Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Consider a network with ring topology, link bandwidths of 1000 Mbps, and propagation speed 2×108m/s

(a) What would the circumference of loop require to be to exactly contain one 1500 byte packet, suppose nodes don’t introduce delay?

(b) What would the circumference of the loop require to be to contain at least one 1500 byte packet, if there was a node every 250 m, and each node introduced 32 bits of delay (bit time cost in queue)?

problem 2) Chuck, the ex-student, is given the task of building the new network link technology. Unfortunately, many of his beta-testers complain that their packets get corrupted when using his technology! He tracks out the problem down to time synchronization problems between sender and receiver on link. Perhaps you can help Chuck solve his problems by telling him little about different encoding methods:
For each of these sub-parts, identify whether encoding can have problems with:

A. Long strings of 0s

B. Long strings of 1s

C. Both long strings of 1s or long strings of 0s

D. None of the above

(a) Manchester encoding

(b) NRZ encoding

(c) NRZI encoding

(d) Sketch the digital waveform corresponding to Manchester encoded version of this sequence of 0s and 1s. Following given you the NRZ version.

1074_Nrz encoded.jpg

problem 3) For this problem, suppose that ethernet network uses Manchester encoding. Suppose that the hosts on this ethernet network don’t have synchronized clocks. Why does this permit collisions to be detected soon after they occur, without waiting for the CRC at the end of the packet?

problem 4)(a) For the ideal channel of 2.4 GHz bandwidth, what is the maximum channel capacity in bits per second?

(b) For a noisy channel of 2.4 GHz bandwidth and signal-to-noise ratio SN of 1000, what is the maximum channel capacity in bits per second?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96746

Have any Question? 


Related Questions in Computer Network & Security

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

Benefits of cloud-based office productivity softwarebased

Benefits of Cloud-based Office Productivity Software Based on what you have learned about using cloud-based office productivity software, create a 5-slide presentation to the department head or CEO to convince him or her ...

Perimeter securitythe project deliverables are as

Perimeter Security The project deliverables are as follows: • Update the Information Network Security Architecture Design document title page with a new date and project name. • Update your previously completed sections ...

Services in your arearesearch dsl and cable modem services

Services in your area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem services. Resea ...

Scenario additional detailshealth care hq has a

Scenario: Additional Details Health Care HQ has a client-server network architecture. The chief information officer (CIO) wants to understand the difference between a client-server and a peer-to-peer network. She also wa ...

Short papercompare and contrast cat 6 unshielded twisted

Short Paper Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

What special function does a cache server perform why does

What special function does a cache server perform? Why does this function have value for larger organizations? How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers ...

Assignmentthe vice president of sales for your company has

Assignment The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites. He tells you that the Sales team is often remote and needs to be able to stay connecte ...

Global asset inc gaiglobal asset inc gai is a financial

GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GAI specializes in financial ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro