All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
computer networking
Questions and Answers of
Computer Networking
In Chapter 8, we learned that a circuit-switched network needs end-to-end addressing during the setup and teardown phases. Define end-to-end addressing in a telephone network when two parties
Describe the SS7 service and its relation to the telephone network.
In Chapter 8, we discussed the three communication phases involved in a circuit-switched network. Match these phases with the phases in a telephone call between two parties.
What is LATA? What are intra-LATA and inter-LATA services?
Using the discussion of circuit-switching in Chapter 8, explain why this type of switching was chosen for telephone networks.
What are the three major components of a telephone network?
Repeat Problem P13-8 for a 10 Gigabit Ethernet LAN.Problem P13-8In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are
Repeat Problem P13-8 for a Gigabit Ethernet LAN.Problem P13-8In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed?
What is the relationship between a switch and a bridge?
Repeat Problem P13-8 for a Fast Ethernet LAN.Problem P13-8In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed?
What are the advantages of dividing an Ethernet LAN with a bridge?
In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed?
What is the difference between unicast, multicast, and broadcast addresses?
Suppose you are to design a LAN for a company that has 100 employees, each given a desktop computer attached to the LAN. What should be the data rate of the LAN if the typical use of the LAN is shown
How is the preamble field different from the SFD field?
Suppose the length of a 10Base5 cable is 2500 m. If the speed of propagation in a thick coaxial cable is 200,000,000 m/s, how long does it take for a bit to travel from the beginning to the end of
What are the common 10 Gigabit implementations?
What is the ratio of useful data to the entire packet for the smallest Ethernet frame?
What are the common Gigabit Ethernet implementations?
An Ethernet MAC sublayer receives 42 bytes of data from the upper layer. How many bytes of padding must be added to the data?
What are the common Fast Ethernet implementations?
If an Ethernet destination address is 07:01:02:03:04:05, what is the type of the address (unicast, multicast, or broadcast)?
What are the common Standard Ethernet implementations?
How does the Ethernet address 1A:2B:3C:4D:5E:6F appear on the line in binary?
Compare the data rates for Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet.
What is the hexadecimal equivalent of the following Ethernet address?01011010 00010001 01010101 00011000 10101010 00001111
Why is there no need for CSMA/CD on a full-duplex Ethernet LAN?
Check to see if the following set of chips can belong to an orthogonal system. [+1, +1, +1, +1] , [+1,1,1, +1], [1, +1, +1, 1] , [+1, 1, 1, +1]
Check to see if the following set of chips can belong to an orthogonal system.[+1, +1] and [+1, −1]
List some strategies in CSMA/CA that are used to avoid collision.
Answer the following questions:a. Can a routing table in a datagram network have two entries with the same destination address? Explain.b. Can a switching table in a virtual-circuit network have two
Based on Figure 12.13, how do we interpret success in an Aloha network?Figure 12.13 Figure 12.13 Flow diagram for the CSMA/CD Station has a frame to send K=0 Legend T Frame average transmission time
Redraw Figure 11.11 using a variable to hold the one-bit sequence number and a variable to hold the one-bit acknowledgment number.Figure 11.11 Figure 11.11 FSM for the Stop-and-Wait protocol Sending
In Figure 11.11, do the ready and blocking states use the same timer? Explain.Figure 11.11 Figure 11.11 FSM for the Stop-and-Wait protocol Sending node Packet came from network layer. Make a frame,
Using the following specifications, draw a finite state machine with three states (I, II, and III), six events, and four actions:a. If the machine is in state I, two events can occur. If event 1
Using the following specifications, draw a finite state machine with three states (I, II, and III), five events, and six actions:a. If the machine is in state I, two events can occur. If event 1
In the Stop-and-Wait Protocol, assume that the sender has only one slot in which to keep the frame to send or the copy of the sent frame. What happens if the network layer delivers a packet to the
Redraw Figure 11.2 using the following scenario:Figure 11.2a. Frame 0 is sent, but lost.b. Frame 0 is resent and acknowledged.c. Frame 1 is sent and acknowledged, but the acknowledgment is lost.d.
Compare and contrast flow control and error control.
Redraw Figure 11.12 using the following scenario:Figure 11.12a. The first frame is sent and acknowledged.b. The second frame is sent and acknowledged, but the acknowledgment is lost.c. The second
In the previous problem we tried to find the number of bits to be added to a dataword to correct a single-bit error. If we need to correct more than one bit, the number of redundant bits increases.
In the interleaving approach to FEC, assume each packet contains 10 samples from a sampled piece of music. Instead of loading the first packet with the first 10 samples, the second packet with the
Manually simulate the Fletcher algorithm (Figure 10.18) to calculate the checksum of the following bytes: (2B)16, (3F)16, (6A)16, and (AF)16. Also show that the result is a weighted checksum.Figure
Assume a packet is made only of four 16-bit words (A7A2)16, (CABF)16, (903A)16, and (A123)16. Manually simulate the algorithm in Figure 10.17 to find the checksum.Figure 10.17 Figure 10.17 Algorithm
Traditional checksum calculation needs to be done in one’s complement arithmetic. Computers and calculators today are designed to do calculations in two’s complement arithmetic. One way to
This problem shows a special case in checksum handling. A sender has two data items to send: (4567)16 and (BA98)16. What is the value of the checksum?
We have sampled a low-pass signal with a bandwidth of 200 KHz using 1024 levels of quantization.a. Calculate the bit rate of the digitized signal.b. Calculate the SNRdB for this signal.c. Calculate
Using the code in Table 10.2, what is the dataword if each of the following codewords is received?Table 10.2a. 01011b. 11111c. 00000d. 11011 Table 10.2 Simple parity-check code C(5, 4) Dataword
In Figures 9.11 to 9.13, both the forwarding table and ARP are doing a kind of mapping. Show the difference between them by listing the input and output of mapping for a forwarding table and
Why is it better not to change an end-to-end address from the source to the destination?
In Figure 9.7, do you think that system A should first check its cache for mapping from N2 to L2 before even broadcasting the ARP request?Figure 9.7 Figure 9.7 ARP operation LAN System A System B
In Figure 9.5, show the process of frame change in routers R1 and R2.Figure 9.5 Figure 7.5 UTP connector 12345678 2343678 RJ-45 Female RJ-45 Male
Redesign the configuration of Problem 8-12 using the Clos criteria.Problem 8-12We need a three-stage space-division switch with N = 100. We use 10 crossbars at the first and third stages and 4
Repeat Problem 8-12 if we use 6 crossbars at the middle stage.Problem 8-12We need a three-stage space-division switch with N = 100. We use 10 crossbars at the first and third stages and 4 crossbars
When we talkabout the broadcast address in a link, do we mean sending a message to all hosts and routers in the link or to all hosts and routers in the Internet? In other words, does a broadcast
In the previous problem, do we need both network and data-link layers?Previous ProblemAssume we have an internet (a private small internet) in which all hosts are connected in a mesh topology. Do we
Assume we have an internet (a private small internet) in which all hosts are connected in a mesh topology. Do we need routers in this internet? Explain.
We need a three-stage time-space-time switch with N = 100. We use 10 TSIs at the first and third stages and 4 crossbars at the middle stage.a. Draw the configuration diagram.b. Calculate the total
The horizontal axes in Figures 7.6 and 7.9 represent frequencies. The horizontal axis in Figure 7.16 represents wavelength. Can you explain the reason? If the propagation speed in an optical fiber is
Use the results of Problem P7-4 to infer that the bandwidth of a coaxial cable decreases with the increase in distance.Problem P7-4Using Figure 7.9, tabulate the attenuation (in dB) of a 2.6/9.5 mm
Use the results of Problem P7-1 to infer that the bandwidth of a UTP cable decreases with an increase in distance.Problem 7-1Using Figure 7.6, tabulate the attenuation (in dB) of a 18-gauge UTP for
An entry in the switching table of a virtual-circuit network is normally created during the setup phase and deleted during the teardown phase. In other words, the entries in this type of network
We mentioned that two types of networks, datagram and virtual-circuit, need a routing or switching table to find the output port from which the information belonging to a destination should be sent
Five equal-size datagrams belonging to the same message leave for the destination one after another. However, they travel through different paths as shown in Table 8.1.We assume that the delay
Repeat Problem 6-4 if each output slot carries 2 bits from each source.Problem 6-4We need to use synchronous TDM and combine 20 digital sources, each of 100 Kbps. Each output slot carries 1 bit from
Show the contents of the five output frames for a synchronous TDM multiplexer that combines four sources sending the following characters. Note that the characters are sent in the same order that
Distinguish between a link and a channel in multiplexing.
An analog signal has a bandwidth of 20 KHz. If we sample this signal and send it through a 30 Kbps channel, what is the SNRdB?
Repeat Problem P4-3 for the differential Manchester scheme.Problem 4-3Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been
Repeat Problem P4-3 for the Manchester scheme.Problem 4-3Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the
Repeat Problem P4-3 for the NRZ-I scheme.Problem 4-3Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the
List three techniques of digital-to-digital conversion.
The light of the sun takes approximately eight minutes to reach the earth. What is the distance between the sun and the earth?
If the bandwidth of the channel is 5 Kbps, how long does it take to send a frame of 100,000 bits out of this device?
Is the frequency domain plot of a voice signal discrete or continuous?
Using the internet in Figure 1.11 (Chapter 1) in the text, show the layers of the TCP/IP protocol suite and the flow of data when two hosts, one on the west coast and the other on the east coast,
Which of the following data units has an application-layer message plus the header from layer 4?a. A frameb. A user datagramc. A bit
Which of the following data units is decapsulated from a user datagram?a. A datagramb. A segmentc. A message
Which of the following data units is encapsulated in a frame?a. A user datagramb. A datagramc. A segment
Explain the difference between an Internet draft and a proposed standard.
What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional?
When a resident uses a dial-up or DLS service to connect to the Internet, what is the role of the telephone company?
In a LAN with a link-layer switch (Figure 1.8b), Host 1 wants to send a message to Host 3. Since communication is through the link-layer switch, does the switch need to have an address?
Why are protocols needed?
Assume six devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device?
Although it was not mentioned in the text, an alternative form for a URL is to use the IP address instead of its DNS name. Use this information to explain why a DNS name cannot end with a digit.
A binary file is 4560 bytes long. How long will it be if encoded using base 64 encoding, with a CR+LF pair inserted after every 110 bytes sent and at the end?
On the day of a major sporting event, such as the championship game in some popular sport, many people go to the official Web site. Is this a flash crowd in the same sense as the 2000 Florida
Assume that compression is not used for audio CDs. How many MB of data must the compact disc contain in order to be able to play two hours of music?
In Fig. 7-42(c), quantization noise occurs due to the use of 4-bit samples to represent nine signal values. The first sample, at 0, is exact, but the next few are not. What is the percent error for
An audio streaming server has a one-way ‘‘distance’’ of 100 msec to a media player. It outputs at 1 Mbps. If the media player has a 2-MB buffer, what can you say about the position of the
What is the bit rate for transmitting uncompressed 1200 × 800 pixel color frames with 16 bits/pixel at 50 frames/sec?
Consider a 50,000-customer video server, where each customer watches three movies per month. Two-thirds of the movies are served at 9 P.M. How many movies does the server have to transmit at once
Break the following monoalphabetic substitution cipher. The plaintext, consisting of letters only, is an excerpt from a poem by Lewis Carroll.mvyy bek mnyx n yvjjyr snijrh invq n muvjvdt je n idnvy
An affine cipher is a version of a mono-alphabetic substitution cipher, in which the letters of an alphabet of size m are first map to the integers in the range 0 to m-1. Subsequently, the integer
Alice used a transposition cipher to encrypt her messages to Bob. For added security, she encrypted the transposition cipher key using a substitution cipher, and kept the encrypted cipher in her
Find a 77-bit one-time pad that generates the text Hello World from the cipher text of Fig. 8-4.Figure 8-4 Message 1: Pad 1: Ciphertext: 1001001
You are a spy, and, conveniently, have a library with an infinite number of books at your disposal. Your operator also has such a library at his disposal. You have agreed to use Lord of the Rings as
Quantum cryptography requires having a photon gun that can, on demand, fire a single photon carrying 1 bit. In this problem, calculate how many photons a bit carries on a 250-Gbps fiber link. Assume
In the text, we computed that a cipher-breaking machine with a million processors that could analyze a key in 1 nanosecond would take 1016 years to break the 128-bit version of AES. Let us compute
Showing 1300 - 1400
of 2050
First
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21