Structure of a typical frame relay, Computer Network Security

Assignment Help:

Problem

a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network. Assume that the distance between the two nodes are 5 kilometres and the propagation speed of the signal in the medium is 2 x108m/s. Error detection at the switch gives an average delay of 1 microsecond per 100 bytes of frame data.(Assume all other delays to be negligible.)

i) What is the total transfer time (from the first bit sent by A to the last bit received by B) for an 1,200 byte frame?

ii) Same as (i) but consider that the Store-N-Forward switch now implements "cut-through" and is able to retransmit the frame as soon as the first 400 bits have been buffered.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give an example of a transmitted byte-stream in hexadecimal by using the following module of data type declarations and its corresponding instances:

Volcano ::= OCTET STRING, year ::= INTEGER, Active ::= BOOLEAN

{Volcano, "Etna"}, {year, 2010}, {Active, 1}

c)

i) Give the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Explain the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field usually?

iii) What is the purpose of the DSU/CSU in a Frame Relay network?


Related Discussions:- Structure of a typical frame relay

What is network address translation, Question: (a) What is Network Add...

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Develop a tcp-based client-server socket program, Develop a TCP-based clien...

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

What is ftam-file transfer access and management, Describe what the FTAM se...

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

Plaintext, how to encryt the data in plaintext cipher

how to encryt the data in plaintext cipher

Datagram reassembly, DATAGRAM REASSEMBLY Recreation of original datagr...

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

What is an autonomous system, QUESTION 1: a) Differentiate between a r...

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Tomcat server, how to access tomcat by internet

how to access tomcat by internet

Example of an attack against a windows, The objective of this example is to...

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

Algorithm, algorithm on simple intrest

algorithm on simple intrest

Ids-information security, IDS Intrusion is a attack on information assets...

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd