Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1. Illustrate out the functions of modulator and source encoder in digital communications system.

Quetsion2. By using suitable exs, make a distinction between the simplex and half duplex mode of communication.

problem3. In brief describe what is meant by physical topology of a network. Given that there are n devices in a network, what is the number of cable links required for following topologies?

(i) Mesh

(ii) Ring

(iii) Bus

(iv) Star

problem4. Determine which layer of the OSI model each of the 5 functions below is most likely to belong to. It is also possible that one or more of the functions cannot be mapped to OSI layer.  If this is the case, describe why.

i) Translating between EBCDIC to ASCII

ii) Defining the pin-outs in a connector employed to attach to a network cable

iii) Generating error correction codes for packet error correction

iv) Arbitrating between multiple nodes attached to single medium

v)  Providing an interface to visual packet monitoring program

problem5. Why is digital transmission better than analog transmission over long distance where repeaters are required in any case?  Give two merits of digital transmission over analogue transmission.

problem6. Assume that the length of a 10Base-5 cable is 2500 metres. If the speed of propagation in a thick co-axial cable is 60% of the speed of light, how long does it take for a bit to travel from the beginning to the end of the cable? Skip any propagation delay in equipment. (Speed of light = 3 x 108 m/s)

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95821

Have any Question? 


Related Questions in Computer Network & Security

There are many arguments about cloud based information

There are many arguments about cloud based information services and/or offering IT as a cloud-based service. Some say cloud computing is nothing more than outsourcing IT and creating a dependency that will trap the organ ...

Benefits of cloud-based office productivity softwarebased

Benefits of Cloud-based Office Productivity Software Based on what you have learned about using cloud-based office productivity software, create a 5-slide presentation to the department head or CEO to convince him or her ...

Assignmentin this project we will design a network solution

Assignment In this project we will design a network solution that is suitable for a small business. Our business is located in an office park in one floor of a new office building. Our office has all of the modern featur ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

In order to provide for the new services at the akron ohio

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured. Create a security matrix spreadsheet and security strategy summary. Include the user rol ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

Security in wireless lans wans and telephonyactions for

Security in Wireless LANs, WANs, and Telephony Actions for 'Security in Wireless LANs, WANs, and Telephony A very challenging issue in IT industry is wireless security. Because of the specific technical principles involv ...

Assignmentinstructions1you just received a brand new

Assignment Instructions 1. You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing net ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen