Calculate the dynamic range of the 16-bit scanner, Computer Network Security

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the library contains 8192 books and that each book contains 256 pages. Each page covers 6 inches by 6 inches and will be represented at a resolution of 72 dots per inch (dpi) vertically and horizontally. Each "dot" will contain 16 bits of information and no data compression will be used. We assume that 1,000 users access the library simultaneously and that they request a new page every minute. The bandwidth of the channel connecting the library to the outside world is 100MHz, and has a capacity that is limited by Gaussian noise.

1781_Calculate the dynamic range of the 16-bit scanner.png

(a) How many gigabytes of data are required on the storage disks?

(b) What data rate is required to connect the library to the Internet?

(c) What is the minimum signal to noise ratio that could possibly be tolerated on the channel? Express the signal to noise ratio as both a linear ratio and in dB.

(d) After analyzing the link, it was found that it has a bit error rate (BER) of 10-9. What packet size is required to ensure that the packet error rate (PER) is less than 10-5?

(e) Calculate the dynamic range of the 16-bit scanner.

Posted Date: 11/14/2013 4:45:53 AM | Location : United States







Related Discussions:- Calculate the dynamic range of the 16-bit scanner, Assignment Help, Ask Question on Calculate the dynamic range of the 16-bit scanner, Get Answer, Expert's Help, Calculate the dynamic range of the 16-bit scanner Discussions

Write discussion on Calculate the dynamic range of the 16-bit scanner
Your posts are moderated
Related Questions
QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres