Explore BrainMass

Explore BrainMass

    Error Detection & Correction

    BrainMass Solutions Available for Instant Download

    Throughput Points in Media

    Please reference this figure for the question: 16. Calculate the THROUGHPUT between Points B and G for the following cases: a. The media is copper with a length of 150,000 meters. The data rate is determined by multiplexing of 24-128kbps sources with a 10% overhead. Frame length is 500 bits. A Go-Back-N protocol is use

    The Currency Conversion Program

    Generate a set of test inputs and expected results for the Currency Conversion program. Post the test procedure as an attachment. Please see the attachment the Currency Conversion Program with the tables.

    6 questions inclduing character encoding, data streams, flags and parity.

    Please see attached file. The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four-character frame: A B ESC FLAG when each of the following framing method is used: (a) Character count. (b) Fla

    Level of fault tolerance needed

    Can you please assist with the follow? 1.How would you determine the level of fault tolerance needed for a particular business operational function? 2. Are there legal or regulatory considerations when determining the level of fault tolerance needed? 3. What are some of the tests performed to ensure the fault toleranc

    Buffering Streaming Media Data

    What is done by the industry to reduce buffer delay in streaming media. Please discuss 3 ways how minimizing buffer delay can be achieved.

    UDP checksum

    UDP uses 1's complement for its checksums. Suppose you have the following three 16-bit words0100010001000100, 0101010101010101, 0011001100110011. What is the 1's complement of the sum of these 16-bit words? Why is it that UDP takes 1's complement of the sum; that is why not just use the sum? With 1's complement scheme, how does

    Problems from Neural Networks, Cisco Meeting Place, and ES, DSS, and AI systems

    1. For the following, identify those that would be best suited for an expert system, decision support systems, or a more advanced AI system. Explain why. a. Helping students create a degree program. b. Determining how many cooks are needed each night at a large restaurant. c. Identifying potential criminals at an airport.

    File Systems, Remote Access, and Monitoring

    Andersen & Sons is a large marketing firm with four offices in the Chicago area. Each office has Windows Server 2003, and all servers are in a single domain. One office accommodates the administrative and business department, one is used for market research, and the other two are printing and publishing. The IT department in

    Network Selection is evaluated.

    Scenario: You are currently working for Surebank, a mid-size financial institution. The organization has approximately 80 people working in their main location where your office is located. The bank also has two branch locations. You have been very successful in your career as a Network Operation Specialist, serving at the

    Database Security

    If you want to create users with different levels of access and capabilities to manipulate the database within an organization, what issues must you keep in mind, based on your reading and knowledge of creating users and roles thus far? Why is user security important to organizations? Discuss database security from a variety of

    Database Users

    If you want to create users with different levels of access and capabilities to manipulate the database within an organization, what issues must you keep in mind, based on your reading and knowledge of creating users and roles thus far? Why is user security important to organizations? Discuss database security from a variety of

    Trouble Ticket Reporting Systems

    Search the Internet for two trouble ticket reporting systems. For each of these, consider the following: Describe the top five categories of problems. Within those five categories, what question occurs most frequently? What specific conclusions can you draw from looking at your answers to these questions? How might you h

    Networking

    1. What are the advantages and disadvantages to Mesh, Bus, Ring, and Star topologies? 2. What are the advantages and disadvantages to Ethernet, Token Ring, FDDI, and wireless?

    Major Reasons for IT Project Failures

    Statistics show that most projects fail for some reason or other. What are the major reasons for IT project failures? Hint: Is it due to problems with the project management life cycle, product development life cycle, incompetent project manager, poor execution, or what else? Be very specific when you identify the reason

    Destination address, Data Field

    Given the first 20 bytes (in hexadecimal) of an Ethernet frame: AA AA AA AA AA AA AA AB 01 23 45 67 89 AB CD EF 02 46 8A CE 01 0A 4B 8C ================================================ a) What is the Destination Address (in hexadecimal)? b) What is the length of the data field (in hexadecimal)? c) What is the length o

    Error correction

    Several techniques (typically referred to as forward error correction) can be used to add redundant bits to a message in order to help a receiver correct bits that have been damaged in transmission. One simple technique combines row-based (character) parity with column-based (longitudinal) parity to help detect and correct s

    Check Bits are worked.

    I need help figuring out the amount of check bits that are needed for a SEC code for an initial word size of 1024.