Difference between synchronous tdm and statistical tdm, Computer Network Security

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X4 + X3 + 1

(i) Encode the data bit sequence 00111011001 using polynomial division and give the code word.

(ii) Assume that 7th MSB in the data bit sequence above gets corrupted during transmission, show how the detection algorithm detects the error.

Question (b) What is the difference between Synchronous TDM and Statistical TDM?

(c) In respect to HDLC:

(i) State the three data transfer modes of operation.
(ii) Give the structure of generic HDLC frame.
(iii) Explain why HDLC uses 'bit stuffing'.

Question (d) With the aid of sketches, explain the difference between the following two transmission modes used with optical fibre:

(i) Graded-index Multi-mode and

(ii) Mono-mode.

Posted Date: 10/18/2013 12:58:56 AM | Location : United States







Related Discussions:- Difference between synchronous tdm and statistical tdm, Assignment Help, Ask Question on Difference between synchronous tdm and statistical tdm, Get Answer, Expert's Help, Difference between synchronous tdm and statistical tdm Discussions

Write discussion on Difference between synchronous tdm and statistical tdm
Your posts are moderated
Related Questions
A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

Need Assignemnt help in Information security assignemnt

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat


LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

how did slavery influence life in the colonies