Calculate the minimum required signal strength, Computer Network Security

Assignment Help:

Question 1:

(a) (i) Radio waves are subject to several propagation problems. Name any three of them.

(ii) A Wi-Fi receiver requires a signal power of 50mW to operate correctly. Calculate the minimum required signal strength of the transmitter if the receiver is placed at a distance of 40 meters from the transmitter.

(b) Consider the arrangement of self-learning bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges W, X, Y and Z after the following transmissions:

Host A sends to Host C,
Host D sends to Host B,
Host C sends to Host A and
Host E sends to Host D.

100_Calculate the minimum required signal strength.png

(c) Give an example of a transmitted hexadecimal byte-stream in Basic Encoding Rules (BER) by using the following data type declarations and its corresponding instances:

name ::= OCTET STRING {name, "JOHN SMITH"}
active ::= BOOLEAN [0=NO, 1=YES] {inactive, 0}
number ::= INTEGER {number, 5}

(d) One method for fault tolerant servers to provide redundancy is by implementing RAID5.

(i) Explain the term redundancy.
(ii) By means of a diagram, show how data is written to four hard disks of 1TB configured as RAID5.

(iii) What is the total available space for use of the RAID5 implementation described above?

 


Related Discussions:- Calculate the minimum required signal strength

Address resolution with message exchange, ADDRESS RESOLUTION WITH MESSAGE E...

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

Compare the suitability and properties of isdn and adsl, Question : An a...

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

What is the benefit of adopting a password aging policy, QUESTION (a) H...

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

Application-based ids, Application-Based IDS Application-based IDS (AppI...

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

Compare and contrast the trust models-pgp, a. PKI and PGP are two methods f...

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

Security services, (a) Mention the five main security services. (b) What...

(a) Mention the five main security services. (b) What is a passive attack? Give an example of passive attack? (c) What four types of active attacks and mention their respecti

What is network virtual terminal, Network Virtual Terminal It is a set...

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Describe what the term session hijacking means, An overall rise in mobility...

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

Udp datagram format, UDP DATAGRAM FORMAT: It is given in the figure be...

UDP DATAGRAM FORMAT: It is given in the figure below:

Calculate the minimum required signal strength, Question 1: (a) (i) Ra...

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd