All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer science
computer networking
Questions and Answers of
Computer Networking
In Chord, assume the size of the identifier space is 16. The active nodes are N3, N6, N8, and N12. Show the finger table (only the target-key and the successor column) for node N6.
Distinguish between centralized and decentralized P2P networks.
Can H.323 also be used for video?
Do some research and find out if SIP can provide the following services provided by modern telephone sets.a. Caller-IDb. Call-waitingc. Multiparty calling
Can the combination of RTP/RTCP and SIP operate in a wireless environment? Explain.
In which situation, a unicast session or a multicast session, can feedback received from an RTCP packet about the session be handled more easily by the sender?
Assume two parties need to establish IP telephony using the service of RTP. How can they define the two ephemeral port numbers to be used by RTP, one for each direction?
We discuss the use of SIP in this chapter for audio. Is there any drawback to prevent using it for video?
We mentioned that SIP is an application-layer program used to provide a signalling mechanism between the caller and the callee. Which party in this communication is the server and which one is the
Does SIP need to use the service of RTP? Explain.
Why does RTP need the service of another protocol, RTCP, but TCP does not?
Can we say UDP plus RTP is the same as TCP?
Assume an application program uses separate audio and video streams during an RTP session. How many SSRCs and CSRCs are used in each RTP packet?
UDP does not create a connection. How are different chunks of data, carried in different RTP packets, glued together?
Assume an image is sent from the source to the destination using 10 RTP packets. Can the first five packets define the encoding as JPEG and the last five packets define it as GIF?
Are encoding and decoding of the multimedia data done by RTP? Explain.
If we capture RTP packets, most of the time we see the total size of the RTP header as 12 bytes. Can you explain this?
Can UDP without RTP provide an appropriate service for real-time interactive multimedia applications?
Both TCP and RTP use sequence numbers. Do sequence numbers in these two protocols play the same role? Explain.
Explain why RTP cannot be used as a transport-layer protocol without being run on the top of another transport-layer protocol such as UDP
In a real-time multimedia communication, assume we have one sender and ten receivers. If the sender is sending multimedia data at 1 Mbps, how many RTCP packets can be sent by the sender and each
When we use audio/video on demand, which of these three types of multimedia communication takes place: streaming stored audio/video, streaming live audio/video, or real-time interactive audio/video?
Given an RTP packet with the first 8 hexadecimal digits as (86032132)16, answer the following questions:a. What is the version of the RTP protocol?b. Is there any padding for security?c. Is there any
Figure 28.43 shows the generated and the arrival time for ten audio packets. Answer the following questions:Figure 28.43a. If we start our player at t8, which packets cannot be played?b. If we start
In the fourth approach to streaming audio/video (Figure 28.27), what is the role of RTSP?Figure 28.27 Server machine Client machine GET: metafile Web Browser RESPONSE server 3 Metafile SETUP RESPONSE
When we stream stored audio/video, what is the difference between the second approach (Figure 28.25) and the third approach (Figure 28.26)?Figure 28.25Figure 28.26 Server machine Client machine GET:
In Figure 28.31, what is the amount of data in the playback buffer at each of the following times?Figure 28.31a. 00:00:17b. 00:00:20c. 00:00:25d. 00:00:30 At time 00:00:08 Arrival Playback 7 At time
In the first approach to streaming stored audio/video (Figure 28.24), assume that we need to listen to a compressed song of 4 megabytes (a typical situation). If our connection to the Internet is via
When we stream stored audio/video, what is the difference between the first approach (Figure 28.24) and the second approach (Figure 28.25)?Figure 28.24Figure 28.25 Server machine Client machine GET:
Assume an image uses a palette of size 8 out of the table used by JPEG (GIF uses the same strategy, but the size of the palette is 256), with the combination of the following colors with the
In multimedia communication, assume a sender can encode an image using only JPEG encoding, but the potential receiver can only decode an image if it is encoded in GIF. Can these two entities exchange
Using one-dimensional DCT encoding, calculate the M matrix from the following three p matrices (which are given as row matrices but need to be considered as column matrices). Interpret the result.p1
Explain why the combination of quantization/dequantization steps in JPEG is a lossy process even though we divide each element of the matrix M by the corresponding value in matrix Q when quantizing
Calculate the T matrix for DCT when N = 1, N = 2, N = 4, and N = 8.
In JPEG, explain why we need to round the result of division in the quantization step.
Explain why using Q10 gives a better compression ratio but a poorer image quality than using Q90 (see Figure 28.18).Figure 28.18 Figure 28.18 Three different quantization matrices 80 60 50 80 120 200
In JPEG, explain why the values of the Q(m, n) in the quantization matrix are not the same. In other words, why is each element in M(m, n) not divided by one fixed value instead of a different value?
In one-dimensional DCT, if N = 1, the matrix transformation is changed to simple multiplication. In other words, M = T × p, in which T, p, and M are numbers (scalar value) instead of matrices. What
In JPEG, do we need less than 24 bits for each pixel if our image is using one or two primary colors? Explain.
Assume we have the following code. Show how we can calculate the reconstructed value (yn) for each sample if we use ADM. Let y0 = 20, Δ1 = 4, M1 = 1. Also assume that Mn = 1.5 × Mn–1 if qn =
In transform coding, when a sender transmits the M matrix to a receiver, does the sender need to send the T matrix used in calculation? Explain.
What is the problem with a speech signal that is compressed using the LPC method?
In predictive coding, we have the following code. Show how we can calculate the reconstructed value (yn) for each sample if we use delta modulation (DM). We know that y0 = 8 and Δ = 6. 1 2 3 4 5 7 8
What is the difference between DM and DPCM?
In predictive coding, assume we have the following sample (xn).a. Show the encoded message sent if we use delta modulation (DM). Let y0 = 10 and Δ = 8.b. From the calculated qn values, what can you
Answer the following questions about predictive coding:a. What are slope overload distortion and granular noise distortion in DM coding?b. Explain how ADM coding solves the above errors.
In arithmetic coding, assume we have received the code 100110011. If we know that the alphabet is made of four symbols with the probabilities of P(A) = 0.4, P(B) = 0.3, P(C) = 0.2, and P(*) = 0.1,
Compare the number of bits transmitted for each PCM and DM sample if the maximum quantized value isa. 12b. 30c. 50
Given the message “ACCBCAAB*”, in which the probabilities of symbols are P(A) = 0.4, P(B) = 0.3, P(C) = 0.2, and P(*) = 0.1,a. find the compressed data using arithmetic coding with a precision of
In predictive coding, differentiate between DPCM and ADPCM.
In SCTP, a packet is carrying a COOKIE ACK message and a DATA chunk. If the user data is 20 bytes, what is the size of the packet?
Write a method in Java to find the first address (network address) in the block when one of the addresses in the block is given as a string representing a CIDR notation.
Show the encoding for the INTEGER 1456 using BER.
Given the code 02040000C738, decode it using BER.
Can an SNMP message reference a leaf node in the MIB tree? Explain.
Assume a manageable object has only three simple variables. How many leaves can be found in the MIB tree for this object?
Assume a manageable object has a table with three columns. How many leaves are there in the MIB tree for this table?
Distinguish between a GetRequest PDU and a SetRequest PDU.
In SNMP, which of the following PDUs are sent from a client SNMP to a server SNMP?a. GetRequestb. Responsec. Trap
What are the source and destination port numbers when an SNMP message carries one of the following PDUs?a. GetRequestb. Responsec. Trapd. Report
In dictionary coding, if there are 60 characters in the message, how many times is the loop in the compression algorithm iterated? Explain.
A program for coding and decoding the first version of the run-length compression method.A program for coding and decoding the second version of the run-length compression method.
Given the following message, find the compressed data using run-length coding.AAACCCCCCBCCCCDDDDDAAAABBB
In dictionary coding, should all dictionary entries that are created in the process be used for encoding or decoding?
A program for coding and decoding the second version of the run-length compression method.
Given the following message, find the compressed data using the second version of run-length coding with the count expressed as a four-bit binary number.10000001000001000000000000010000001
In an alphabet with 20 symbols, what is the number of leaves in a Huffman tree?
In dictionary coding, can you easily find the code if the message is each of the following (the message alphabet has only one character)?a. “A”b. “AA”c. “AAA”d. “AAAA”e. “AAAAA”f.
Is the following code an instantaneous one? Explain. 11 001 011 111 00 01 10
A program for encoding and decoding arithmetic compression.
In LZW coding, the message “AACCCBCCDDAB” is given.a. Encode the message. (See Figure 28.2.)Figure 28.2b. Find the compression ratio if we use 8 bits to represent a character and four bits to
Assume a message is made of four characters (A, B, C, and D) with equal probability of occurrence. Guess what the encoding Huffman table for this message would be. Does encoding here really decrease
A program that reads a two-dimensional matrix of size N × N and writes the values using zigzag ordering described in the chapter.
In LZW coding, the code “0026163301” is given. Assuming that the alphabet is made of four characters: “A”, “B”, “C”, and “D”, decode the message. (See Figure 28.3.)Figure 28.3
In arithmetic coding, could two different messages be encoded in the same interval? Explain.
A program that finds the DCT transform of a one-dimensional matrix. Use matrix multiplication.
Given the message “AACCCBCCDDAB”, in which the probabilities of symbols are P(A) = 0.50, P(B) = 0.25, P(C) = 0.125, and P(D) = 0.125,a. encode the data using Huffman coding.b. find the
In predictive coding, differentiate between DM and ADM.
A program that finds the DCT transform of a two-dimensional matrix. Use matrix multiplication.
In Huffman coding, the following coding table is given.A → 0 B → 10 C → 110 D → 111Show the original message if the code
Assume object x has two simple variables: an integer and an IP address. What is the identifier for each variable?
Which of the following is not part of configuration management?a. Reconfigurationb. Rncryptionc. Documentation
Assume object x has only one table with two columns. What is the identifier for each column?
A network manager decides to replace the old router that connects the organization to the Internet with a more powerful one. What area of network management is involved here?
Assume object x has two simple variables and one table with two columns. What is the identifier for each variable and each column of the table? We assume that simple variables come before the table.
A network manager decides to replace a version of accounting software with a new version. What area of network management is involved here?
Assume object x has one simple variable and two tables with two and three columns respectively. What is the identifier for the variable and each column of each table? We assume that the simple
Distinguish between reactive fault management and proactive fault management.
Object x has two simple variables. How can SNMP refer to the instance of each variable?
If network management does not replace a component whose lifetime has been expired, what area in network management has been ignored?
Object x has one table with two columns. The table at this moment has three rows with the contents shown below. If the table index is based on the values in the first column, show how SNMP can access
Distinguish between internal and external data traffic in an organization.
One of the objects (groups) that can be managed is the ip group with the object identifier (1.3.6.1.2.1.4) in which (1.3.6.1.2.1) is the identifier of MIB-2 and (4) defines the ip group. In an agent,
Which of the following devices cannot be a manager station in SNMP?a. A routerb. A hostc. A switch
Show the encoding for the OCTET STRING "Hello world." using BER.
Does an SNMP manager run a client SNMP program or a server SNMP program?
Show the encoding for the IPAddress 112.56.23.78 using BER.
Show how the textual name "iso.org.dod" is numerically encoded in SMI.
Show the encoding for the object identifier 1.3.6.1.2.1.7.1 (the udpInDatagram variable in udp group) using BER.
Is it possible to have a textual name in SMI as "iso.org.internet"? Explain.
Showing 600 - 700
of 2026
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last