Difference between synchronous tdm and statistical tdm, Computer Network Security

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X4 + X3 + 1

(i) Encode the data bit sequence 00111011001 using polynomial division and give the code word.

(ii) Assume that 7th MSB in the data bit sequence above gets corrupted during transmission, show how the detection algorithm detects the error.

Question (b) What is the difference between Synchronous TDM and Statistical TDM?

(c) In respect to HDLC:

(i) State the three data transfer modes of operation.
(ii) Give the structure of generic HDLC frame.
(iii) Explain why HDLC uses 'bit stuffing'.

Question (d) With the aid of sketches, explain the difference between the following two transmission modes used with optical fibre:

(i) Graded-index Multi-mode and

(ii) Mono-mode.

Posted Date: 10/18/2013 12:58:56 AM | Location : United States

Related Discussions:- Difference between synchronous tdm and statistical tdm, Assignment Help, Ask Question on Difference between synchronous tdm and statistical tdm, Get Answer, Expert's Help, Difference between synchronous tdm and statistical tdm Discussions

Write discussion on Difference between synchronous tdm and statistical tdm
Your posts are moderated
Related Questions
Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

PARITY BIT: A parity bit is an extra bit transmitted with data item select to give the resulting bit odd or even parity. For example an even parity data packet 10100001 has p

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Question: a) Name a method to allow a person to send a confidential email to another person, without risks of a third-party reading the email. Describe briefly the operations

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc