What is the maximum overhead in a byte stuffing algorithm

Assignment Help Computer Networking
Reference no: EM131373683

Computer Networks Assignment

Labs:

Submit your lab 1- Python Program for IPv4 Parsing
Submit your lab 2- Python Program for discrete fourier transforms

1. Compute the Fourier Coefficients for the function f(t)=t (0≤t≤1). (Note: This question appears to be missing quite a lot of relevant information - I've deliberately left it as is, because well - this is the standard book on Computer Networks after all).

2. TV channels are 6MHz wide. How many bits/sec can be sent if we use 4 level digital signals? (Assume a noiseless channel)

3. If a binary signal is sent over a 3kHz channel whose signal to noise ratio is 20dB (a factor of 100) what is the maximum achievable data rate?

4. An upper-layer packet is split into 10 frames each of which has an 80% change of arriving undamaged. If no error control is done by the data link protocol how many times must the message be sent on average to get the entire thing through?

5. What is the maximum overhead in a byte stuffing algorithm?

(i.e. the slightly crazy ones)

6. Imagine you are working on an online interactive product. Assuming you do not want any frame delay due to network latency, and that it takes 10 millisecond to process any input received. Also assume also that any signal sent will travel at 2x108 m/s. How close must your data centre be for this to be achievable at 30frames per second? How about 60? Consider only the time it takes for the signal to bounce back and forth, we aren't worried about controller input lag or screen display lag. What big city is farthest from Peterborough that could host this data centres in either case?

7. Suppose you are trying to optimize a massive video streaming service (youtube, Netflix, that sort of thing), with 1 billion users (exactly 1 billion). Assume that your average customer has 78 ms of latency (that's a real number I calculated using some Verizon data). Using https://support.google.com/youtube/answer/1722171?hl=en calculate how much data is stuck in transit for 1080p and 2160p video with 5.1 Audio (use 35 Mb/s for 2160p video). If you wanted to buffer enough to cover a very poor case - like north America to India (266ms) how much data do you need? Estimate bandwidth costs per user in both cases (companies like rackspace offer bandwidth pricing data, but it's up to you to research and source the data). Assume that you get the best rate available for data.

8. Write a program in python that calculates hamming codes for a 16 bit number and show how you tested this program to verify correctness.

9. The Edward Snowden leaks gave us a list of 4 products the NSA was unable to crack. One of those (trucrypt) we are going to ignore, as it's a dead project. The other 3 are OTR, TOR, and Zoho email. Each assignment will have you install and try out one of these products and see how well it works. For this assignment you should create a free Zoho account, and experiment with sending/receiving emails, files etc. Try and access the account on different devices (mobile phone, web browser, email program like thunderbird), and tell me about what works or what doesn't. Fair warning - last year when we tried this many emails simply didn't send or didn't receive, but that might be fixed. Write approximately 500 words on the process of setting up and using this service, problems you encountered and generally whether or not you think this is something the public could use.

Reference no: EM131373683

Questions Cloud

What advantage does heating water have over steam : Tell why actual motor voltage and amperage should be field measured and logged under full load conditions.
Leadership styles or behaviours in workplace situations : Describe the factors that will influence the choice of leadership styles or behaviours in workplace situations and explain why these leadership styles or behaviours are likely to have a positive or negative effect on individual and group behaviour
Explain situation where you might lack resource or knowledge : Determine how you would best cover the key roles on a disaster recovery team. Identify situations where you might lack resources or knowledge. Where would you get extra help?
How should ultraviolet germicidal lamps be handled : What horsepower motor will be required to increase the airflow of a fan to 1,000 CFM if a ¼-hp motor is required to move 800 CFM?
What is the maximum overhead in a byte stuffing algorithm : Computer Networks 4310- What is the maximum overhead in a byte stuffing algorithm? TV channels are 6MHz wide. How many bits/sec can be sent if we use 4 level digital signals?
What are the two broad types of fan designs : What is the difference in operating characteristics between centrifugal fans with forward-curved blades and centrifugal fans with backward-curved blades?
Describe including a quantification of the cost of risk : Identify the top 3-5 risks that it faces,- describe them including a quantification of the cost of risk, and suggest how the company should manage those risks.
Comment on the concept of cost and benefit analysis : Address these issues - Comment on the concept of cost / benefit analysis, Comment on the use of protocols to determine who should & shouldn't get the drug and Comment on the role played by both insurance companies & drug companies in this issue
Explain how a centrifugal fan moves air : What speed does a fan need to turn to increase its airflow from 800 CFM to 1,000 CFM if the original speed is 230 rpm?

Reviews

Write a Review

Computer Networking Questions & Answers

  Differences between versions of windows server

Develop a report on the differences between the various versions of Windows 2003 Server - Web Edition, Standard Edition, Enterprise Edition, Datacenter Edition

  Create project model for existing acme medical center wan

Create a new project model using Visio for the existing Acme Medical Center WAN. Name your new model "Team X" and replace the X with your team identifier. Begin creating your model by creating an empty scenario.

  What is a telecommunications network protocol

What is telecommunications network architecture? Select a network protocol and provide details on the steps that preceded the formal adoption of the protocol by the industry.

  Use of leased lines in a wan or lan setting

Compare and contrast the use of leased lines in a WAN or LAN setting. Then recommend what you would use if you were a CIO. Support your response with evidence or examples

  How will the servers be deployed

Worldwide Advertising, Inc. (WAI) has hired you as an IT consultant. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. How will the servers..

  1 describe haptic feedback describe its key uses and

as a software engineer you have been asked to write a paper that describes the use of current technologies with regard

  What resources are available on the internet

What resources are available on the Internet to help system administrators determine how to harden a Windows Server 2008? Windows 7 workstation? (List at least three resources in your response.)

  Determine the ip addresses of google and yahoo

Determine the IP addresses of www.google.com and www.yahoo.com. Modify hosts file to map www.google.com to yahoo's IP address and try to do google search. Remove modification to host file and repeat.

  Write an essay on data communication

Write an essay that is 4 pages long on data communication it can be on any topic as long as it is related to data communication. It should be pretty easy assignment.

  Factors for moving wireless nics into more dominant role

Explain whether this is still true today, and write down factors are moving wireless NICs into more dominant role, if any.

  What you expect the subject of standard 1.2.840.113549 to be

Where in the tree would a new Microsoft file format for a new product be placed?

  Implementing wireless technologies

it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd