Fill in the blanks in each of the following statements: a) A method is invoked with a(n) _________. b) A variable known only within the method in which its declared is called a(n) _________. c) The...
What are the differences between fast fading and slow fading?
Path loss, fading, and delay spread are the three important radio propagation issues. Explain why those issues are important in a cellular system?
Lets create a computer called the Simpletron. As its name implies, its a simple machine, but powerful. The Simpletron runs programs written in the only language it directly understands: Simpletron...
What is the role or usefulness of reflected and diffracted radio signals in a cellular system? Explain with suitable examples.
An MS is not in the direct line of sight of a BS transmitting station. How is the signal received? Explain.
Consider two random variables X and Y that are independent and Gaussian mean and the other is of mean . Prove that the density function of Z = X + Y is Rician distributed.
The following table shows the density of the random variable X. (a) Find p(8) (b) Find the table for CDF F(x) (c) Find P(3 ¤ X ¤ 5) (d) Find P(X ¤ 4) and P(X < 4). Are the...
Consider a cellular system in which each cell has only one channel (single server) and an infinite buffer for storage the calls. In this cellular system, call arrival rates are discouraged, that is,...
The density for X is given in the table of Problem 7. (a) Find E[X] (b) Find E[X - ] (c) Find Var[X] (d) Find the standard deviation for X.
An octagon shaped cell is closer to a circle than a hexagon. Explain why such a shape is not used as an ideal shape of the cell?
If each user keeps a traffic channel busy for an average of 5% time and an average of 60 requests per hour is generated, what is the Erlang value?
For the following cell pattern, (a) Find the reuse distance if radius of each cell is 2 km. (b) If each channel is multiplexed among 8 users, how many calls can be simultaneously processed by each...
The following figure shows a cellular architecture. Is there some specific reason why it could have been designed this way? (4 5 3
What is the key issue for contention-based access protocols? How is it solved? Give an example to explain your answer.
How does slotted ALOHA improve throughput as compared to pure ALOHA?
Is it impractical to use ALOHA or slotted ALOHA for MSs to access control channel associated with the BS? Explain clearly.
What is meant by a collision in data transfer and why is it not possible to decipher information from collided data? Explain clearly.
What are relative advantages and disadvantages of persistent and non-persistent CSMA protocols? What makes you select one over the other? Explain clearly.
Describe the advantages and disadvantages of 1-persistent CSMA and p-persistent CSMA respectively.
Can we use CSMA/CD in cellular wireless networks? Explain your answer with solid reasoning.
What are the major factors affecting the throughput of CSMA/CA?
What is the difference between collision detection and collision avoidance?
What are the relative advantages and disadvantages of basic CSMA/CA and CSMA/CA with RTS/CTS protocols? What makes you select one over the other?
What in your opinion should be the criteria to select the value of the contention window? Also explain how you will decide the value of the time slot for CSMA/CA.
In a CSMA/CA scheme, a random delay is allowed whenever a collision occurs. What is the guarantee that future collision between previously collided terminals will not occur? Explain the rationale...
Why does contention window need to be changed sometimes? Explain clearly.
In CSMA/CA, why do you need a contention window, even after DIFS? What is the typical size of the contention window?
How many users can a wireless AP handle? What happens if the number of MSs exceeds this value?
A clustering approach has been suggested to locally collect and aggregate information in a sensor network. What kind of aggregation is desirable?
a. In Figure 2-16, what will be the value in the destination port number field if a packet arrives for the e-mail application? (Yes, this is a repeat question.) b. When the HTTP program on a...
a. Are packets carried inside frames, or are frames carried inside packets? 25a.) Which of the following is true? A. Frames are carried inside packets. B. Packets are carried inside frames C. Both a...
a. What is alphanumeric information? b. Explain how many bytes it will take to transmit Go team without the quotation marks. 22b.) How many bytes will it take to transmit "Brain Dead" without the...
a. Distinguish between chronic lack of capacity and momentary traffic peaks. 10a.) _______ can be addressed by using priority a. Chronic lacks of capacity b. Momentary traffic peaks c. Both A and B...
Can you think of a way to allow a client on one virtual LAN to communicate with a server on another VLAN? Switches typically have no way of doing it. It involves an access control list or some other...
Explain the key general principle of network design and why you should follow it.
a. What are the benefits of Software-Defined Networking? 15a1.) SDN holds the promise of bringing ______. a. Lower costs b. Lower agility c. Both A and B d. Neither A nor B 15a2.) SDN can ______. a....
In the Ms. Betsy Davis case at the beginning of the chapter, the access point on the local network did not have security. This makes a man-in-the-middle attack much easier. a. Given what you learned...
The image of Fig. 8-54(b) contains the ASCII text of five plays by Shakespeare. Would it be possible to hide music among the zebras instead of text? If so, how would it work and how much could you...
a. How does the postal service use hierarchical sorting? b. How does this simplify delivery decisions?
A router that has the routing table in Figure 8-11 receives an incoming IPv4 packet. The source IPv4 address in the arriving packet is 10.55.72.234. The destination IPv4 address is 10.4.6.7. The TTL...
Consider a finite support signal x(t) = t, 0 t 1, and zero elsewhere. (a) Plot x(t +1) and x(t +1). Add these signals to get a new signal y(t). Do it graphically and verify your results...
a. If you need to transmit 600 million bits per second 90 meters, what signaling standard and UTP quality standard would you use? 7a1.) UTP categories rate the ______ of UTP cabling. a. Quality b....
a. In a Wi-Fi LAN, do two wireless hosts usually send frames directly to one another? Explain. 3a.) In a Wi-Fi LAN, wireless hosts generally send frames directly to one another. a. True b. False b....
a. What kind of physical device is an evil twin access point? 8a1.) An evil twin access point is usually _______. a. A reprogrammed access point b. A laptop computer c. A rogue access point d. Any of...
a. What does it mean that Bluetooth uses one-to-one operation? 15a.) Bluetooth uses _______ operation. a. All-to-all b. Point-to-multi-point c. One-to-all d. One-to-one b. Is this still true if a...
a. Create the hexadecimal multiplication table. b. Use the hexadecimal table in Figure 3.8 to perform the following addition: 2AB3 + 35DC c. Add the following numbers: 1 FF9 + F7 d. Multiply the...
What is the purpose of an IP address mask?Suppose an IP address is identified as 222.44.66.88/24. What is the network address in this case? What is the host address? How many hosts can this network...
Clusters and networks are both categorized as loosely coupled systems, but they serve different purposes. Explain the differences in purpose between clusters and networks.
Clearly and carefully discuss each of the advantages of clustering.
Obtain information and compare the features, capabilities, performance, and operational methods between Windows Server, Linux, and IBM zSeries clustering techniques.
Explain how the three primary conditions required for DMA described in Chapter 9 of the text are met by the I/O channel architecture.
Explain why it is easy to perform read and write in place on a disk but not on a tape.
Consider the interface between a computer and a printer. For a typical printout, it is clearly impractical to send output data to the printer one byte or one word at a time (especially over a...
Show how you would implement a DO-WHILE statement using Little Man instructions.
Show carefully how you would implement an IF-ELSE statement using Little Man instructions.
Write a Little Man program that prints out the odd numbers from 1 to 99. No input is required.
Show the packed decimal format for the decimal number 129975.
Write a program in your favorite language that will convert all ASCII uppercase and lowercase letters to EBCDIC code. For an additional challenge, also convert the punctuation symbols, indicating...
In the Pink-Lemon-8 computer, real numbers are stored in the format SEEM M M M 8 where all the digits, including the exponent, are in octal. The exponent is stored excess-40 8 . The mantissa is...
In wireless communications, the effects of multi-path significantly affect the quality of the received signal. Due to the presence of buildings, cars, etc. between the transmitter and the receiver...
Consider now the Doppler effect in wireless communications. The difference in velocity between the transmitter and the receiver causes a shift in frequency in the signal, which is called the Doppler...
A program for encoding and decoding arithmetic compression.
Write a method in Java to find the first address (network address) in the block when one of the addresses in the block is given as a string representing a CIDR notation.
Both TCP and RTP use sequence numbers. Do sequence numbers in these two protocols play the same role? Explain.
Are encoding and decoding of the multimedia data done by RTP? Explain.
Assume an image is sent from the source to the destination using 10 RTP packets. Can the first five packets define the encoding as JPEG and the last five packets define it as GIF?
UDP does not create a connection. How are different chunks of data, carried in different RTP packets, glued together?
Assume an application program uses separate audio and video streams during an RTP session. How many SSRCs and CSRCs are used in each RTP packet?
In which situation, a unicast session or a multicast session, can feedback received from an RTCP packet about the session be handled more easily by the sender?
Find the Laplace transform of the following signals and their region of convergence: (a) the reflection of the unit-step signal, i.e., u(t). And then use the result together with the Laplace...
The impulse response of an LTI is h(t) = r(t) 2r(t 1) + r(t 2) and the input is a sequence of impulses (a) Find the system output y(t)as the convolution integral of x(t) and h(t), and plot it for T =...
The following problems consider approaches to stabilize an unstable system. (a) An unstable system can be stabilized by using negative feedback with a gain Kin the feedback loop. For instance...
Consider the following functions Y i (s) = L[y i (t)], i = 1, 2 and 3, where {y i (t), i = 1, 2, 3} are the complete responses of differential equations with zero initial conditions. (a) For each of...
A periodic signal x(t), of fundamental frequency Ω 0 = Ï, has a period The signal x(t) is the input of an ideal low-pass filter with the frequency response H(jΩ) shown in...
Consider the Fourier series of two periodic signals (a) Let Ω 1 = Ω 0 , is z(t) = x(t) y(t) periodic? If so, what is its fundamental period and its Fourier series...
We want to use the Fourier series of a train of square pulses (done in the chapter) to compute the Fourier series of the triangular signal x(t)with a period x 1 (t) = r(t) 2r(t 1) + r(t 2) (a)...
Let x(t) = sin 2 (2t), a periodic signal of fundamental period T 0 = 0.5, and y(t) = |sin(2 t)|also periodic of the same fundamental period. (a) A trigonometric identity gives that x(t) = 0.5[1 ...
Which of the following applications are classified as UBR in ATM? a. HTTP b. SNMP c. SMTP d. VoIP
There are signals whose Fourier transforms cannot be found directly by either the integral definition or the Laplace transform. For instance, the sinc signal is one of them. (a) Let X(Ω)...
The Fourier transform of a signal x(t) is Use properties of the Fourier transform to (a) find the integral (b) Find the value x(0). (c) Let s=jΩ or Ω = (s/j), find X(s)...
Assume we devise a protocol with the packet size so large that it can carry all chunks of a live or real-time multimedia stream in one packet. Do we still need sequence numbers or timestamps for the...
The frequency response of an ideal low-pass filter is (a) Calculate the impulse response h(t) of the ideal low-pass filter. (b) If the input of the filter is a periodic signal x(t) having a Fourier...
The Fourier transform of a signal x(t) is (a) Carefully plot X(Ω)as function of . (b) Determine the value of x(0). [u(2 +T) u(S2 1)] X(2)
If the Fourier transform of the pulse x(t) given in Figure 5.14 is X(Ω) (do not need to compute it) (a) Using the properties of the Fourier transform (no integration needed) obtain the...
Both DNS servers and DHCP servers send your client PC an IP address. What is different about these two addresses?
After you get a second-level domain name, what more must you do to have a working website for your company?
Distinguish between dial-up telephone service you use as a consumer and leased line services used in business.
Give a counterexample to the conjecture that if a directed graph G contains a path from u to , then any depth-first search must result in .d u.f.
Consider finding the inverse Z-transform of (a) MATLAB does the partial fraction expansion as: while we do it in the following form: Show that the two partial fraction expansions give the same...
The Pade approximant provides an exact matching of M + N 1 values of h[n], where M and N are the orders of the numerator and denominator of the rational approximation. But there is no method for...
What are the four types of events that are considered possible indicators of actual incidents?
Suppose you receive the following two tables: DEPARTMENT (DepartmentName, BudgetCode) EMPLOYEE (EmployeeNumber, EmployeeLastName, EmployeeFirstName, Email, DepartmentName) and you conclude that...
We are given a noisy signal x(t) = s(t) + η(t) where s(t) is the desired signal and η(t) is additive noise. From experience, we know that the average power of the desired...
Consider the relation: PERSON_2 (Name, Sibling, ShoeSize, Hobby) Assume that the following functional dependencies exist: Name Sibling Name ShoeSize Name Hobby Describe deletion, modification,...
Periodic signals can be generated by obtaining a period and adding shifted versions of this period. Suppose we wish to generate a train of triangular pulses. A period of the signal is x[n] = 0.5(r[n]...
In SCTP, a SACK chunk reports the receipt of three out-of-order data chunks and five duplicate data chunks. What is the total size of the chunk in bytes?
An output interface in a switch is designed using the leaky bucket algorithm to send 8000 bytes/s (tick). If the following frames are received in sequence, show the frames that are sent during each...
You are testing a 1 volt. d.c. source and have the following measurements obtained from the source every minute starting at time 0 To find the average voltages for the first 5 min, i.e., to get rid...
Consider a discrete-time system with output y[n] given by y[n] = x[n] f[n] and x[n] is the input and f[n] is a function. (a) Let the input be x[n] = 4cos (n/2) and f[n] = cos (6n/7), < n < . Is x[n]...