Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1. a. A MAC Frame format has a Preamble of 7 octet pattern in the form of alternating 1s and 0s used by a

Question 1.
a. A MAC Frame format has a Preamble of 7 octet pattern in the form of alternating 1s and 0s used by a receiver to establish synchronization. Use a Manchester Encoding technique to describe the first octet of the signal pattern produced within the Preamble.

b. Consider a compressed video transmission in an ATM network. Suppose standard ATM cells must be transmitted through five switches at a data rate of 43 Mbps. What is the transmission time for one cell through one switch?

c. With the help of the ATM Protocol Architecture diagram, briefly explain the work of the three planes (i.e. User, Control, and Management)

Question 2.
a. Explain the following mechanisms in the multipath propagation:
i. Reflection,
ii. Diffraction
iii. Scattering

b. For a system of 32 cells with a cell radius of 1.6 km, a total frequency bandwidth that supports 336 traffic channels, and a reuse factor of N = 7, What geographical area does the system cover?

c. How many channels will be available per cell from the previous question?

Question 3.
a. List any 4 key requirements for routing function in a Packet Switching Network.

b. Describe the difference between Link State Routing and Distance Vector Routing?

Question 4.
a. Based on your understanding of CSMA/CD, sketch a State Diagram of the Rules that relates to it with a maximum transmission attempt of 16s.

b. Outline the steps followed by the Link State Routing Protocol in the event of failure.

Question 5.
a. Describe the four abstraction layers of TCP/IP

b. Describe a typical scenario involving 2 Computer Devices transferring a video file using an unsecured ftp connection where TCP three-way handshake is susceptible to vulnerability.

Question 6.
a. As a Network Consultant for Ghana Technology University College (GTUC), how would you convince management about the need to segment their network?

b. As a Network Security expert, in the midst of this COVID-19 pandemic which has increased online activities, what measures would you recommend to protect your organization’s network against intrusions and why?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

Question 1 a Encryption using the manchester encoding techniques is a bit transmission that makes the transmission between the receiver and the sender very easy and simpleit is splitting the frame int... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Communications and Networking

Authors: Behrouz A. Forouzan

5th edition

73376221, 978-0073376226

More Books

Students also viewed these Algorithms questions

Question

What is the optimal time for a firm to pay its accounts payable?

Answered: 1 week ago

Question

=+42, develop and compare the following models.

Answered: 1 week ago

Question

What is the purpose of cladding in an optical fiber?

Answered: 1 week ago

Question

Name the two major categories of transmission media.

Answered: 1 week ago