Difference between synchronous tdm and statistical tdm, Computer Network Security

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X4 + X3 + 1

(i) Encode the data bit sequence 00111011001 using polynomial division and give the code word.

(ii) Assume that 7th MSB in the data bit sequence above gets corrupted during transmission, show how the detection algorithm detects the error.

Question (b) What is the difference between Synchronous TDM and Statistical TDM?

(c) In respect to HDLC:

(i) State the three data transfer modes of operation.
(ii) Give the structure of generic HDLC frame.
(iii) Explain why HDLC uses 'bit stuffing'.

Question (d) With the aid of sketches, explain the difference between the following two transmission modes used with optical fibre:

(i) Graded-index Multi-mode and

(ii) Mono-mode.

Posted Date: 10/18/2013 12:58:56 AM | Location : United States







Related Discussions:- Difference between synchronous tdm and statistical tdm, Assignment Help, Ask Question on Difference between synchronous tdm and statistical tdm, Get Answer, Expert's Help, Difference between synchronous tdm and statistical tdm Discussions

Write discussion on Difference between synchronous tdm and statistical tdm
Your posts are moderated
Related Questions
Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur