Calculate the minimum required signal strength, Computer Network Security

Assignment Help:

Question 1:

(a) (i) Radio waves are subject to several propagation problems. Name any three of them.

(ii) A Wi-Fi receiver requires a signal power of 50mW to operate correctly. Calculate the minimum required signal strength of the transmitter if the receiver is placed at a distance of 40 meters from the transmitter.

(b) Consider the arrangement of self-learning bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges W, X, Y and Z after the following transmissions:

Host A sends to Host C,
Host D sends to Host B,
Host C sends to Host A and
Host E sends to Host D.

100_Calculate the minimum required signal strength.png

(c) Give an example of a transmitted hexadecimal byte-stream in Basic Encoding Rules (BER) by using the following data type declarations and its corresponding instances:

name ::= OCTET STRING {name, "JOHN SMITH"}
active ::= BOOLEAN [0=NO, 1=YES] {inactive, 0}
number ::= INTEGER {number, 5}

(d) One method for fault tolerant servers to provide redundancy is by implementing RAID5.

(i) Explain the term redundancy.
(ii) By means of a diagram, show how data is written to four hard disks of 1TB configured as RAID5.

(iii) What is the total available space for use of the RAID5 implementation described above?

 


Related Discussions:- Calculate the minimum required signal strength

Issue specific security policy, Why an organization need the issue specific...

Why an organization need the issue specific security policy

Explain web defacement, QUESTION (a) Compare and contrast phishing and ...

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Explain the concept of zero knowledge proofs, (a) Describe the concept of ...

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Protocols for secure communications-cryptography, Protocols for Secure Comm...

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Venn Diagram Problem, Students were asked about search engine they used.90 ...

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

What is the major security flaw of set, QUESTION (a) Discuss why it is ...

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

X.509, Consider the details of the X.509 certificate shown below. a. Identi...

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

Threads and attacks-information security, THREADS AND ATTACKS Threat is ...

THREADS AND ATTACKS Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management s

What do you understand by the term integrity, Question: (a) What do yo...

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Virtual packets, VIRTUAL PACKETS These data packets serve same reason ...

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd