Calculate the minimum required signal strength, Computer Network Security

Assignment Help:

Question 1:

(a) (i) Radio waves are subject to several propagation problems. Name any three of them.

(ii) A Wi-Fi receiver requires a signal power of 50mW to operate correctly. Calculate the minimum required signal strength of the transmitter if the receiver is placed at a distance of 40 meters from the transmitter.

(b) Consider the arrangement of self-learning bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges W, X, Y and Z after the following transmissions:

Host A sends to Host C,
Host D sends to Host B,
Host C sends to Host A and
Host E sends to Host D.

100_Calculate the minimum required signal strength.png

(c) Give an example of a transmitted hexadecimal byte-stream in Basic Encoding Rules (BER) by using the following data type declarations and its corresponding instances:

name ::= OCTET STRING {name, "JOHN SMITH"}
active ::= BOOLEAN [0=NO, 1=YES] {inactive, 0}
number ::= INTEGER {number, 5}

(d) One method for fault tolerant servers to provide redundancy is by implementing RAID5.

(i) Explain the term redundancy.
(ii) By means of a diagram, show how data is written to four hard disks of 1TB configured as RAID5.

(iii) What is the total available space for use of the RAID5 implementation described above?

 


Related Discussions:- Calculate the minimum required signal strength

What do you understand by environmental accounting, Question : Environm...

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

Explain the term virtual private network, Question: (a) Besides privac...

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

Explain the approaches to lric modeling, (a) Cost allocation mechanisms ar...

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Protocols for secure communications-cryptography, Protocols for Secure Comm...

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Programming, For this assignment you will create a program called MMWordFix...

For this assignment you will create a program called MMWordFix (Multi-Mode WordFix). This program prompts the user to select one of three word filters (uppercase, lowercase, encryp

Calculate alpha and beta value caesar cipher, Task 1 a. Consider the t...

Task 1 a. Consider the table showing the relative frequencies of letters in English. Arrange the frequencies from largest to smallest, and make a cumulative plot, using Exc

Future threats to network security and planning for those th, I need a help...

I need a help on how to write good assignment on the above topic

Tcp and udp, TCP and UDP End-to-end delivery application is connection...

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

Ipv6 base header format, IPV6 BASE HEADER FORMAT: It has less informat...

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd