Part-11 suppose the information content of a packet is the

Assignment Help Computer Networking
Reference no: EM13372964

Part-1

1 Suppose the information content of a packet is the bit pattern 1111 1011 1001 1100 and an even parity scheme is being used. What would the value of the field containing the parity bits be for the case of a two-dimensional parity scheme? Your answer should be such that a minimum-length checksum field is used.

2 Refer to the Cyclic Redundancy Check (CRC) codes discussed in the textbook and follow the conventions used in the textbook. Consider the 5-bit generator, G=10011, and suppose that D has the value 1010101010. What is the value of R? Show the process how you obtain the solution.

3 Consider two nodes A and B uses the slotted ALOHA protocol to contend for a channel. Suppose node pAand pBare A and B's retransmission probabilities. Provide a formula for node A's average throughput. What is the total efficiency of the protocol with these two nodes?

4 A disadvantage of the content of approach for LANs, such as CSMA/CD, is the capacity wasted due to multiple stations attempting to access the channel at the same time. Suppose that time is divided into discrete slots, with each of N stations attempting to transmit with probability p during each slot. What fraction of slots is wasted due to multiple simultaneous transmission attempts?

5 In CSMA/CD, after the 5th collision, what is the probability that a node chooses k=5? The result k=5 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?

6 Why is an ARP query sent within a broadcast frame? Why is an ARP response sent within a frame with a specific destination MAC address?

7 Why the Ethernet is called a multiple access protocol? Why it is referred to as an unreliable and connectionless approach?

Part-2

1 What are the services that can be provided using IEEE 802.11?

2 What are the differences between the infrastructure mode and the ad-hoc mode in wireless networks?

3 Why are acknowledgements used in 802.11 but not in a wired Ethernet?

4 Suppose the IEEE 802.11 RTS and CTS frames were as long as the standard DATA and ACK frames. Would there be any advantages to using the CTS and RTS frames? Why or why not?

5 What is the difference between a permanent address and a care-of address? Who assigns a care-of address?

6 The following picture is a copy of a Figure in the textbook. It shows a CDMA example that supports two senders. Suppose that the receiver wanted to receive the data being sent by sender 2. Show (by calculation) that the receiver is indeed able to recover sender 2's data from the aggregate channel signal by using sender 2's code.

Sender 2

Sender 1

Part 3.

Please finish questions 1 - 12 listed in file "TCP.rar". 

Download:- TCP.rar

Reference no: EM13372964

Questions Cloud

Bratland j 2010 capital concepts as insights into the : bratland j. 2010 capital concepts as insights into the maintenance and neglect of infrastructure independent review 15
You must work alone to complete this quiz do not share : you must work alone to complete this quiz. do not share answers or ideas with other students. write your answers
Identifying potential malicious attacks threats and : identifying potential malicious attacks threats and vulnerabilitiesyou have just been hired as an information security
Case study bring your own device byodread the following : case study bring your own device byodread the following articles the dark side of byod from techrepublic and byod as we
Part-11 suppose the information content of a packet is the : part-11 suppose the information content of a packet is the bit pattern 1111 1011 1001 1100 and an even parity scheme is
Write a report on telehealth which addresses the : write a report on telehealth which addresses the followingbullintroductionbullbackgroundoverview - provide some
Case studysaint-foods limited ltd is a brittany-based snack : case studysaint-foods limited ltd is a brittany-based snack foods producer that is currently undergoing a major
4-5a hogan thrift shop payroll register for period ending : 4-5a hogan thrift shop payroll register for period ending december 18 20 marital statusno. of wh allow. deductions
Hoyt rented office space two years ago to harris receiving : hoyt rented office space two years ago to harris receiving the first and last months rent plus anbspsecurity deposit of

Reviews

Write a Review

Computer Networking Questions & Answers

  The purpose of this project is to provide you with an

the purpose of this project is to provide you with an opportunity to create a document retention policy. you will also

  Provide network design-transferring of videos and music file

Provide a network design, a drawing of a solution to address the following: Transferring of videos and music files between computers, Sharing Internet connection, one laser printer, and one photo printer

  Distinguish between any web pages or web servers

Suppose the role of IT consultant to new nonprofit organization, Free Flu, which gives flu shots to elderly. Distinguish between any Web pages or Web servers you would use for this task.

  Show rewsult of inserting these keys using double hashing

Show the result of inserting these keys using linear probing, using quadratic probing with c1 = 1and c2 = 3, and by using double hashing with h2(k) = 1 + (k mod (m-1)).

  Derive general expression for width of bit propagation speed

Derive a general expression for the width of a bit in terms of the propagation speed s, the transmission rate R, and the length of the link m.

  Question 1aname five significant activities involved in a

question 1aname five significant activities involved in a digital forensic investigation.bwhy is computer forensic

  Explain http and conditional get message syntax

The specification of HTTP is covered in RFC 2616, which is available by one of the methods you've already used this semester.

  Tools and processes for scanning vulnerabilities

Write down the tools and processes for scanning and removing possible vulnerabilities?

  Identify the source port number

Identify the source port number and identify the destination port number and what is the length of the data?

  Explain how to troubleshoot a network

You have been hired to aid troubleshoot a network. Users in this customer site have being experiencing intermittent problems.

  Explain why it is recommended to secure windows

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows.

  Technology to internetwork the two buildings

Suppose you are working for a small business that has outgrown its existing building. What technology will you recommend to internetwork the two buildings?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd