offered by the University. The University tries to improve all its programs by intr ...

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Below are the supply and demand schedules for fresh coffee

Below are the supply and demand schedules for fresh coffee in Vancouver: Price ($/cup) Quantity Demanded  (cups/day) Quantity Supplied (cups/day) 1 440 330 2 415 360 3 390 390 4 365 420 5 340 450 6 315 480 7 290 510 a. W ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As