Calculate the minimum required signal strength, Computer Network Security

Assignment Help:

Question 1:

(a) (i) Radio waves are subject to several propagation problems. Name any three of them.

(ii) A Wi-Fi receiver requires a signal power of 50mW to operate correctly. Calculate the minimum required signal strength of the transmitter if the receiver is placed at a distance of 40 meters from the transmitter.

(b) Consider the arrangement of self-learning bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges W, X, Y and Z after the following transmissions:

Host A sends to Host C,
Host D sends to Host B,
Host C sends to Host A and
Host E sends to Host D.

100_Calculate the minimum required signal strength.png

(c) Give an example of a transmitted hexadecimal byte-stream in Basic Encoding Rules (BER) by using the following data type declarations and its corresponding instances:

name ::= OCTET STRING {name, "JOHN SMITH"}
active ::= BOOLEAN [0=NO, 1=YES] {inactive, 0}
number ::= INTEGER {number, 5}

(d) One method for fault tolerant servers to provide redundancy is by implementing RAID5.

(i) Explain the term redundancy.
(ii) By means of a diagram, show how data is written to four hard disks of 1TB configured as RAID5.

(iii) What is the total available space for use of the RAID5 implementation described above?

 


Related Discussions:- Calculate the minimum required signal strength

Explain how ftp works, QUESTION (a) FTP is a protocol used for the de...

QUESTION (a) FTP is a protocol used for the delivery of files across networks. Explain how FTP works (support your answer with a diagram). (b) How does TCP perform the gi

Explain the operation of the matchmaker middle agent, Question 1: (a) E...

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

Computer Security, I have an assignment of Computer Security to submit. Wil...

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

What standards are to be applied, Government funding has been given to a un...

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Define bridges, Bridges perform both in the data link layers and physical...

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

Base lining-information security, Base lining •    Organizations do not ...

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Address masks, ADDRESS MASKS To identify receiver, network apply addre...

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Hardware, Hardware, Software, and Network Asset Identification What info...

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd