Structure of a typical frame relay, Computer Network Security

Assignment Help:

Problem

a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network. Assume that the distance between the two nodes are 5 kilometres and the propagation speed of the signal in the medium is 2 x108m/s. Error detection at the switch gives an average delay of 1 microsecond per 100 bytes of frame data.(Assume all other delays to be negligible.)

i) What is the total transfer time (from the first bit sent by A to the last bit received by B) for an 1,200 byte frame?

ii) Same as (i) but consider that the Store-N-Forward switch now implements "cut-through" and is able to retransmit the frame as soon as the first 400 bits have been buffered.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give an example of a transmitted byte-stream in hexadecimal by using the following module of data type declarations and its corresponding instances:

Volcano ::= OCTET STRING, year ::= INTEGER, Active ::= BOOLEAN

{Volcano, "Etna"}, {year, 2010}, {Active, 1}

c)

i) Give the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Explain the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field usually?

iii) What is the purpose of the DSU/CSU in a Frame Relay network?


Related Discussions:- Structure of a typical frame relay

Evaluate the sample correlation between y and z, Question: (a) Data on ...

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Computer security, Implementing an effective online authentication scheme i...

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

Describe the function of a tap in wmns, Question: (a) A Wireless Mesh N...

Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.

Explain major differences between wpa and wpa2, Question: Suppose the f...

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Compare and contrast data encryption standard, Problem (a) Using Vigen...

Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa

Determine the codeword which is transmitted using crc, Question (a) For...

Question (a) For the bit stream 010011, show the waveforms for each of the code indicated. Consider that the signal level for NRZ-L for mark is positive; the signal level for t

Define shift operation, SHIFT OPERATION:  This operation replaced all...

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

Securing the network using a packet filter firewall, 1. Network Design ...

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

Intrusion detection and classification, i want to detec and classify networ...

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd