Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Jobs
Ask a Question
Calculate the checksum for the following bits: Data 1- 0110101111000100 Data 2- 1111010100001101 Data 3- A B C D
0
votes
373
views
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
Calculate the checksum for the following bits: Data 1- 0110101111000100 Data 2- 1111010100001101 Data 3- A B C D
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+2
votes
1
answer
44
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1)?
asked
Aug 30
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
61
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1).
asked
Aug 27
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
3.9k
views
Consider the circuit-switched network in Figure 1.13. Recall that there are 4 circuits on each link. Label the four switches A, B, C and D, going in the clockwise direction.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.7k
views
Match the following to one or more layers of the OSI model: a) Provides independence from differences in representation b) HTTP, FTP and SMTP. c) Bellman Ford Algorithm. d) Reliable end to end Process. e) Interface to transmission media.
asked
Jun 16
in
Computer Architecture
by
anonymous
–1
vote
1
answer
797
views
Duplicate: Determine the correct class of the following IP addresses: Address Class? 191.107.2.10 172.16.16.15 200.200.5.2 3.3.57.0 131.107.2.89 b) Which address class(es) in above table will allow you to have more than 1000 hosts per network?
asked
Nov 27, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
59
views
Two events A and B are such that P(A) = 0.5, P(B) = 0.3 and P(A ∩ B) = 0.1. Calculate
asked
Sep 20
in
Maths & Statistics
by
anonymous
0
votes
0
answers
87
views
Convert the following from base 10(Decimal) into base 2(binary) in a binary floating point representation. a. 55 = ? × 2 ? b. 11 = ? × 2 ? c. 525 = ? × 2 ?
asked
Mar 27
in
Numerical Methods
by
anonymous
+2
votes
1
answer
189
views
Signals will be exchanged between at the___________ of the TCP/IP Model? 1- network layer 2-data link layer 3-physical layer 4-application laye
asked
Jul 14
in
Computer Networks
by
anonymous
0
votes
0
answers
301
views
The analog signal is given as x(t)= 2 sin 480t + 3 sin 720t. Calculate 1) Maximum Frequency ii) Nyquist Rate iii) Sampling Theroum
asked
Mar 3
in
Others
by
anonymous
+1
vote
1
answer
277
views
In a large consignment of electric bulb 10% are defective.A random sample of 20 is taken for inspection.Find the probability that a)all are good bulbs b) there are almost 3 defective bulbs c)there are exactly 3 defective bulbs.
asked
Aug 31
in
Maths & Statistics
by
anonymous
0
votes
0
answers
157
views
Suppose you wish to prove that the following is true for all positive integers nby using the Principle of Mathematical Induction: 1 + 3 + 5 + ... + (2n -1) =n2(a) Write P(1)
asked
Dec 22, 2020
in
Maths & Statistics
by
anonymous
–1
vote
1
answer
532
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
3.4k
views
Classify the following signals according to whether they are (1) one- or multi-dimen-sional; (2) single or multichannel, (3) continuous time or discrete time, and (4) analog or digital (in amplitude)
asked
Oct 1, 2019
in
Hardware Systems & Electronics
by
anonymous
+1
vote
1
answer
23
views
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
Aug 30
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
41
views
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
Aug 27
in
Maths & Statistics
by
anonymous
0
votes
0
answers
138
views
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
May 7
in
Computer Networks
by
(user.guest)
0
votes
0
answers
435
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7
in
Computer Networks
by
anonymous
0
votes
0
answers
145
views
Consider the K-means cost function for clustering N d-dimensional data points into K clusters. Compute the optimal parameters when K = 1. Derive the optimal parameters of the model when K = N.
asked
Aug 7, 2020
in
Artificial Intelligence
by
anonymous
0
votes
0
answers
182
views
Compare the relative merits of the 3 cache memory organizations. a. Direct-mapping cache b. Fully-associative cache c. Set-associative cache.
asked
Jun 5
in
Computer Architecture
by
anonymous
+2
votes
1
answer
538
views
Find the net ID and host ID of the following IP Addresses? I. 114.34.2.8 II. 19.34.21.5 III. 23.67.12.1 IV. 127.23.4.0 V. 192.34.5.1
asked
Jul 13
in
Computer Networks
by
anonymous
0
votes
0
answers
122
views
For the two-sender, two-receiver example, give an example of two CDMA codes containing 1 and -1 values that do not allow the two receivers to extract the original transmitted bits from the two CDMA senders.
asked
May 22
in
Computer Networks
by
anonymous
0
votes
0
answers
114
views
For the two-sender, two-receiver example, give an example of two CDMA codes containing 1 and -1 values that do not allow the two receivers to extract the original transmitted bits from the two CDMA senders.
asked
May 22
in
Computer Networks
by
anonymous
0
votes
0
answers
116
views
For the two-sender, two-receiver example, give an example of two CDMA codes containing 1 and 21 values that do not allow the two receivers to extract the original transmitted bits from the two CDMA senders.
asked
May 22
in
Computer Networks
by
anonymous
+2
votes
1
answer
56
views
A fair coin is tossed, and a fair die is thrown. Write down sample spaces for (a) the toss of the coin; (b) the throw of the die; (c) the combination of these experiments.
asked
Sep 20
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
298
views
Give an example of an application in which data in a file should be accessed in the following order: a. Sequentially b. Randomly
asked
May 20
in
Compilers & Operating Systems
by
anonymous
+3
votes
1
answer
1.0k
views
If a port number is 16 bits (2 bytes), what is the minimum header size at transport layer of the TCP/IP protocol suite?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
42
views
A probability function is given by p(0) = 0.3164, p(1) = 0.4219, p(2) = 0.2109, p(3) = 0.0469, and p(4) = 0.0039. Find its mean and variance.
asked
Aug 30
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
661
views
If a physical address is 48 bits (6 bytes) what is the minimum header size at the data link layer of the TCP/IP protocol suite?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
1.0k
views
Specify, design, and implement a software tool that will compute the cyclomatic complexity for the C/C++ programming language. Use the graph matrix as the operative data structure in your design.
asked
Jun 23, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
8.5k
views
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
367
views
Argue that for the distance-vector algorithm in Figure 4.30, each value in the distance vector D(x) is non-increasing and will eventually stabilize in a finite number of steps.
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
130
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16
in
Computer Networks
by
anonymous
0
votes
0
answers
123
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16
in
Computer Networks
by
anonymous
0
votes
0
answers
100
views
A 2 Gbps link supports a maximum of 5000 users under circuit switching. At what rate are the users generating data
asked
Dec 14, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
5.3k
views
Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
4.2k
views
Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
4.1k
views
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Provide possible source and destination port numbers for a. The segments sent from A to S.
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.8k
views
Suppose that the UDP receiver computes the Internet checksum for the received UDP segment and finds that it matches the value carried in the checksum field. Can the receiver be absolutely certain that no bit errors have occurred? Explain.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
232
views
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
Apr 8
in
Computer Networks
by
anonymous
+1
vote
1
answer
47
views
By writing the parity code (even) and threefold repetition code for all possible four-bit straight binary numbers, prove that the Hamming distance in the two cases is at least 2 in the case of the parity code and 3 in the case of the repetition code.
asked
Oct 13
in
Hardware Systems & Electronics
by
anonymous
0
votes
1
answer
2.4k
views
What is the 32-bit binary equivalent of the IP address 223.1.3.27?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
662
views
Using Dijkstra’s algorithm finds the shortest path of following network by taking C as the source node. Determine the least cost paths also.
asked
Apr 25
in
Computer Networks
by
anonymous
+1
vote
1
answer
230
views
Suppose a book-shelf has 6 mathematics texts, 3 physics texts, 4 chemistry texts, and 5 computer science texts. Find the number n of ways a student can choose: a) one of the texts. b) one of each type of text.
asked
Dec 29, 2020
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
1.5k
views
Suppose Host A sends Host B a TCP segment encapsulated in an IP data-gram.
asked
Oct 1, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
207
views
In what way does a hash provide a better message integrity check than a checksum (such as the Internet checksum)?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
59
views
Given that 0.04% of vehicles break down when driving through a certain tunnel find the probability of (a) no (b) at least two breakdowns in an hour when 2,000 vehicles enter the tunnel?
asked
Aug 30
in
Maths & Statistics
by
anonymous
0
votes
0
answers
102
views
Network Technology involves the use of data systems to manage and deliver digital resources over a computer network. From your point of view, which network technology is better for any case.
asked
May 25
in
Computer Networks
by
anonymous
0
votes
0
answers
254
views
Read the narrative that follows and use it to answer question 5.1 and 5.2. 5.1 Identify all the relationships/business rules. (12) 5.2 Draw a domain class diagram.
asked
Jun 6
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.5k
views
Imagine a situation where 2 developers are simultaneously modifying 3 different software components. What difficulties might arise when they try to merge the changes that they have made?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
58
views
You play draughts against an opponent who is your equal. Which of the following is more likely: (a) winning three games out of four or winning five out of eight; (b) winning at least three out of four or at least five out of eight?
asked
Sep 20
in
Maths & Statistics
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...