Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Encoding Process
c= uG
u: binary data sequence of length 4( input)
G: Generator matrix which is 7*4
c: Codeword
Decoding Process
s= rHT
r: received data sequence of length 7 ( input) H: Parity-Check Matrix
s: Syndrome to check error-position
If some output values of the encoding and decoding multiplication is over than 1, the value should be changed into remainder on division of itself by 2. (Ex: (4 2 1 ) => (0 0 1))
s(Syndrome) detect error position. We can know the single-error-bit position in the table below.
Fig. Decoding table for Hamming code(7,4)
If s is [0 0 0] and r= [0 1 0 0 0 1 1], it supposes that there is no error and transmitted data is [0 0 1 1]. If s is [0 1 0] and r = [1 0 1 0 0 1 0], it supposes that 2th bit is corrupted, so r should be changed to [1 1 1 0 0 1 0], and transmitted data is lower 4bits, [0 0 1 0].
Q. Explain Silly window syndrome? When either sending application sends data gradually or receiving application consumes data slowly - Illustration when 1 byte sent 40 bytes
Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements a form of authentication that requires a challenge and a response. A CHAP authenticator
IGRP is a distance vector routing protocol designed by Cisco. The maximum hop count is 255, and it uses a combination of variables to verify a composite metric. IGRP has an adminis
What is uniform delivery time A uniform delivery time is required for voice, so amount of jitter in net- work is significant. This could be expressed as standard deviation of d
Higher bandwidth Fibre optic cable an support dramatically higher bandwidths than either twisted pair or coaxial cable currently data rates and bandwidth utilizatio
To stop Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? Ans) Every router builds its own
Question 1 Explain the basic communication model with its block diagram Question 2 List and explain the functions of network monitoring Question 3 Explain the get and se
Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on
What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (each device linked to all o
Determine the Types of intranet Intranets have been broadly classified into three types based on their functionality, viz., The Bulletin Board, Database Management and
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd