Structure of a typical frame relay, Computer Network Security

Assignment Help:

Problem

a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network. Assume that the distance between the two nodes are 5 kilometres and the propagation speed of the signal in the medium is 2 x108m/s. Error detection at the switch gives an average delay of 1 microsecond per 100 bytes of frame data.(Assume all other delays to be negligible.)

i) What is the total transfer time (from the first bit sent by A to the last bit received by B) for an 1,200 byte frame?

ii) Same as (i) but consider that the Store-N-Forward switch now implements "cut-through" and is able to retransmit the frame as soon as the first 400 bits have been buffered.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give an example of a transmitted byte-stream in hexadecimal by using the following module of data type declarations and its corresponding instances:

Volcano ::= OCTET STRING, year ::= INTEGER, Active ::= BOOLEAN

{Volcano, "Etna"}, {year, 2010}, {Active, 1}

c)

i) Give the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Explain the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field usually?

iii) What is the purpose of the DSU/CSU in a Frame Relay network?


Related Discussions:- Structure of a typical frame relay

Explain how the framework will align to the model, MB Enterprise Systems Lt...

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Network analysis and network representation of a project, Question: Net...

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Explain the purpose of the dr and bdr, QUESTION a) Compare and contras...

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Draw the network layout, Question : a) Below is a capture of an Etherne...

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Network security, Network security has become much more complex than ever b...

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Explain the close procurement project process, Question 1: Why do we ne...

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

Describe types of communication impairments, Question : (a) "Pulse Code...

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Principles of information security, The key concepts and frameworks covered...

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

Wireless networks, Wireless Networks The origin of wireless networks a...

Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd