What is the peak data rate out of the router in one second

Assignment Help Computer Network Security
Reference no: EM13969260

1. What does a beacon frame do? Explain.

2. What are the differences between a master device in Bluetooth, and a base station in 802.11?

3. Download RFC 5944 (https://www.rfc-editor.org/), and answer the following questions:

a. What organization did the editor of RFC 5944 work for?

b. How is that organization different from the authors of many Internet protocol RFCs, such as TCP, IP, UDP, etc.?

c. Also from that RFC, what is a "co-located care-of address"?

d. If you're using such a thing, who performs decapsulation of the datagrams?

e. How long does an extension have to be before the Long Extension Format is used?

4. Research two advanced (i.e. new, expensive) cell phones from different brands. You may need to download user manuals or find other technical documentation. For each, describe:

a. The make and model of the phone

b. What frequency band it uses

c. What type of phone standards it uses (GSM, IS-95, CDMA, etc.). [Don't tell me it uses AAC or 802.11g - those aren't phone standards!]

d. If the encoding wasn't described in the lecture, describe it briefly (what other protocols is it based on, where is it used, etc.)

e. Cite the sources used

5. When is an anchor MSC used in a GSM network?

6. What are the differences between infrastructure and ad hoc modes in 802.11?

7. Why are acknowledgments used in 802.11 but not in wired Ethernet?

8. The phone protocols UMTS and CDMA-2000 are based on what earlier standards?

9. Suppose two cell phones are in a foreign network with a foreign agent. Is it possible for both of them to have the same care-of-address in mobile IP? Explain your answer.

10. Of what does a basic service set consist?

11. Describe the hidden terminal problem in your own words.

12. Describe how and why a chipping rate is used.

13. What is the difference between CSMA and CDMA? Describe in what contexts are they used, and briefly how each works.

14. Ethernet can stop transmitting in mid-frame, while 802.11 always transmits a full frame. Why is this difference needed?

15. What are the three main functions of media players?

16. Estimate the jitter for a web site on the other side of the world.

a. Find a university really far away (Indonesia, New Zealand, South Africa, etc.). Identify the university you used.

b. Run five ‘ping' commands, and record the four RTT estimates from each command. You should have a total of 20 RTT values.

c. Enter them in Excel, and calculate their standard deviation ( =STDEV(cell range) where cell rangeis for example A1:A20).

d. Identify the site you used, show the RTT data, and give the standard deviation with correct units.

e. Describe the type of local link used (wired or wireless) and level of Internet service used (DSL, Cable, FIOS, Drexel, etc.)

f. Did you expect more or less jitter? Why?

17. Figure 7.9 (p. 620) shows an interleaved stream from an original stream of 16 characters. If the original stream was "Quieter turtles." (Notice the space and period are also characters), how would the interleaved stream read?

18. From the book Animal Farm, a famous quote is "All animals are equal, but some animals are more equal than others." Which of the packet scheduling mechanisms we looked at (FIFO, etc.) is most like this quote? Justify your answer.

19. One of the encoding methods used in the SIP discussion is μ-law (mu-law) PCM (pulse code modulation). What sampling rate and number of bits per channel are used in mu-law PCM? Where in the world is it used? Cite sources used.

20. What connection is there between the compression protocol H.264 and MPEG?

21. How does Skype choose which transport protocol to use?

22. How do changes in the sequence number in RTP differ from those in TCP?

23. Suppose in an RTP session, there are three microphones plus two video cameras (which presumably also have mics). How many SSRCs are used for this session? How could your answer change, depending on the compression protocols used for audio and video?

24. Suppose a router's queue holds 4 Mbit of data, and 12 kbit packets arrive at the router at a rate of 250 packets per second. Be sure to include correct units for each answer.

a) What is the peak data rate out of the router in one second?

b) What is the long term average data rate out of the router?

c) What is the maximum burst size?

Verified Expert

The solution aims to defines that computer Network is one of the main subjects of I.T. stream. It is a set of computers connected together for the purpose of sharing resources. Such connected computers are called nodes. In computer networks, these nodes are allowed to communicate or exchange data with the help of network links, i.e. Data Connection. This connection is usually established using cables or wireless media.

Reference no: EM13969260

Questions Cloud

Develop a paper that will analyze role of project pricing : Develop a paper that will analyze the role of project pricing and estimating for your selected project. Include in your analysis the pricing process, labor distribution, pricing out work, and the low bidder dilemma
What affect does this have on the gross profit and goods : What affect does this have on the gross profit and goods available for sale in the 2014 income statement; in dollars understated or overstated. What affect does this have on net income and retained earnings in dollars understated or overstated for 20..
Research and analyze the public relation strategies : Working individually, you are required to research and analyze the public relation strategies of a select non-profit entity or organization. You will write a brief, but insightful report demonstrating your understanding of their strengths, weaknes..
Compute the break-even point : A Company sells two products, J and K. The sales mix is 4 units of J and 3 units of K. The contribution margins per unit are $ 40 for J and $ 20 for K. Fixed costs are $ 6,16,000 per month. Compute the break-even point.
What is the peak data rate out of the router in one second : What is the peak data rate out of the router in one second - what is the long term average data rate out of the router?
The employer and the friend created an agency relationship : The employer and the friend created an Agency Relationship. To establish consent, the principal (owner) must ask the agent (their friend) to do something in which they agree to do so. Principals are held accountable for their agent's actions because ..
Major decisions to improve future profitability : Explain how High Sierra uses the 80/20 rule, along with its budgeting process, to make major decisions to improve future profitability. Be sure to include the types of decisions a company might make based on budgets.a
Determine the quadratic function that represents the arch : Determine the quadratic function that represents the arch if the vertex of the parabola is at the origin. Determine the quadratic function that represents the arch if the origin is at the lower left end of the arch.
Variable manufacturing and selling costs per : It anticipates fixed manufacturing costs of $200,500 and fixed general and administrative expenses of $80,000 for the year. Variable manufacturing and selling costs per set of head covers will be $8 and $12, respectively. Each set will sell for $3..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Design such a password protocol and evaluate its usability

An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother's maiden name, a password, and the amount of your last purchase, but also your dog's nickname a..

  Survey of economic impact of operating system security

Survey of economic impact of operating system security violations

  Explain how to make the file transfer process more secure

Explain how to make the file transfer process more secure.

  Assignment on regulatory requirements and standards

Regulatory Requirements and Standards - The graduate ensures alignment of regulatory requirements and standards with appropriate information security and assurance controls for organizations that process or hold privacy, financial, or medical info..

  Users in your organization are concerned about performance

users in your organization are concerned about performance and network security. after a meeting with your

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  Define intellectual property in cyberspace

Develop a one-page poster in Word or PowerPoint for a public service campaign to educate people about intellectual property rights of cyberspace for some aspect in your readings from this week.

  Facility network security

Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility, Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve th..

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Value of the challenge text sent by the ap

What is the value of the challenge text sent by the AP and what is the value of the IVcaptured by the attacker - what is the value of the response to the challenge?

  Evaluate quality of security offered by micropayment system

Briefly describe how it works. Evaluate the quality of security offered by this micropayment system and evaluate one such micropayment system.

  Describe the life cycle of an information system

Suppose that you run a photography printing store. Your workers have been using punch cards for time entry since you started the business.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd