Structure of a typical frame relay, Computer Network Security

Assignment Help:

Problem

a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network. Assume that the distance between the two nodes are 5 kilometres and the propagation speed of the signal in the medium is 2 x108m/s. Error detection at the switch gives an average delay of 1 microsecond per 100 bytes of frame data.(Assume all other delays to be negligible.)

i) What is the total transfer time (from the first bit sent by A to the last bit received by B) for an 1,200 byte frame?

ii) Same as (i) but consider that the Store-N-Forward switch now implements "cut-through" and is able to retransmit the frame as soon as the first 400 bits have been buffered.

b) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules (BER). Give an example of a transmitted byte-stream in hexadecimal by using the following module of data type declarations and its corresponding instances:

Volcano ::= OCTET STRING, year ::= INTEGER, Active ::= BOOLEAN

{Volcano, "Etna"}, {year, 2010}, {Active, 1}

c)

i) Give the structure of a typical Frame Relay frame and describe the role of each field in the frame.

ii) Explain the purpose of the DLCI field in the address segment of a Frame Relay frame. How big is this field usually?

iii) What is the purpose of the DSU/CSU in a Frame Relay network?


Related Discussions:- Structure of a typical frame relay

Network design approach, Problem a) Give three reasons why traditional ...

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Explain symmetric and asymmetric encryption system, Question 1: (a) Dif...

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Logic bombs - attacks information security, Example 3: Logic bombs In th...

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Cryptographic algorithms-cryptography, Cryptographic algorithms Cryptogr...

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

Error reporting mechanism (icmp), ERROR REPORTING MECHANISM (ICMP) INT...

ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Ipv6 datagram format, IPV6 DATAGRAM FORMAT It is given in the figure b...

IPV6 DATAGRAM FORMAT It is given in the figure below:

Address resolution , Mapping between a hardware address and a protocol addr...

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

Introduction to physical security, INTRODUCTION TO PHYSICAL SECURITY The...

INTRODUCTION TO PHYSICAL SECURITY The Physical security addresses design, execution, and maintenance of countermeasures which protect physical resources of an organization. The

What standards are to be applied, Government funding has been given to a un...

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd