Do you think such circumstances are likely

Assignment Help Basic Computer Science
Reference no: EM131046215

Recall that AAL3/4 has a CRC-10 checksum at the end of each cell, while AAL5 has a single CRC-32 checksum at the end of the PDU. If a PDU is carried in 12 AAL3/4 cells, then AAL3/4 devotes nearly four times as many bits to error detection as AAL5.

(a) Suppose errors are known to come in bursts, where each burst is small enough to be confined to a single cell. Find the probability that AAL3/4 fails to detect an error, given that it is known that exactly two cells are affected. Do the same for three cells. Under these conditions, is AAL3/4 more or less reliable than AAL5? Assume that an N-bit CRC fails to detect an error with probability 1/2 N (which is strictly true only when all errors are equally likely).

(b) Can you think of any error distribution in which AAL3/4 would be more likely than AAL5 to detect an error? Do you think such circumstances are likely?

Reference no: EM131046215

Questions Cloud

How campany strategize to alleviate negative effects : Pick an external issue discussed in the case and describe how Campany (an Italian beverage company) can strategize to alleviate the potential negative effects of it
What film genre allow or disallow in terms of representation : What does the film's genre allow or disallow in terms of representation? How is the film's approach to the topics of pregnancy and abortion affected or influenced by its genre?
What is this behavior called : Assuming the FIFO buffering memory can be redistributed freely, suggest a reshuffling of the buffers that avoids the above problem, and explain why it does so.
Give a specific argument why this is so : Cell switching methods essentially always use virtual circuit routing rather than datagram routing. Give a specific argument why this is so.
Do you think such circumstances are likely : Can you think of any error distribution in which AAL3/4 would be more likely than AAL5 to detect an error? Do you think such circumstances are likely?
Write a cybercrime prevention guide for an organization : Write a 800-word Cybercrime Prevention Guide for an organization you select based on a cybercrime which may affect it. Include the following in the Cybercrime Prevention Guide: Address a cybercrime that may compromise the organization.
What cell loss rate now would yield a net one-per-million : This allows recovery from any one lost cell. What cell loss rate now would yield a net one-per-million loss rate for 20-data-cell PDUs?
How reliable does an atm connection have to be in order : How reliable does an ATM connection have to be in order to maintain a loss rate of less than one per million for a higher-level PDU of size 20 cells? Assume AAL5.
Have we learned from obstacles that founding fathers faced : Have we learned from the obstacles that our founding fathers faced? Do you see similarities between the obstacles our founding fathers faced and what we deal with today? Why, or why not?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is a spline

Describe the Hole Wizard feature. What is a Spline. Identify the required information for a Circular Pattern feature.

  Explain vulnerability in the system

How would you respond if Goli came to you describing a vulnerability in your system and offering to help fix it--What would incline you to hire her? What would disincline you from doing so?

  Make a marketing plan for

Final Assignment A: Choosing a Business Idea In your next assignment, you'll create a marketing plan for a business. Before you create a marketing plan, you'll think about what type of business you'd like to make a marketing plan for.

  A good file management system

A good file management system is necessary to organize your files. A file management system is made up of files and file folders. You can copy, delete, rename and move these files and folders around as like.

  Draw dfsa for identifiers contain only letters and digits

Draw a DFSA for identifiers that contain only letters and digits, where the identifier must have at least one letter, but it need not be the first character. Hint: everything to the left of the leftmost letter must be a digit.

  Prove that machine precision as bound for relative round off

Prove that machine precision (epsilon) calculated by mathlab's eps function can be utilized as a bound for relative round off.

  How do i determine which hard/software i am suppose to use

How do I address specifications for input, processing, output, storage and control.

  How digital media has changed core business processes

Digital media has changed the ways ideas, information, and arguments in society are communicated both locally and globally. Individuals and organizations frequently use digital media as a means to influence individuals and organizations.

  Relational schema

What would be the correct answer for them? For questions x - y refer to the following relational schema: Which of the following statements is true? (a)  a key is a superkey (b)  a candidate key is a superkey (c)  a primary key is a superkey (d)  all ..

  Eclipse program project

Write a complete program that stores and prints participants in a party. As part of your program, write a Party class that implements these members:

  Calculate the total price based on several key parts

Calculate the total price based on several key parts required to build a state-of-the-art gaming computer. The user will have the option of selecting different parts. For example, Windows 7, Windows 8 or Mac OS/X for Operating systems, 4 GB, 8 GB or ..

  How the token buckets and wfqs can be used together

Summarize how the token buckets and WFQs can be used together to provide policing mechanisms.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd