Structure of a typical frame relay, Computer Network Security

Assignment Help:

Problem

a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network. Assume that the distance between the two nodes are 5 kilometres and the propagation speed of the signal in the medium is 2 x108m/s. Error detection at the switch gives an average delay of 1 microsecond per 100 bytes of frame data.(Assume all other delays to be negligible.)

i) What is the total transfer time (from the first bit sent by A to the last bit received by B) for an 1,200 byte frame?

ii) Same as (i) but consider that the Store-N-Forward switch now implements "cut-through" and is able to retransmit the frame as soon as the first 400 bits have been buffered.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give an example of a transmitted byte-stream in hexadecimal by using the following module of data type declarations and its corresponding instances:

Volcano ::= OCTET STRING, year ::= INTEGER, Active ::= BOOLEAN

{Volcano, "Etna"}, {year, 2010}, {Active, 1}

c)

i) Give the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Explain the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field usually?

iii) What is the purpose of the DSU/CSU in a Frame Relay network?


Related Discussions:- Structure of a typical frame relay

Tcp and udp, TCP and UDP End-to-end delivery application is connection...

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

Describe how access control is implemented, Question: (a) How can you ...

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Calculate the total latency, Question (a) Inspect the following ifconfi...

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

Ring topology, RING topology all computers are connected in loop. A ring ...

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Address resolution with table lookup, ADDRESS RESOLUTION WITH TABLE LOOKUP ...

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

Assignment, for making the assignment

for making the assignment

Kasonet pinging system, KASONet Pinging System: Project Title:       ...

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd