What is the peak data rate out of the router in one second

Assignment Help Computer Network Security
Reference no: EM13969260

1. What does a beacon frame do? Explain.

2. What are the differences between a master device in Bluetooth, and a base station in 802.11?

3. Download RFC 5944 (https://www.rfc-editor.org/), and answer the following questions:

a. What organization did the editor of RFC 5944 work for?

b. How is that organization different from the authors of many Internet protocol RFCs, such as TCP, IP, UDP, etc.?

c. Also from that RFC, what is a "co-located care-of address"?

d. If you're using such a thing, who performs decapsulation of the datagrams?

e. How long does an extension have to be before the Long Extension Format is used?

4. Research two advanced (i.e. new, expensive) cell phones from different brands. You may need to download user manuals or find other technical documentation. For each, describe:

a. The make and model of the phone

b. What frequency band it uses

c. What type of phone standards it uses (GSM, IS-95, CDMA, etc.). [Don't tell me it uses AAC or 802.11g - those aren't phone standards!]

d. If the encoding wasn't described in the lecture, describe it briefly (what other protocols is it based on, where is it used, etc.)

e. Cite the sources used

5. When is an anchor MSC used in a GSM network?

6. What are the differences between infrastructure and ad hoc modes in 802.11?

7. Why are acknowledgments used in 802.11 but not in wired Ethernet?

8. The phone protocols UMTS and CDMA-2000 are based on what earlier standards?

9. Suppose two cell phones are in a foreign network with a foreign agent. Is it possible for both of them to have the same care-of-address in mobile IP? Explain your answer.

10. Of what does a basic service set consist?

11. Describe the hidden terminal problem in your own words.

12. Describe how and why a chipping rate is used.

13. What is the difference between CSMA and CDMA? Describe in what contexts are they used, and briefly how each works.

14. Ethernet can stop transmitting in mid-frame, while 802.11 always transmits a full frame. Why is this difference needed?

15. What are the three main functions of media players?

16. Estimate the jitter for a web site on the other side of the world.

a. Find a university really far away (Indonesia, New Zealand, South Africa, etc.). Identify the university you used.

b. Run five ‘ping' commands, and record the four RTT estimates from each command. You should have a total of 20 RTT values.

c. Enter them in Excel, and calculate their standard deviation ( =STDEV(cell range) where cell rangeis for example A1:A20).

d. Identify the site you used, show the RTT data, and give the standard deviation with correct units.

e. Describe the type of local link used (wired or wireless) and level of Internet service used (DSL, Cable, FIOS, Drexel, etc.)

f. Did you expect more or less jitter? Why?

17. Figure 7.9 (p. 620) shows an interleaved stream from an original stream of 16 characters. If the original stream was "Quieter turtles." (Notice the space and period are also characters), how would the interleaved stream read?

18. From the book Animal Farm, a famous quote is "All animals are equal, but some animals are more equal than others." Which of the packet scheduling mechanisms we looked at (FIFO, etc.) is most like this quote? Justify your answer.

19. One of the encoding methods used in the SIP discussion is μ-law (mu-law) PCM (pulse code modulation). What sampling rate and number of bits per channel are used in mu-law PCM? Where in the world is it used? Cite sources used.

20. What connection is there between the compression protocol H.264 and MPEG?

21. How does Skype choose which transport protocol to use?

22. How do changes in the sequence number in RTP differ from those in TCP?

23. Suppose in an RTP session, there are three microphones plus two video cameras (which presumably also have mics). How many SSRCs are used for this session? How could your answer change, depending on the compression protocols used for audio and video?

24. Suppose a router's queue holds 4 Mbit of data, and 12 kbit packets arrive at the router at a rate of 250 packets per second. Be sure to include correct units for each answer.

a) What is the peak data rate out of the router in one second?

b) What is the long term average data rate out of the router?

c) What is the maximum burst size?

Verified Expert

The solution aims to defines that computer Network is one of the main subjects of I.T. stream. It is a set of computers connected together for the purpose of sharing resources. Such connected computers are called nodes. In computer networks, these nodes are allowed to communicate or exchange data with the help of network links, i.e. Data Connection. This connection is usually established using cables or wireless media.

Reference no: EM13969260

Questions Cloud

Develop a paper that will analyze role of project pricing : Develop a paper that will analyze the role of project pricing and estimating for your selected project. Include in your analysis the pricing process, labor distribution, pricing out work, and the low bidder dilemma
What affect does this have on the gross profit and goods : What affect does this have on the gross profit and goods available for sale in the 2014 income statement; in dollars understated or overstated. What affect does this have on net income and retained earnings in dollars understated or overstated for 20..
Research and analyze the public relation strategies : Working individually, you are required to research and analyze the public relation strategies of a select non-profit entity or organization. You will write a brief, but insightful report demonstrating your understanding of their strengths, weaknes..
Compute the break-even point : A Company sells two products, J and K. The sales mix is 4 units of J and 3 units of K. The contribution margins per unit are $ 40 for J and $ 20 for K. Fixed costs are $ 6,16,000 per month. Compute the break-even point.
What is the peak data rate out of the router in one second : What is the peak data rate out of the router in one second - what is the long term average data rate out of the router?
The employer and the friend created an agency relationship : The employer and the friend created an Agency Relationship. To establish consent, the principal (owner) must ask the agent (their friend) to do something in which they agree to do so. Principals are held accountable for their agent's actions because ..
Major decisions to improve future profitability : Explain how High Sierra uses the 80/20 rule, along with its budgeting process, to make major decisions to improve future profitability. Be sure to include the types of decisions a company might make based on budgets.a
Determine the quadratic function that represents the arch : Determine the quadratic function that represents the arch if the vertex of the parabola is at the origin. Determine the quadratic function that represents the arch if the origin is at the lower left end of the arch.
Variable manufacturing and selling costs per : It anticipates fixed manufacturing costs of $200,500 and fixed general and administrative expenses of $80,000 for the year. Variable manufacturing and selling costs per set of head covers will be $8 and $12, respectively. Each set will sell for $3..

Reviews

Write a Review

Computer Network Security Questions & Answers

  How do nist criteria for selection of des and aes

How do NIST criteria for selection of DES and AES relate to Shanon's original standards of a good cryptographic system? What are the significant differences? How do these standards reflect a changed environment many years after Shannon wrote his s..

  Computer communications are typically classified as either

computer communications are typically classified as either client-server or peer-to-peer. identify a distributed

  What kind of malicious attack

In this assignment, you will research and select one well-known virus or a malicious code attack. Then, write a one-page essay explaining the following questions

  The main stream discussion of cybersecurity journals

Cyberwarfare has been in the main stream discussion of cybersecurity journals and conference proceedings for a few years. The Stuxnet attack in the cyberspace has taken many of politicians and security professionals into much deeper concerns of th..

  The message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted

the message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted using a shift transformation c equiv p k mod 26. use

  How must one-s privacy be legally protected or secured

What does privacy mean to you? Is privacy a right or a privilege? How should one's privacy be legally protected or secured, especially when using the Internet?

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Find one example of password protocols in microsoft product

Find one example of password protocols in Microsoft product and discuss its security or insecurity with your colleagues. If possible, install one of the available cracking tools to see whether you could crack this system and share your experience ..

  Analyze the security of the system compriosing the size of

alice has a picture-based password system where she has each user pick a set of their 20 favorite pictures say of cats

  Sample issue-specific security policy for an organization

Using the framework, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are creating the policy and then complete the policy using the framework

  Importance of reading changed from earlier eras

What does literature offer an individual How has the importance of reading changed from earlier eras (pre-digital/audio/visual media) to our present day?

  Overview of information security fundamentals

This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software and its countermeasures, operating system security and software ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd