Difference between synchronous tdm and statistical tdm, Computer Network Security

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X4 + X3 + 1

(i) Encode the data bit sequence 00111011001 using polynomial division and give the code word.

(ii) Assume that 7th MSB in the data bit sequence above gets corrupted during transmission, show how the detection algorithm detects the error.

Question (b) What is the difference between Synchronous TDM and Statistical TDM?

(c) In respect to HDLC:

(i) State the three data transfer modes of operation.
(ii) Give the structure of generic HDLC frame.
(iii) Explain why HDLC uses 'bit stuffing'.

Question (d) With the aid of sketches, explain the difference between the following two transmission modes used with optical fibre:

(i) Graded-index Multi-mode and

(ii) Mono-mode.

Posted Date: 10/18/2013 12:58:56 AM | Location : United States







Related Discussions:- Difference between synchronous tdm and statistical tdm, Assignment Help, Ask Question on Difference between synchronous tdm and statistical tdm, Get Answer, Expert's Help, Difference between synchronous tdm and statistical tdm Discussions

Write discussion on Difference between synchronous tdm and statistical tdm
Your posts are moderated
Related Questions
Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th


Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems