Ask Question, Ask an Expert


Ask Computer Network & Security Expert

Answer the follwoing problems.

problem 1) Compare propagation delay in sending an x-bit message over k-hop circuit switched network and in a lightly loaded packet switched network. Circuit setup time is i seconds, propagation delay is d seconds per hop, packet size is p bits and the data rate is b bps. Under what circumstances does the packet switched network have the lower delay?

problem 2) Measurements of slotted Aloha channel with the infinite number of users demonstrate that 10 percent of the slots are idle. Determine the channel load, G? find out the throughput S? Is the channel underloaded or overloaded?

problem 3) Two CSMA/CD stations are each trying to transmit long (multi-frame) files. After each frame is sent, they contend for the channel using binary exponential backoff algorithm. Determine the probability that contention ends on round k, and what is the mean number of rounds per contention period?

problem 4) Ethernet frames should be at least 64 bytes long to make sure than the transmitter is still going in the event of a collision at the far end of the cable. Fast Ethernet (100 Mb/s) has the same 64 byte minimum frame size, but can get the bits out ten times faster. How is it possible to maintain same frame size?

problem 5) A university computer science department has 3 Ethernet segments, connected by two transparent bridges into the linear network. One day the network administrator quits and is speedily replaced by someone from computer center, which is the IBM token ring shop. The new administrator, noticing that the ends of the network are not connected, quickly orders a new transparent bridge and connects both loose ends to it, making a closed ring. What happens next. Describe your answer.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96673

Have any Question? 

Related Questions in Computer Network & Security

Network routing and switching assignment- instructionsyou

Network Routing and Switching Assignment- Instructions You must do this assignment individually, that is, on your own. Type all your answers in the Template for Your Answers Section of this document and upload only that ...

Current security event researchselect a company that has

Current Security Event Research Select a company that has been in the news in the past two years that has had a significant security breach. Develop a 2- to 3-page paper covering the following: • Identify the event and t ...

Management is pleased with the progress that has been made

Management is pleased with the progress that has been made and likes the steps you have taken to set up a secured network environment. During the last status meeting, it was asked, has everything been done that is possib ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

Corporate profile cybersecurity risk profilefor this paper

Corporate Profile: Cybersecurity Risk Profile For this paper, you will construct a cybersecurityrisk profile for the company that you wrote about in Part 1 of the Corporate Profile project. Your risk profile, which inclu ...

Assignment a complete home networkdevelop an entire home

Assignment: A Complete Home Network Develop an entire home network with a budget of $5,000.00. Your configuration must assume the purchase of associated hardware for access to both wireless and wired connections and a br ...

Security networkplease write short essay answers discussing

Security Network Please write short essay answers discussing the following "questions: 1. Give an (example of why data encryption is needed and when you would use encryption. 2. Name three data elements examples that wou ...

Performance architecture papercontinuing with a company you

Performance Architecture Paper Continuing with a company you selected in Week Two, evaluate network management components on a global scale. Write a 2- to 3-page paper that evaluates and discusses the following: • Impact ...

Task sheettask scenarioan information security management

Task Sheet TASK SCENARIO: An information security management system (ISMS) represents a systematic approach to designing, implementing, maintaining, and auditing an organization's information system security objectives. ...

1overviewthe learning objective of this assignment is for

1 Overview The learning objective of this assignment is for students to get familiar with the concepts in the security techniques such as symmetric and asymmetric encryption, hashing and certificates in Public Key Infras ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate