Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Consider a network with ring topology, link bandwidths of 1000 Mbps, and propagation speed 2×108m/s

(a) What would the circumference of loop require to be to exactly contain one 1500 byte packet, suppose nodes don’t introduce delay?

(b) What would the circumference of the loop require to be to contain at least one 1500 byte packet, if there was a node every 250 m, and each node introduced 32 bits of delay (bit time cost in queue)?

problem 2) Chuck, the ex-student, is given the task of building the new network link technology. Unfortunately, many of his beta-testers complain that their packets get corrupted when using his technology! He tracks out the problem down to time synchronization problems between sender and receiver on link. Perhaps you can help Chuck solve his problems by telling him little about different encoding methods:
For each of these sub-parts, identify whether encoding can have problems with:

A. Long strings of 0s

B. Long strings of 1s

C. Both long strings of 1s or long strings of 0s

D. None of the above

(a) Manchester encoding

(b) NRZ encoding

(c) NRZI encoding

(d) Sketch the digital waveform corresponding to Manchester encoded version of this sequence of 0s and 1s. Following given you the NRZ version.

1074_Nrz encoded.jpg

problem 3) For this problem, suppose that ethernet network uses Manchester encoding. Suppose that the hosts on this ethernet network don’t have synchronized clocks. Why does this permit collisions to be detected soon after they occur, without waiting for the CRC at the end of the packet?

problem 4)(a) For the ideal channel of 2.4 GHz bandwidth, what is the maximum channel capacity in bits per second?

(b) For a noisy channel of 2.4 GHz bandwidth and signal-to-noise ratio SN of 1000, what is the maximum channel capacity in bits per second?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96746

Have any Question? 


Related Questions in Computer Network & Security

Assignment services in your arearesearch dsl and cable

Assignment: Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem ser ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, ...

Module discussion questionpersonal factors such as anger

Module Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate se ...

Term paper planning an it infrastructure audit for

Term Paper: Planning an IT Infrastructure Audit for Compliance Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment. The audit planning process directly affects the quality of the o ...

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

Discussion boardprimary task response within the discussion

Discussion Board Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

Assignmentyour boss has had an intrusion or so she says on

Assignment Your boss has had an intrusion (or so she says) on his home network. She has brought in a packet capture file for you to analyze. She says: "Something has happened on my home network. I use my network for inte ...

Web and data securitybullyour company security

Web and Data Security • Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro