Ask Question, Ask an Expert


Ask Computer Network & Security Expert

Q1. In a digital system, 8-input links are multiplexed by using STDM. Each of the input sources is making 1024 bits per second. Each frame comprises of 8 bits from each source and adds 1 bit as a framing bit. find out the number of frame transmitted per second and the data capacity of the link.

Q2. find out the CRC for a 10-bit sequence 1010011110 and a divisor of 1011.

Q3. Describe what is B8ZS encoding? Draw the time versus amplitude graphs for the stream 100100000010001 by using the B8ZS Bipolar encoding scheme.

Q4. Communication line capable of transmitting at a rate of 50 Kbps will be employed to accommodate 10 sessions each producing Poisson traffic at a rate 150 packets/minute. The packet lengths are exponentially distributed with mean 1000 bits. For each session determine the average number of packets in the queue, average number of packets in the system and average delay per packet if line is allocated to the sessions by using the 10 equal-capacity time-division multiplexed channels.

Q5. Distinguish between Go-Back-n and Selective-Reject protocols. Illustrate the sequence numbers for 20 packets in which they are transmitted by using Selective-Reject, if packet 5 is damaged and acknowledgement for packet 12 is lost. Suppose that the sliding window size is 7 and acknowledge for ever packet is sent.

Q6. Provide the header format of ATM Cell. As well describe the semantics of each field in the header.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M910398

Have any Question? 

Related Questions in Computer Network & Security

Current security event researchselect a company that has

Current Security Event Research Select a company that has been in the news in the past two years that has had a significant security breach. Develop a 2- to 3-page paper covering the following: • Identify the event and t ...

Goals1 to understand the challenges of protocol design2 to

Goals: 1. To understand the challenges of protocol design. 2. To discover and appreciate the challenges of developing complex, real-world network applications. 3. Make sense of real-world sockets programming APIs. 4. To ...

Questionin this module we have a couple of learning

Question: In this module we have a couple of learning objectives. We want to understand better the role of the IT manager in the strategic management process as well as the skills needed to manage expectations for IT str ...

Assignment a complete home networkdevelop an entire home

Assignment: A Complete Home Network Develop an entire home network with a budget of $5,000.00. Your configuration must assume the purchase of associated hardware for access to both wireless and wired connections and a br ...

Yummy good treats has a number of traveling salespeople who

Yummy Good Treats has a number of traveling salespeople who cover territories throughout the Midwest. These employees use laptops with wireless Internet connections and mobile phones to communicate with the home office. ...

Instructionsexplain your argument in a brief and precise

Instructions Explain your argument in a brief and precise way. Give your answers in the order in which the questions are given below. Problem 1. We consider the alphabet A= {0,1,2,3,4} and the space of messages consists ...

Program one - multithreaded joke server and

Program One - Multithreaded Joke Server and Client Overview: In this assignment you will build a pair of multi-threaded servers that accept input from multiple clients, and return appropriate output. In addition to the b ...

Network analysis reportassignment- a coversheet with your

Network Analysis report Assignment - A coversheet with your name and student id must be included. - All references should be appropriately cited using the Harvard style - Submit your report as one PDF file - Save your fi ...

Network assignmentoverviewyou will provide a detailed

Network Assignment Overview You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria: • Each Classroom Computer Lab will be on a separate n ...

The following ciphertext has been obtained by vigenere

The following ciphertext has been obtained by Vigenere encryption. ocwyikoooniwugpmxwktzdwgtssayjzwyemdlbnqaaavsuwdvbrflauplooubfgq hgcscmgzlatoedcsdeidpbhtmuovpiekifpimfnoamvlpqfxejsmxmpgkccaykwfz pyuavtelwhrhmwkbbvgtgu ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate