What is the peak data rate out of the router in one second

Assignment Help Computer Network Security
Reference no: EM13969260

1. What does a beacon frame do? Explain.

2. What are the differences between a master device in Bluetooth, and a base station in 802.11?

3. Download RFC 5944 (https://www.rfc-editor.org/), and answer the following questions:

a. What organization did the editor of RFC 5944 work for?

b. How is that organization different from the authors of many Internet protocol RFCs, such as TCP, IP, UDP, etc.?

c. Also from that RFC, what is a "co-located care-of address"?

d. If you're using such a thing, who performs decapsulation of the datagrams?

e. How long does an extension have to be before the Long Extension Format is used?

4. Research two advanced (i.e. new, expensive) cell phones from different brands. You may need to download user manuals or find other technical documentation. For each, describe:

a. The make and model of the phone

b. What frequency band it uses

c. What type of phone standards it uses (GSM, IS-95, CDMA, etc.). [Don't tell me it uses AAC or 802.11g - those aren't phone standards!]

d. If the encoding wasn't described in the lecture, describe it briefly (what other protocols is it based on, where is it used, etc.)

e. Cite the sources used

5. When is an anchor MSC used in a GSM network?

6. What are the differences between infrastructure and ad hoc modes in 802.11?

7. Why are acknowledgments used in 802.11 but not in wired Ethernet?

8. The phone protocols UMTS and CDMA-2000 are based on what earlier standards?

9. Suppose two cell phones are in a foreign network with a foreign agent. Is it possible for both of them to have the same care-of-address in mobile IP? Explain your answer.

10. Of what does a basic service set consist?

11. Describe the hidden terminal problem in your own words.

12. Describe how and why a chipping rate is used.

13. What is the difference between CSMA and CDMA? Describe in what contexts are they used, and briefly how each works.

14. Ethernet can stop transmitting in mid-frame, while 802.11 always transmits a full frame. Why is this difference needed?

15. What are the three main functions of media players?

16. Estimate the jitter for a web site on the other side of the world.

a. Find a university really far away (Indonesia, New Zealand, South Africa, etc.). Identify the university you used.

b. Run five ‘ping' commands, and record the four RTT estimates from each command. You should have a total of 20 RTT values.

c. Enter them in Excel, and calculate their standard deviation ( =STDEV(cell range) where cell rangeis for example A1:A20).

d. Identify the site you used, show the RTT data, and give the standard deviation with correct units.

e. Describe the type of local link used (wired or wireless) and level of Internet service used (DSL, Cable, FIOS, Drexel, etc.)

f. Did you expect more or less jitter? Why?

17. Figure 7.9 (p. 620) shows an interleaved stream from an original stream of 16 characters. If the original stream was "Quieter turtles." (Notice the space and period are also characters), how would the interleaved stream read?

18. From the book Animal Farm, a famous quote is "All animals are equal, but some animals are more equal than others." Which of the packet scheduling mechanisms we looked at (FIFO, etc.) is most like this quote? Justify your answer.

19. One of the encoding methods used in the SIP discussion is μ-law (mu-law) PCM (pulse code modulation). What sampling rate and number of bits per channel are used in mu-law PCM? Where in the world is it used? Cite sources used.

20. What connection is there between the compression protocol H.264 and MPEG?

21. How does Skype choose which transport protocol to use?

22. How do changes in the sequence number in RTP differ from those in TCP?

23. Suppose in an RTP session, there are three microphones plus two video cameras (which presumably also have mics). How many SSRCs are used for this session? How could your answer change, depending on the compression protocols used for audio and video?

24. Suppose a router's queue holds 4 Mbit of data, and 12 kbit packets arrive at the router at a rate of 250 packets per second. Be sure to include correct units for each answer.

a) What is the peak data rate out of the router in one second?

b) What is the long term average data rate out of the router?

c) What is the maximum burst size?

Verified Expert

The solution aims to defines that computer Network is one of the main subjects of I.T. stream. It is a set of computers connected together for the purpose of sharing resources. Such connected computers are called nodes. In computer networks, these nodes are allowed to communicate or exchange data with the help of network links, i.e. Data Connection. This connection is usually established using cables or wireless media.

Reference no: EM13969260

Questions Cloud

Develop a paper that will analyze role of project pricing : Develop a paper that will analyze the role of project pricing and estimating for your selected project. Include in your analysis the pricing process, labor distribution, pricing out work, and the low bidder dilemma
What affect does this have on the gross profit and goods : What affect does this have on the gross profit and goods available for sale in the 2014 income statement; in dollars understated or overstated. What affect does this have on net income and retained earnings in dollars understated or overstated for 20..
Research and analyze the public relation strategies : Working individually, you are required to research and analyze the public relation strategies of a select non-profit entity or organization. You will write a brief, but insightful report demonstrating your understanding of their strengths, weaknes..
Compute the break-even point : A Company sells two products, J and K. The sales mix is 4 units of J and 3 units of K. The contribution margins per unit are $ 40 for J and $ 20 for K. Fixed costs are $ 6,16,000 per month. Compute the break-even point.
What is the peak data rate out of the router in one second : What is the peak data rate out of the router in one second - what is the long term average data rate out of the router?
The employer and the friend created an agency relationship : The employer and the friend created an Agency Relationship. To establish consent, the principal (owner) must ask the agent (their friend) to do something in which they agree to do so. Principals are held accountable for their agent's actions because ..
Major decisions to improve future profitability : Explain how High Sierra uses the 80/20 rule, along with its budgeting process, to make major decisions to improve future profitability. Be sure to include the types of decisions a company might make based on budgets.a
Determine the quadratic function that represents the arch : Determine the quadratic function that represents the arch if the vertex of the parabola is at the origin. Determine the quadratic function that represents the arch if the origin is at the lower left end of the arch.
Variable manufacturing and selling costs per : It anticipates fixed manufacturing costs of $200,500 and fixed general and administrative expenses of $80,000 for the year. Variable manufacturing and selling costs per set of head covers will be $8 and $12, respectively. Each set will sell for $3..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd