Describe briefly (in 3 lines max) what is CRC (Cyclic Redundancy Checksum) In which layer does...
Why is check summing used in the Transport Layer and cyclic redundancy check used in the link layer? Before answering, describe how both protocols are implemented.
Cyclic Redundancy Check (CRC): Part 1 Answer the following questions: 1. Implement a CRC generator using only 'XOR' gates and shift buffers. Polynomial of the CRC-3 is "l11" which is "X2+X+1". (3 point) Figure 1. An Hardware Implementation of the CRC decoder 2. Suppose the same CRC-3 generator was used for generating a CRC frame and sent to a receiver. The CRC frame received at the receiver was "110101". Answer the following questions. (7 point) What is the bit length...
1. What does the data link layer do? What are its primary responsibilities? 2. Describe two approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations. 3. Briefly describe how even parity and odd parity work. Give an example of even parity with a 7-bit ASCII code, for the following: 0110110 4. How does cyclical redundancy checking work (CRC)?
1. Briefly describe the cyclic and non-cyclic photophosphorylation. What are the products of the two processes. 2. Using annotated diagram, indicate the major differences between fatty acid synthesis and fatty acid degradation 3. What are major physiological functions of fatty acids 4. Describe briefly the futile activities of photorespiration. 1. Briefly describe the cyclic and non-cyclic photophosphorylation. What are the products of the two processes. 2. Using annotated diagram, indicate the major differences between fatty acid synthesis and fatty acid...
(a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe briefly the multiplexing services provided by the network-layer of the protocol suite. TCP/IP protocol suite. How can the multiplexed TCP and UDP packets be (4 marks) (c) Describe briefly the impact of congestion on packet delay and throughput. Describe (6 marks) (d) Fig. Q1 shows a network adopting the virtual-circuit approach to transmit demultiplexed at the destination? the strategy used in the Internet to...
a) This question is related to Layer 3 functions. i) What is the difference between routing and forwarding? ii) Give TWO advantages of dynamic routing over static routing.. ii) Briefly explain the difference between the datagram and virtual circuit approaches in transferring data 7 marks] b) This question is related to IPV4 i) What is the size of the IPv4 header? iiBriefly describe the following fields in the IPV4 header: Identification Time to Live Header Checksum ii) State TWO ways...
What do you understand by The Hidden Node Problem? Describe 2 different spatial configurations which exemplify this issue. What is the 4B/5B encoding for the 3-byte (ASCII) string “Sun”? What is the 16-bit internet checksum for the 3-byte binary message 00110001 00110010 00110011? Suppose a message is 11011000. What is the CRC checksum using the polynomial corresponding to 1011 to give a 3-bit answer? (Show the solution steps, not just the answer). What is Time Domain Reflectometry?
Problems 1. [40 pointsl Consider a three layer protocol in which Layer 3 encapsulates Layer 2 and Layer 2 encapsulates Layer 1. Assume minimalist headers with fixed length packets. Assume the following characteristics of the layers: Layer 1, 6 octet address length, 512 octet payload; Layer 2, 4 octet address length , 256 octet payload; Layer 3, 8 octet address length, 1024 octet payload. Note that in the minimalist header arrangement no error detection or correction will be used; however,...
1. Describe briefly the "essential" personnel for operating a nuclear pharmacy and what each person does. 2. What are the basic "steps" or "stages" in the practice of Nuclear Pharmacy that must be established and properly managed and why is the significance or importance of each? 3. What sort of records are required to be created and maintained on file at a nuclear pharmacy and why are they required?
Information Security Systems What is RSA Archer used for? Define Wireshark and NetWitness. How does Wireshark differ from NetWitness Investigator? What are security audits? Why they are important? Describe how Zenmap can help you identify risks, threats, and vulnerabilities in an IP network infrastructure. Describe input and output of the process.