Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

10.255.255.255.ii (ii) Describe the advantages of the paired de Bruijn Graph versus the non paired version of the de Bruijn Graph. [3 marks] (d) Discuss

10.255.255.255.ii

(ii) Describe the advantages of the paired de Bruijn Graph versus the non paired version of the de Bruijn Graph. [3 marks] (d) Discuss the advantages of using soft k-means versus hard clustering. [ 3 Business Studies After graduation you created a venture with 10m in sales with a 20% profit margin. After investing routes available to you assuming you are not going to liquidate the company. [3 marks] (b) Discuss how you would go about identifying and choosing the exit route to pursue. [6 marks] (c) Identify your preferred exit route and discuss how you would go about managing the process. [11 marksSoC) designs become more complex, so does the on-chip interconnect. (i) Why does the design of an on-chip network differ greatly from that of larger scale networks? [3 marks] (ii) Draw a diagram showing the datapath of an on-chip router with virtual channels. [3 marks] (iii) How do virtual channels help to reduce packet latency? [3 marks] (iv) For what reason, other than performance, may virtual-channel flow control be useful? [2 marks] (b) You have been asked to outline the design of a high-performance 16-core processor suitable for use in a server-class machine. Draw a clear block diagram illustrating your architecture. Include all the major building blocks, e.g. processor cores, caches, on-chip interconnects, memory controllers and the main off-chip interfaces. Provide a brief description of how cache coherence is maintained, what type(s) of on-chip interconnect are provided, a brief overview of the features of your individual cores and the characteristics of your caches. For each major component briefly justify your design decisions. [9 marks] 5 (TURN OVER) CST2.2019.9.6 5 Computer Vision (a) In early stages of machine vision systems, the isotropic operator shown on the right is often applied to an image I(x, y) in the following way: [2G(x, y)] I(x, y). What is the purpose of this operation? Which class of neurones in the retina does it mimic? How would the results differ if instead this operation: G(x, y) 2 I(x, y) were performed; or alternatively if this operation: 2 [G(x, y) I(x, y)] were performed? [6 marks] (b) Computer vision colour space is usually three-dimensional, just because human vision is tri-chromatic and therefore cameras are designed with three colour planes. But suppose we added a fourth colour plane, say yellow (Y), to the standard red, green, and blue (RGB) bands. Considering that these are linearly independent but not orthogonal vectors, what would be the added capability of RGBY space? What tests would reveal it? Present a version of the Retinex algorithm for RGBY space, explaining the purpose of each step in the algorithm. [8 marks] (c) Visual inference of surface shape depends on assumptions and prior knowledge, such as "faces are mostly convex". Explain the "rotating hollow mask illusion". Why does a face mask (as pictured below) appear to reverse its direction of rotation, once it is seen from the inside instead of the outside? What is the role of Bayesian inference when interpreting a face-like surface that is actually concave in presentation instead of convex? Should visual illusions like this be considered "features" or "bugs", and should one try to design them in to a computer vision system? [6 marks] 6 CST2.2019.9.7 6 Cryptography (a) (i) Choose and briefly describe one major application of elliptic-curve group operations in cryptography. [4 marks] (ii) What other group operation was previously (and still is) widely used for the same purpose? [2 marks] (iii) What is a major advantage of elliptic curve group operations over the group operation you named in Part (a)(ii)? [4 marks] (b) In the Galois field GF(28 ) modulo x 8 + x 4 + x 3 + x 2 + 1, calculate (i) the sum 0011 1001 plus 0110 1100; [2 marks] (ii) the product 0100 1011 times 0000 1001. [4 marks] (c) In Lamport's one-time password scheme, the user is given a list of passwords Rn, . . . , R0 generated using the following algorithm: R0 random for i := 1 to n Ri := h(Ri1) (i) State two properties required of function h. [2 marks] (ii) Complete the password verification algorithm implemented in the server by filling in the ellipses (...) below: Q := . . . while true P := read password if . . . . . . grant access else deny access [2 marks] 7 (TURN OVER) CST2.2019.9.8 7 Denotational Semantics (a) Suppose that (D, v) is a poset which is chain-complete but does not have a least element, and that f : D D is a continuous function. (i) Give an example of such (D, v) and f for which f has no fixed point. [1 mark] (ii) If d D satisfies d v f(d), prove that there is a least element e D satisfying d v e = f(e). [Hint: consider the method used to prove Tarski's fixed point theorem.] [7 marks] (b) (i) Define the notion of contextual equivalence for the language PCF. (You need not describe the syntax and semantics of PCF.) [2 marks] (ii) State the compositionality, soundness and adequacy properties of the denotational semantics of PCF. Explain why they imply that any two closed PCF terms of the same type with equal denotations are contextually equivalent. [8 marks] (iii) Give, without proof, an example of two contextually equivalent PCF terms that have unequal denotation. [2 marks] 8 CST2.2019.9.9 8 Hoare Logic and Model Checking This question is about modelling a program, defined below, consisting of two threads and a single (mathematical) integer variable X, initially set to 0. Each thread t has its own program counter given by pct , initially set to 0, which describes the current line for that thread. Thread 1 Thread 2 0: X := X+1 0: IF IS ODD(X) THEN STOP

For this independent learning activity we'll start with a small exercise of class that can be used to represent the state of a light switch (Off or On). The class will have the ability to check whether the light is currently off or on and to toggle the light to the other state.

After completing the instructions that guide you through the creation of the LightSwitch class you should test it using the code included in the Program.cs class for LightSwitch. Once that is done it is on to the challenge. The challenge is to take the concept of a light switch and extend what you've already done to represent a TrafficLight.

After you've completed the challenge you'll want to use the code provided in Program.cs to test the new class and taste sweet victory.

In this ILA you'll:

make a class define an enum use an enum to create a class field constructor that takes in one parameter getter method public method private method

Instructions:

Make sure to complete the Setup Confirmation assignment. It will walk you through how to p Visual Studoi proje Download the supplied starter project: See download link Extract the project from the zip file to a location on your hard drive. (I recommend a location like Documents/FullSail/DES1/Assignments). * NOTE * The project will have errors in Program.cs until you complete the LightSwitch class. That is ok. Follow the instructions and all will be well :) In visual studio with the starter project open, complete the following steps Create a new class LightSwitch This class will represent a light switch with possible values of off or on, it will have a way for the user to check the current state of the light (off or on), and offer the user the option to toggle or change the state (off -> on or on -> off) Right click on the project name (ILA_W1_1) in the solution explorer window select Add->New Item select Class Type the name in the input box near the bottom of the window Select ok Use enum to create a new data type called SwitchState This data type will be used to create the private field in the LightSwitch class to hold the state of the switch (off or on). Inside the LightSwitch.cs file, after the namespace's { but before class LightSwitch. (You'll have to put the cursor on the class line and hit enter a couple times to add more blank lines into the file) add: enum SwitchState {} between SwitchState's {} add the following options Off, On, NumStates Add a field to the class LightSwitch create the private field that will hold the actual state of the LightSwitch (off/on) After the class's { add the following private SwitchState State; constructor for class LightSwitch creating a constructor allows the user to set the initial or starting value for the class when they create a new object of that type. after the field that you created on a new line add the following public LightSwitch(SwitchState NewState) {} inside the constructor (between its {}'s) add the following line State = NewState; getter method that will return the value of the LightSwitches state after the constructor add the following line public SwitchState GetState() {} inside of the getter method add the following line return State; public method that will allow the user to toggle the light switch (off -> on or on -> off) after the getter method add the following line public void ToggleState() {} inside of the ToggleState method add the following line State = State + 1; This will have the effect of moving the value of the state to the next valid value, from Off to On or from On to NumStates. We don't want the LightSwitch to use the value NumStates so we'll have to add one more item to make sure that we fix that issue. Create a private method that will be used by the LightSwitch class to make sure that the light is in a valid state (off or on only).Assuming you get a job as a network engineer in a multinational company that has five (5) regional station that must be interconnected with others for smooth operation of the organization. The company is about to network the regional offices together. Each physical link must allow communication in both directions. Use the knowledge acquired in this course to advice the management of the company based on the following: a) Recommend the most suitable Network topology for the organization. b) Give detail explanation of the recommended Topology. c) Illustrate the explanation in (b) with a diagram to show the interconnectivity of the five (5) regional offices. d) Explain four (4) major advantages of the topology named in (a) over other network topology

1. Enumerates five components of a data communications system. 2. Define key element of protocol. 3. Define two types of standards. 4. Describe the role of the following standards creation committee. 46 i. International Organization for Standardization (ISO). ii. International Telecommunication Union iii. American National Standards Institute (ANSI). iv. Institute of Electrical and Electronics Engineers (IEEE). 1) What are the three criteria necessary for an effective and efficient network? 2) Categorize the four basic topologies in terms of line configuration. 3) Name the four basic network topologies, and cite an advantage of each type. 4) For n devices in a network, what is the number of cable links required for a mesh, ring, bus, and star topology? 5) What are some of the factors that determine whether a communication system is a LAN or WAN?

Define data and Data Communication. 2. Compare analog and digital data 3. Why data communication 4. List and explain components of data communication system. 5. Highlights any 5 examples of resources that can be share on data communication and networks 6. Define and gives example of basic components of data communication network. 7. What are the major criteria that data communication network must meet. 23 8. Highlights the factors that affect response time as related to performance of data communication network. 9. List various ways of data representation in computer system. 10. Define Data communication equipment and data terminal equipment. Give at least two examples in each case.

What are the concerns of the physical layer in the Internet model? 2. What are the responsibilities of the data link layer in the Internet model? 3. What are the responsibilities of the network layer in the Internet model? 4. What are the responsibilities of the transport layer in the Internet model? 5. What is the difference between a port address, a logical address, and a physical address? 6. Name some services provided by the application layer in the Internet model. 7. How do the layers of the Internet model correlate to the layers of the OSI model? 8. How are OSI and ISO related to each other? 9. Match the following to one or more layers of the OSI model: a) Route determination b) Flow control c) Interface to transmission media d) Provides access for the end user 9. Match the following to one or more layers of the OSI model: a) Reliable process-to-process message delivery b) Route selection c) Defines frames d) Provides user services such as e-mail and file transfer e) Transmission of bit stream across physical medium 10. Match the following to one or more layers of the OSl model: a) Communicates directly with user's application program 55 b)Error correction and retransmission c) Mechanical, electrical, and functional interface d)Responsibility for carrying frames between adjacent nodes

Define communication software 2. What are general functions of communication Software 3. Give examples and function of the following communication Software. i. Broadcast software ii. Messaging software iii. Instant communication Software 4. TCP/IP Protocol is communication software. Yes or NO discuss your answer. 5. What are the elements of communication protocol 6. Compare TCP and IP, hence highlights and gives function of basic protocol for handling data communication 7. Describe the communication between one application and other via TCP/IP 63 8. What happen when a new domain name is registered together with TCP/IP address 9. Give the full meaning and function of the following protocols i. HTTP ii. SSL iii. MIME iv. BOOTP v. SMTP vi. LDAP

1. Describe with diagram the data transmission type. 2. Compare a 10K Byte data transmission using Asynchronous transmission & Synchronous Transmission. Determine the efficiency (10 Kbytes = 80 kbits) 3. Compare synchronous and asynchronous transmission 4. What is data flow? Hence describe three major types of data flow in data communication network. 5. Describe briefly with diagram and relevant example, three major data flow approaches. 6. If an Ethernet frame has overhead of 64bytes including start and stop frames, and the data size is 2500 bytes. Determine the Ethernet frame efficiency.

1. Explain briefly the following: i. Attenuation ii. Propagation delay 88 iii. Crosstalk iv. Echo 3. Compare Guided and Unguided transmission with relevant examples 4. Compare coaxial and twisted pair cable transmission based on the following: a. Attenuation b. Propagation delay c. Crosstalk d. Echo 5. Describe with diagram the following transmission mode in optical fiber a) Grade index b) Step index c) Single mode 7. What are the reasons why Telecommunication Companies are investing in Optical fiber transmission? 8. Describe with diagram: a) Ground wave propagation b)Ionospheric c) Line of sight 9. Highlights 4 major types of microwave transmission.

2. Describe briefly any 5 network security threats you know 3. What are the precautions to reduce the risk of being stung by a denial of service in computer Network? 4. Describe briefly the term cryptograph 5. Describe briefly firewall and it 3 major types 6. What are the major security requirement in network environment 7. What are the basic rules use to generate public and private keys in RSA algorithm 8. For RSA algorithm we have p = 5, q=11, n = 55 and (p-q) (q-1) = 40. Find the public and private key, resulting ciphertext and verify the decryption. 9. Describe with diagram the use of hybrid cryptograph algorithm that combines secret, public, and harsh function for Mr. A to send information to B. 10. Compare the strength of secret, public, and harsh function cryptograph algorithm.

Define the relationship between period and frequency? 2. Explain how a composite signal can be decomposed into its individual frequencies? 3. Given the frequencies listed below, calculate the corresponding periods. a. 24Hz b. 8 MHz c. 140 KHz 116 4. Given the following periods, calculate the corresponding frequencies. a. 5 s b. 14 micro seconds c. 220 nano second 5. What is the phase shift for the for the following? a. A sine wave with the maximum amplitude at time zero b. A sine wave with maximum amplitude after 1/4 cycle c. A sine wave with zero amplitude after 3/4 cycle and increasing 6. What is the bandwidth of a signal that can be decomposed into five sine waves with frequencies at 0, 25, 60, 120, and 240 Hz? All peak amplitudes are the same. Hence draw the bandwidth.

Highlights three techniques of digital-to-digital conversion. 2. Define the characteristics of a self-synchronizing signal. 3. Compare and contrast five line coding schemes discussed in this book. 4. Define block coding and give its purpose. 5. Define scrambling and give its purpose. 6. Give natural explanation on why we do not have DC component in bipolar encoding.

1. Define analog transmission. 2. Define carrier signal and its role in analog transmission. 3. Describe digital-to-analog conversion. 4. Which characteristics of an analog signal are changed to represent the digital signal in each of the following digital-to-analog conversion? a. ASK b. FSK c. PSK d. QAM 5. Which of the four digital-to-analog conversion techniques (ASK, FSK, PSK or QAM) is the most susceptible to noise? Juxtapose your answer. 6. Define constellation diagram and its role in analog transmission. 7. What are the two components of a signal when the signal is represented on a constellation diagram? Which component is shown on the horizontal axis? Which is shown on the vertical axis?

1. Explain briefly the term multiplexing 2. With the aid of diagram describe briefly; i. Wavelength Division multiplexing (WDM) ii. Time Division Multiplexing (TDM) iii. Frequency Division Multiplexing (FDM) 3. Suppose that a frequency band W Hz wide into M channels of equal bandwidth. a) What bit rate is achievable in each channel? Assume all channels have the same SNR. b) What bit rate is available to each M user if the entire frequency band is used as a single channel and TDM is applied? c) How does the comparison of (a) and (b) change if we suppose that FDM require a guard band between adjacent channels? Assume the guard band is 10%of channel bandwidth 4. Suppose Ray Power FM 100.5, has a large band of available bandwidth, say 1GHz, which is to be used by central office to transmit and receive from large number of users. Describe how the following approach can be use to organizing the system: a) A single TDM 145 b) A hybrid TDM/FDM system in which the frequency band is divided into multiple channel and time division multiplexing is used within each channel 5. Compare the operation of multiplexer, an add-drop multiplexer, a switch, and a digital cross-connect

Review Questions 1. Enumerate and give function of any five network implementation device. 2. Explain three configuration types of Network Interface Cards. 3. Discuss the important of Ethernet cable tester. 4. Describe the Procedures for making network patch cable with Rj45. 5. Compare T-568A and T-568B 6. Enlist materials required for making network patch cable for a LAN.

Describe the procedure to connect two computer systems with only network card and cross over cable. 2. Under what condition can we use straight through network cable for connecting two computer systems. 3. Describe procedure for Configuring of IP Address on window 7 4. Describe how you can setup IP Logical Network Design for (1) 10 computers, 2 notebooks and a router on network; (2) 12 computers, a router and a network printer on network. Private IP addresses space: 10.0.0.0 - 10.255.255.255. 5. Why is it important to configure modem in bridge mode when setting up network? Hence describe the procedure to configure modem in bridge mode.

1. What are Steps towards Networking Troubleshooting 2. Describe Troubleshooting with Ping Commands 3. Describe the procedure for Troubleshoot Network Problem With "ping" Command. 4. On which condition can we require the use of nslookup command in network problem troubleshooting?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Communications and Networking

Authors: Behrouz A. Forouzan

5th edition

73376221, 978-0073376226

More Books

Students explore these related Computer Network questions