New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
business communication process
Business Data Communications 6th Edition William Stallings - Solutions
What other programs are built into your operating system to help you troubleshoot or provide feedback about your connectivity.
Figure 5.8 shows the protocols the operate directly on top of IP. Ping is a program used to test connectivity between machines and is available on all operating systems.Which of the built-in protocols does Ping use and what does the payload data consist of? Hint: You can use Ethereal to help you
Packet capture software or sniffers can be powerful management and security tools.By using the filtering capability that is built in, you can trace traffic based on several different criteria and eliminate everything else. Use the filtering capability built into Ethereal to do the following;a.
Ethereal is a free packet sniffer that allows you to capture traffic on a local area network.It can be used on a variety of operating systems and is available at www.ethereal.com.You must also install the WinPcap packet capture driver, which can be obtained from
What is the limiting factor in the time required to transfer a file using TFTP?
OSI has seven layers. Design an architecture with eight layers and make a case for it.Design one with six layers and make a case for that.
Why does the TCP header have a header length field while the UDP header does not?
Why is UDP needed? Why can’t a user program directly access IP?
Assume you have two machines on separate networks that are communicating via e-mail. Machine A is attached to a frame relay network and Machine B is attached to an Ethernet network. For a given set of network conditions (i.e., congestion, path selection, etc.), will an e-mail message transmitted
a. The French and Chinese prime ministers need to come to an agreement by telephone, but neither speaks the other’s language. Further, neither has on hand a translator that can translate to the language of the other. However, both prime ministers have English translators on their staffs. Draw a
Using the layer models in Figure 5.17, describe the ordering and delivery of a pizza, indicating the interactions at each level.
Does a router require that all attached layer 2 protocols are the same?
What is a router?
Large files sent over the network must be broken up into smaller packets. How does the IP layer keep the packets from getting misplaced or collected out of order?
Compare the address space between IPv4 and IPv6. How many bits are used in each?
Does all traffic running on the Internet use TCP?
Which version of IP is the most prevalent today?
What are some advantages of layering as seen in the TCP/IP architecture?
There are several protocol models that have been developed. Examples of these include SNA, Appletalk, OSI, and TCP/IP as well as more general models such as three layer models. What model is actually used for communications that travel over the Internet?
What is TCP/IP?
What is a protocol data unit (PDU)?
Suggest improvements to existing services and suggest new services that should be added.By the early 1990s, the Florida Department of Management Service (DMS) had built up a large information systems network that served state government agencies in 10 regional sites and connected these to the data
Visit the DMS Web site and list the major services found there. Discuss the relative merits of each.By the early 1990s, the Florida Department of Management Service (DMS) had built up a large information systems network that served state government agencies in 10 regional sites and connected these
What security mechanisms are needed to protect the DMS systems from both state employees and users accessing over the Internet?By the early 1990s, the Florida Department of Management Service (DMS) had built up a large information systems network that served state government agencies in 10 regional
What kind of lookup did you perform in the preceding problem?
In the previous problem you learned your IP address. Type the command nslookup and use your IP as an argument. For example, nslookup 10.20.30.40.This will look up your IP address with the DNS system.What does the server return?
Windows 2000/XP and Linux have a program built in that will allow you to interact with the DNS server.This program is called “nslookup”.Type this name into the command windows and press “Enter”.What is the automatic feedback you receive and what does it mean? Typing “exit” will close
In this same, you can interact with the server providing the IP address for your computer.For Linux you can use the command ifdown eth0 followed by the command ifup eth0.This will send a series of requests to the server. On the Windows 98/2000/XP machine, type the command ipconfig /? which will
What is the name of the protocol used to provide your IP address automatically?
Every machine connected to a network should have an IP address. This is true whether the address comes from a server or is manually configured. Use the following tools to determine your IP address. To use each one, you must first open up either a DOS shell (for Windows) or a Bourne shell (most
Before the deployment of the Domain Name System, a simple text file(‘HOSTS.TXT’) centrally maintained at the SRI Network Information Center was used to enable mapping between host names and addresses. Each host connected to the Internet had to have an updated local copy of it to be able to use
A user on the host 170.210.17.145 is using a Web browser to visit www.example.com.In order to resolve the www.example.com domain to an IP address, a query is sent to an authoritative name server for the ‘example.com’ domain. In response, the name server returns a list of four IP addresses, in
Choose a root server, and use the dig tool to send it a query for the IP address of www.example.com, with the RD (Recursion Desired) bit set. Does it support recursive lookups? Why or why not?
The dig tool provides easy interactive access to the DNS.The dig tool is available for UNIX and Windows operating systems. It can also be used from the Web. Here are three sites that, at the time of this writing, provided free access to dig:http://www.gont.com.ar/tools/dig
Two seemingly unrelated events took place in late 1992 and early 1993 that together seeded the explosive growth of the Internet that is rooted in the early 1990s. One was a piece of legislation authored by Congressman Rick Boucher and the other was a piece of software authored by Marc Andreessen.
Compare and contrast circuit switching and packet switching. Describe the tradeoffs between the two technologies. Why is packet switching the more appropriate mechanism for the operation of the Internet?
Explain the difference between the recursive technique and the iterative technique in DNS.
What is a root name server?
What is a DNS resource record?
What is the difference between a name server and a resolver in DNS?
Name the four major components of the domain name system.
What is DNS?
What is the programming language used to display Web pages?
What are two applications programs that have taken the place of Mosaic?
What were two of the first applications developed for use over a network?
What two protocols form the foundation of and govern the way we communicate on the Internet?
What is the difference between ARPANET and the Internet?
3.13. Suggest applications or tools that MasterCard could provide that would be attractive to member banks.An example of a client/server architecture is that used by MasterCard International [HIGG03, STEI02b].The company’s computer facility authorizes, clears, and settles each credit card
3.13. MasterCard makes its tools available to all of its member banks. [STEI02b] states that these tools are more likely to be attractive to state and regional banks. Big national and international banks are likely to have developed and use their own analytical tools. Discuss the implications of
3.13. The IT managers responsible for selling the data warehouse concept to upper management say that it would be much harder to make the case in today’s climate of shrinking IT budgets, because most organizations are trying to cut costs rather than launch new initiatives. Discuss the approach
3.13. A company will deploy a credit sales system that will provide service to ten large population centers.A database will be used to store user information and record credit transactions.The IT department is considering two choices:a. A centralized database, where a single copy of the data is
3.12. Napster was a famous music exchange system that additionally offered many add-on services. It was sentenced to go out of business due to copyright infringement. The system worked as follows. The Napster server held a database of all music files offered by the participating users. Users had to
3.11. Retail is one of the first areas in adopting distributed data processing. Instead of centralizing the POS (point-of-sale) systems, retailers deploy distributed databases, so all of their POS systems are local, but linked to a central system. Prices for all merchandise are determined and
3.10. An online terminal system implemented on one computer is being used to service four cities. Discuss how the overall system availability could be increased bya. reducing the scope of failuresb. reducing the impact of failures GONT
Two data centers used for retail credit authorization are located in two different major population centers, which are separated from each other by a large zone of very little population. Each data center is intended to cover a particular geographical area and thus contains data that reflect the
In the client/server architecture, what in meant by the term server?
This chapter describes both “off the shelf” and “end user programming” as types of applications. Discuss what is meant by these terms and provide some examples of each.
This chapter describes several components and advantages of a fully centralized system.What might be some of the major drawbacks of a system like this?
While many systems are considered centralized such as a company mainframe performing financial functions, there are fewer and fewer “dumb terminals” accessing the mainframe. Instead, terminal emulation programs that simulate the terminal environment are used.The Windows operating system family
How many direct connections does it take to connect n computers together? (Hint:Count the number of “ends” of connections and divide by 2.) Suppose you have a computer in each of the 50 states in the United States; how many direct connections would you need?
You have just accepted the position as CIO for Holiday Inn. As your first official act, the CEO has asked you to assess the corporation’s computer operations (refer to Figure 3.1) and report back to her with your recommendation on whether to remain with the status quo (i.e., a centralized IS
The new corporate CIO (chief information officer) has devised a nine-point mission statement for the company’s Information Technology division (refer to Table 3.1).As one of the operations managers in the department, you have received a memo on the new policy and an associated task. The CIO wants
Why do we still need mainframe computers even though personal computers and workstations have become so much more powerful?
Name three types of communications and networking requirements generated by the use of distributed data processing.
How does a factory often reflect the use of distributed devices?
In designing a distributed database, database objectives and communications objectives are not always the same. Distinguish between these two sets of objectives.
Distinguish between horizontal and vertical partitioning of applications.
What are some reasons for wanting to interconnect distributed data processing systems?
What major problems for the data processing manager result from distributed small systems?
Applications for the distributed environment are available much sooner than those in the centralized environment.What are the main sources of these applications?
Based on your reading of the chapter, name five components that might be part of a fully centralized system.
What are some functions that are centralized in a fully centralized data processing facility?
Refer to Table 2.4 for a list and description of general system response time categories.Assume you are providing five computer systems for video game developer and the budget for hardware (e.g., CPU clock speed, RAM, bus data rate, disc I/O data rate, etc.) is limited by the consumer.The base
An MPEG-encoded video stream with a resolution of 720 × 480 pixels and a frame rate of 30 fps is transmitted over a network. An old workstation is meant to receive and display the video stream. It takes 56 milliseconds for the workstation to decode each received frame and display it on the screen.
A digital video camera provides an uncompressed output video stream with a resolution of 320 × 240 pixels, a frame rate of 30 fps, and 8 bits for quantization of each pixel.a. What’s the required bandwidth for the transmission of the uncompressed video stream?b. How much data storage space is
Commonly, medical digital radiology ultrasound studies consist of about 25 images extracted from a full-motion ultrasound examination. Each image consists of 512 by 512 pixels, each with 8 b of intensity information.a. How many bits are there in the 25 images?b. Ideally, however, doctors would like
A multimedia version of a multivolume reference book is being prepared for storage on compact disc (CD-ROM). Each disc can store about 700 MB (megabytes). The input to each volume consists of 1000 pages of text typed 10 characters to the inch, 6 lines to the inch, on 8.5-by-11-in. paper with 1-in.
When examining X-rays, radiologists often deal with four to six images at a time. For a faithful digital representation of an X-ray photograph, a pixel array of 2048 by 2048 is typically used with a grayscale of intensity for each pixel of 12 bits. As you would hope, radiologists do not look kindly
A drawing in a 8.5-by-11-inch sheet is digitized by means of a 300 dpi (dots per inch)scanner.a. What is the visual resolution of the resulting image (number of dots in each dimension)?b. If 8 bits are used for the quantization of each pixel, how much data storage space is needed to store the image
The text of the Encyclopaedia Britannica is about 44 million words. For a sample of about 2000 words, the average word length was 5.1 characters per word.a. Approximately how many characters are there in the encyclopedia? (Be sure to allow for spaces and punctuation between words.)b. How long would
Base64 encoding allows arbitrary sequences of octets to be represented by printable characters. The encoding process represents 24-bit groups of input bits as strings of four encoded characters.The 24-bit groups are formed by concatenating three octets.These 24-bit groups are then treated as four
A primary primitive (due to its atomic nature) data type available to most programming languages is the character data type.This data type has traditionally been represented internally to the computer system using the ASCII (7-bit) or Extended Binary-Coded Decimal Interchange Code, EBCDIC (8-bit)
In a document, what standard ASCII characters might fall into the category of invisible?
Review the IRA code in the document at this book’s Web site.a. Indicate the 7-bit code for the following letters:D,d, H, h.b. Repeat part (a), but this time show the 8-bit code that includes an odd parity bit.
IRA is a 7-bit code that allows 128 characters to be defined. In the 1970s, many newspapers received stories from the wire services in a 6-bit code called TTS. This code carried upper and lowercase characters as well as many special characters and formatting commands. The typical TTS character set
How many bits will it take to represent the following sets of outcomes?a. The uppercase alphabet A, B, . . . , Zb. The digits 0, 1, . . . , 9c. The seconds in a 24-hour dayd. The people in the United States (about 300,000,000 of them)e. Population of the world (about 6 billion)
A company’s telephone exchange digitizes telephone channels at 8000 smp/s, using 8 bits for quantization. This telephone exchange must transmit simultaneously 24 of these telephone channels over a communications link.a. What’s the required data rate?b. In order to provide answering-machine
The compact disc (CD) was originally designed to hold audio data. The information on the CD is arranged in a specific format that divides the data into segments. Hardware design considerations in effect at the time the CD was developed dictated that each second of audio would span exactly 75
How many CD-quality music channels can be transmitted simultaneously over a 10-Mbps Ethernet, assuming that no other traffic is carried on the same network and ignoring overhead?
What is considered an acceptable system response time for interactive applications and how does this response time relate to acceptable response times for Web sites?
Define response time.
Describe the process used to prevent flicker in a video screen.
List two common document formats.
List two common image formats.
Explain the basic principles of vector graphics and raster graphics.
What is the difference between a printable character and a control character?
What is the difference between Centrex and PBX?
The process that takes advantage of redundancy to reduce the number of bits sent for a given piece of data is called what?
What is the bandwidth of telephone voice?
What are the two different interpretations of the prefixes kilo, mega, and giga? Define a context in which each interpretation is used.
Showing 3900 - 4000
of 5138
First
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
Last
Step by Step Answers