New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
business communication process
Business Data Communications 6th Edition William Stallings - Solutions
Suppose a file of 10,000 bytes is to be sent over a line at 2400 bps.a. Calculate the overhead in bits and time in using asynchronous communication. Assume one start bit and a stop element of length one bit, and 8 bits to send the byte itself for each character.The 8-bit character consists of all
Demonstrate by example (write down a few dozen arbitrary bit patterns; assume one start bit and a stop element of length 1 bit) that a receiver that suffers a framing error on asynchronous transmission will eventually become realigned.
Suppose that a sender and receiver use asynchronous transmission and agree not to use any stop elements. Could this work? If so, explain any necessary conditions.
An asynchronous transmission scheme uses 8 data bits, an even parity bit, and a stop element of length 2 bits.What percentage of clock inaccuracy can be tolerated at the receiver with respect to the framing error? Assume that the bit samples are taken at the middle of the clock period. Also assume
Suppose that a synchronous serial data transmission is clocked by two clocks (one at the sender and one at the receiver) that each has a drift of 1 minute in one year. How long a sequence of bits can be sent before possible clock drift could cause a problem?Assume that a bit waveform will be good
When President Franklin Delano Roosevelt gave his first inaugural speech—“the only thing we have to fear is fear itself…”—it lasted about 23 minutes. In printed form it takes about 4 pages.The part that is printed on a page is about 4 1/2 inches wide and 7 3/8 inches vertically.There are
Two communicating devices are using a single-bit even parity check for error detection.The transmitter sends the byte 10101010 and, because of channel noise, the receiver gets the byte 10011010.Will the receiver detect the error? Why or why not?
What are the three frame types supported by HDLC? Describe each.
Two documents related to safety concerns associated with wireless media are the FCC OET-65 Bulletin and the ANSI/IEEE C95.1-1999. Briefly describe the purpose of these documents and briefly outline the safety concerns associated with wireless LAN technology. RIC?
Compare and contrast wired and wireless LANs.What unique concerns must be addressed by the designer of a wireless LAN network? RIC
Try this experiment: How far can you go and still be connected to your network? This will depend to a large extent on your physical environment.
Most wireless cards come with a small set of applications that can perform tasks similar to Netstumbler. Using your own client software, determine the same items you did with Netstumbler. Do they agree?
There are many free tools and applications available for helping decipher wireless networks. One of the most popular is Netstumbler. Obtain the software at www.netstumbler.com and follow the links for downloads.The site has a list of supported wireless cards. Using the Netstumbler software,
Using what you know about wired and wireless networks, draw the topology of your network.
How much do you know about your wireless network?a. What is the SSID?b. Who is the equipment vendor?c. What standard are you using?d. What is the size of the network?
What is a usage model?
What is the difference between an access point and a portal?
What is the difference between a single-cell and a multiple-cell wireless LAN?
List and briefly define key requirements for wireless LANs.
List and briefly define four application areas for wireless LANs.
Discuss potential problems that can occur in a WLAN environment at St. Luke’s.Hospitals have been some of the earliest adopters of wireless local area networks (WLANs). The user population is typically mobile and spread out across a number of buildings, with a need to enter and access data in
Visit the NetMotion Web site and learn more about the technical approach of the Mobility architecture. Discuss how this approach provides the mobility features of the product.Hospitals have been some of the earliest adopters of wireless local area networks (WLANs). The user population is typically
Analyze the advantages of having the FCS field of IEEE 802.3 frames in the trailer of the frame rather than in the header of the frame.
When a collision occurs, IEEE 802.3 systems use an algorithm called binary exponential backoff to calculate the random amount of time the sender must wait before attempting to retransmit the frame. For each of the retransmissions, the algorithm doubles the range of the random delay.Thus, after n
Token-Ring is an alternative (but largely considered obsolete) technology to Ethernet.Provide a basic overview of Token-Ring and explain why it has largely been effaced by Ethernet as a LAN technology alternative. RIC
Broadband Integrated Services Digital Network (BISDN) is an optical broadband version of ISDN (which provides digital transmission over POTS). BISDN services incorporate several technologies, including Asynchronous Transfer Mode (ATM) and Synchronous Optical Network (SONET). Provide a basic
An argument that has been ongoing for some time now involves the question as to whether ATM or Gigabit Ethernet is the best choice for a high speed networking solution. Compare these two technologies and formulate a position paper outlining a potential scenario for each technology where it might
Using capture programs such as Ethereal and built in programs like ping, nslookup, and ipconfig, can you find the following information?a. With ipconfig or ifconfig, find your MAC address.b. Capture traffic from your own computer and examine your MAC address—does it match the previous question?c.
Can you determine the type of network interface card installed in your computer?Describe this card in terms of the speed, layer 2 protocol and the type of medium you are using (for example, 10Mbps Ethernet over UTP).
What are the transmission medium options for Fast Ethernet?
What is meant by the phrase flat address space?
What is the difference between a hub and a layer 2 switch?
What is CSMA/CD?
Explain why a data rate of 10 Mbps on all LAN segments is increasingly inadequate for many businesses.
The Carlson SAN mixes equipment from a number of vendors.What problems does this raise and what are some management options for dealing with them?Carlson Companies is one of the largest privately held companies in the United States, with more than 180,000 employees in more than 140 countries.
Discuss the pros and cons of consolidating data on a SAN central data facility versus the dispersed arrangement it replaces.Carlson Companies is one of the largest privately held companies in the United States, with more than 180,000 employees in more than 140 countries. Carlson enterprises include
Discuss how the Carlson SAN approach addresses the IT goals the company is trying to achieve.Carlson Companies is one of the largest privately held companies in the United States, with more than 180,000 employees in more than 140 countries. Carlson enterprises include a presence in marketing,
Given a transmit power (Pin) of 5 watts and a received power (Pout) of 2.5 watts, what is the calculated loss in dB?
If an amplifier has a 30-dB voltage gain, what voltage ratio does the gain represent?
Fill in the missing elements in the following table of approximate power ratios for various dB levels. Decibels 1 2 3 4 5 6 7 8 9 10 Losses 0.5 0.1 Gains 2 10
Some organizations are implementing wide area networks as a high-speed backbone in order to increase communication efficiency and effectiveness of services throughout a particular region. One such example of this is Network Virginia, which delivers Internet and intranet services to organizations
Develop, in general terms, a cost-effective cable plan (meeting minimal data integrity requirements) for a scientific R&D organization that is building a new five-story research facility. The first floor will contain the lobby and administrative offices. The second and third floors will contain
Obtain a piece of Category 3 and a piece of category 5 wiring. Strip back the outer insulation and count the number of twists.You should be able to observe three characteristics of twisted pair wiring.Discuss.
The semiconductor industry requires a large degree of automation in the processing of microelectronics devices. This is primarily due to the fact that extremely small tolerances are required in the manufacturing process of most semiconductor devices and therefore semiconductor fabrication plants
Why are there multiple LAN standards?
What is the purpose of the IEEE 802 committee?
Arrange the following in order from highest to lowest regarding cost: UTP, fiber, and coaxial cable.
Arrange the following in order from highest to lowest regarding bandwidth: UTP, fiber, and coaxial cable.
What are the wavelengths used in fiber optic communication?
What is the difference between unshielded twisted pair and shielded twisted pair?
What are some major limitations of twisted-pair wire?
Why are the wires twisted in twisted-pair copper wire?
What is the protocol typically used in storage area networks?
Other than large storage capacity, what other advantage does a SAN provide?
What are the differences among backend LANs, SANs, and backbone LANs?
How do the key requirements for computer room networks differ from those for personal computer local networks?
What is a token bucket and how does it work?
OSPF is designed as what type of routing protocol?
OSPF uses what type of routing algorithm?
What is the difference between an interior router protocol and an exterior router protocol?
What is the purpose of the subnet mask?
What is a subnet?
Provide three examples (each) of elastic and inelastic Internet traffic. Justify each example’s inclusion in their respective category.
In contemporary routing and addressing, the notation commonly used is called classless interdomain routing or CIDR.With CIDR, the number of bits in the mask is indicated in the following fashion: 192.168.100.0/24. This corresponds to a mask of 255.255.255.0. If this example would provide for 256
Given a company with six individual departments and each department having ten computers or networked devices, what mask could be applied to the company network to provide the subnetting necessary to divide up the network equally?
Given a network address of 192.168.100.0 and a subnet mask of 255.255.255.192,a. How many subnets are created?b. How many hosts are there per subnet?
Is the subnet mask 255.255.0.255 valid for a Class A address?
What is the difference between the subnet mask for a Class A address with 16 bits for the subnet ID and a class B address with 8 bits for the subnet ID?
What is the Session Description Protocol?
Provide an example of a transport protocol used to convey audio or video content during a SIP based transmission.
List and briefly define the major components in an SIP network.
What are the five key services provided by SIP?
What is the function of the cache in HTTP?
What are some of the limitations of SMTP that MIME was intended to address?
In extending a single-system mail system to a distributed mail system, what key additions must be included?
By installing a mail client on your computer, are you storing your unread e-mail on your system?
With a single-system mail facility or native mail facility, what major elements are needed?
What is HTTPS?
What are POP3 and IMAP?
Why is it important for the local systems administrator to understand what ports are being used by applications?
In discovering the port your mail system uses, what port is your machine using?
What TCP port does your mail system use?
Users are free to define and use additional header fields other than the ones defined in RFC 87. Such header fields must begin with the string “X-”.Why?
Excluding the connection establishment and termination, what is the minimum number of network round trips to send a small e-mail message using SMTP?
Comment on the extranet topology. Are there any potential bottlenecks?ING Life (formerly NN Financial) is a leading provider of life insurance products in Canada.The company is based in Ontario and operates out of three regional offices.Over 2000 brokerage partners market its products [BRUN99,
Discuss the precautions taken by ING to ensure security. Were the measures adequate?ING Life (formerly NN Financial) is a leading provider of life insurance products in Canada.The company is based in Ontario and operates out of three regional offices.Over 2000 brokerage partners market its products
What are the probable difficulties and risk associated with using public infrastructure, such as the Internet, as part of a private business solution?ING Life (formerly NN Financial) is a leading provider of life insurance products in Canada.The company is based in Ontario and operates out of three
What is an extranet?
What is an intranet?
Because we have standards such as TCP/IP and OSI, why is middleware needed?
Middleware is often required for clients accessing data in different locations. Are telnet and ftp examples of applications requiring middleware?
Suggest pros and cons for thick client and thick server strategies.
What are four different ways processing can be divided between machines communicating with each other?
What is client/server computing?
This chapter introduced the term intranet. Previously the term Internet was introduced.Based on your understanding of these terms, draw a diagram depicting your local intranet (school network) and your organization’s (school’s) connection to the Internet.• How big is your network?• Who is
What are some of the servers on your local network operating within the client/server paradigm? Where are these servers located? What are the IP addresses of the servers? What are the names of the servers?
What are the client/server-based applications that are part of your operating system?
A relatively new term that has been introduced to the Web environment is that of the Web service.What is a Web service and how does it differ from the concept of a Web application? Reference: http://www.w3.org/TR/2003/WD-ws-gloss-20030514/
The Java programming language is referred to by some as the language of the Web due to its platform independent nature. Java uses a hybrid form of RPC and CORBA called RMI (Remote Method Invocation). How does RMI differ from these two technologies and for what type of environment might RMI be an
You have just been hired as the CIO of an organization that has been in business for a while and has recently acquired another smaller organizations in order to increase market share.The original organization operated a fleet of buses that conducted tours and travel packages along the northern
Showing 3800 - 3900
of 5138
First
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
Last
Step by Step Answers