Difference between synchronous tdm and statistical tdm, Computer Network Security

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X4 + X3 + 1

(i) Encode the data bit sequence 00111011001 using polynomial division and give the code word.

(ii) Assume that 7th MSB in the data bit sequence above gets corrupted during transmission, show how the detection algorithm detects the error.

Question (b) What is the difference between Synchronous TDM and Statistical TDM?

(c) In respect to HDLC:

(i) State the three data transfer modes of operation.
(ii) Give the structure of generic HDLC frame.
(iii) Explain why HDLC uses 'bit stuffing'.

Question (d) With the aid of sketches, explain the difference between the following two transmission modes used with optical fibre:

(i) Graded-index Multi-mode and

(ii) Mono-mode.

Posted Date: 10/18/2013 12:58:56 AM | Location : United States

Related Discussions:- Difference between synchronous tdm and statistical tdm, Assignment Help, Ask Question on Difference between synchronous tdm and statistical tdm, Get Answer, Expert's Help, Difference between synchronous tdm and statistical tdm Discussions

Write discussion on Difference between synchronous tdm and statistical tdm
Your posts are moderated
Related Questions
Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph