Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1. Illustrate out the functions of modulator and source encoder in digital communications system.

Quetsion2. By using suitable exs, make a distinction between the simplex and half duplex mode of communication.

problem3. In brief describe what is meant by physical topology of a network. Given that there are n devices in a network, what is the number of cable links required for following topologies?

(i) Mesh

(ii) Ring

(iii) Bus

(iv) Star

problem4. Determine which layer of the OSI model each of the 5 functions below is most likely to belong to. It is also possible that one or more of the functions cannot be mapped to OSI layer.  If this is the case, describe why.

i) Translating between EBCDIC to ASCII

ii) Defining the pin-outs in a connector employed to attach to a network cable

iii) Generating error correction codes for packet error correction

iv) Arbitrating between multiple nodes attached to single medium

v)  Providing an interface to visual packet monitoring program

problem5. Why is digital transmission better than analog transmission over long distance where repeaters are required in any case?  Give two merits of digital transmission over analogue transmission.

problem6. Assume that the length of a 10Base-5 cable is 2500 metres. If the speed of propagation in a thick co-axial cable is 60% of the speed of light, how long does it take for a bit to travel from the beginning to the end of the cable? Skip any propagation delay in equipment. (Speed of light = 3 x 108 m/s)

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95821

Have any Question? 


Related Questions in Computer Network & Security

1a briefly explain how an integrity check value icv may be

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors. (b) When using an ICV, explain why (i) a message might be transmitted correctly but the receiver believes t ...

Iriss smartphone beeped frowning she glanced at the screen

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh- ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Q1 the first transcontinental telephone service was

Q1. The first transcontinental telephone service was established in the 1940s. a. true b. false Q2. The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET. a. tru ...

Research paperfor this writing assignment you find a

Research Paper For this writing assignment, you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on th ...

Q1 a subnetted or hierarchical backbone can also be called

Q1. A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone Q2. A backbone network that connects many backbone networks span ...

Network and internet security assignmentproblem 1 - network

NETWORK AND INTERNET SECURITY ASSIGNMENT PROBLEM 1 - Network Access Control 1) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro