Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

SULIT (EKT 355) 7- Question 4 Soulan 4 (C4, C6, C02, C03, P03 and P05) (a) Consider a LAN connected to internet through a gateway.

image text in transcribed

SULIT (EKT 355) 7- Question 4 Soulan 4 (C4, C6, C02, C03, P03 and P05) (a) Consider a LAN connected to internet through a gateway. The gate way is implementing a queue for the outgoing traffic. Assume that the traffic generated from the LAN users according to a Poisson process of rate-8 packets per second, and the transmission rate is in exponential distribution of mean ? = 10 packets/second Calculate thc Average delay time, Average queue length, and the probability that the router is idle for the situations: Perhatian satu LAN disambungkan ke internet melalui satu pintu masuk Pintu masuk ini sedang melaksanahan hurisan bagi keluar masuk trafik. Andaikan trafik yang dihasilkan dari LAN pengguna herdasarkan kepada proses Poisson terhadap kadar ?-8 paket/saat, dan kadar penyebaran adalah distribusi ekponen terhadap mean ?-10 paket/sesaat. Hitungkan purata masa tunda, purata panjang harisan dan kehurangkalian yang mana pengatur jaring adalah idle bagi situasi: (i) The router queue size is unlimited Saiz hurisun pengatur jaring tanpa had (5 Marks/markah) (ii) The router queue length is limited to 20 packets. Kenalpusti mesej yang perlu dihantar apabila sistem menggunakan pembahagian polymomial (5 Marks/markah) (iii)Analysis the effect of the limitation in the router queue length based on your results Analisis kesun batasan dalam panjang barisan pengatur jaring berdasarkan jawapan dari () dan (5 Marks/markah) yang panjang.Sokong jawapan anda dengan menggunakan pengiraan) from (i). and (ii). (b) Confidentiality and message integrity are two concepts in network security, justify that, message conlidentiality, and message integrity are two different concepts and one can have one without the other Kerahsiaan dan pesanan berintergriti adalah dia konsep dalam keselamatan jaringan, ulaskan yang pesanan kerahsiuan, dan pesanan berintergriti adalah dua konsep yang berbeza) (5 Marks/markah) SULIT SULIT (EKT 355) 7- Question 4 Soulan 4 (C4, C6, C02, C03, P03 and P05) (a) Consider a LAN connected to internet through a gateway. The gate way is implementing a queue for the outgoing traffic. Assume that the traffic generated from the LAN users according to a Poisson process of rate-8 packets per second, and the transmission rate is in exponential distribution of mean ? = 10 packets/second Calculate thc Average delay time, Average queue length, and the probability that the router is idle for the situations: Perhatian satu LAN disambungkan ke internet melalui satu pintu masuk Pintu masuk ini sedang melaksanahan hurisan bagi keluar masuk trafik. Andaikan trafik yang dihasilkan dari LAN pengguna herdasarkan kepada proses Poisson terhadap kadar ?-8 paket/saat, dan kadar penyebaran adalah distribusi ekponen terhadap mean ?-10 paket/sesaat. Hitungkan purata masa tunda, purata panjang harisan dan kehurangkalian yang mana pengatur jaring adalah idle bagi situasi: (i) The router queue size is unlimited Saiz hurisun pengatur jaring tanpa had (5 Marks/markah) (ii) The router queue length is limited to 20 packets. Kenalpusti mesej yang perlu dihantar apabila sistem menggunakan pembahagian polymomial (5 Marks/markah) (iii)Analysis the effect of the limitation in the router queue length based on your results Analisis kesun batasan dalam panjang barisan pengatur jaring berdasarkan jawapan dari () dan (5 Marks/markah) yang panjang.Sokong jawapan anda dengan menggunakan pengiraan) from (i). and (ii). (b) Confidentiality and message integrity are two concepts in network security, justify that, message conlidentiality, and message integrity are two different concepts and one can have one without the other Kerahsiaan dan pesanan berintergriti adalah dia konsep dalam keselamatan jaringan, ulaskan yang pesanan kerahsiuan, dan pesanan berintergriti adalah dua konsep yang berbeza) (5 Marks/markah) SULIT

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Online Systems For Physicians And Medical Professionals How To Use And Access Databases

Authors: Harley Bjelland

1st Edition

1878487442, 9781878487445

More Books

Students also viewed these Databases questions

Question

what are the pros and cons of kali linux

Answered: 1 week ago

Question

Frame messages for your audiences

Answered: 1 week ago

Question

How does the concept of hegemony relate to culture?

Answered: 1 week ago