Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
0
votes
225
views
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
0
votes
0
answers
246
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
209
views
In TCP Header format if a device wants to send 8 bytes of data. Is it valid or not? Explain why
asked
Oct 1, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
1.3k
views
Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
22.5k
views
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
3.1k
views
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
2.0k
views
Telnet into a Web server and send a multiline request message. Include in the request message the If-modified-since: header line to force a response message with the 304 Not Modified status code.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
–1
vote
1
answer
1.3k
views
Duplicate: Three missionaries and three cannibals are on one side of a river, along with a boat that can hold one or two people. Find a way to get everyone to the other side, without ever leaving a group of missionaries outnumbered by cannibals.
asked
Aug 7, 2020
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
9.4k
views
Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
249
views
By writing the parity code (even) and threefold repetition code for all possible four-bit straight binary numbers, prove that the Hamming distance in the two cases is at least 2 in the case of the parity code and 3 in the case of the repetition code.
asked
Oct 13, 2021
in
Hardware Systems & Electronics
by
anonymous
+2
votes
1
answer
8.8k
views
Host Aand B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sending to Host B an enormous file over this connection.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
3.0k
views
Using Dijkstra’s algorithm finds the shortest path of following network by taking C as the source node. Determine the least cost paths also.
asked
Apr 25, 2021
in
Computer Networks
by
anonymous
+3
votes
1
answer
493
views
Suggest why an organisation with a competitive, elitist culture would probably find it difficult to introduce program inspections as a V & V technique.
asked
Mar 21, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
4.2k
views
Explain why program inspections are an effective technique for discovering errors in a program. What types of error are unlikely to be discovered through inspections?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
78
views
What is an intrusion detection system (IDS) and what are some general approaches that can be used to for it?
asked
Apr 14
in
Computer Networks
by
(user.guest)
0
votes
0
answers
498
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Dec 4, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
968
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
2.0k
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming...
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
0
votes
1
answer
2.6k
views
True or false: When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
200
views
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled with a rate 1 Mbps. The bucket is initially filled to capacity with 1 Mb. How long can the computer transmit at the full 6 Mbps?
asked
Apr 13
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.8k
views
True or false: Before an 802.11 station transmits a data frame, it must first send an RTS frame and receive a corresponding CTS frame.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.5k
views
What is meant by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented "monolithically." what do we mean?
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.0k
views
Suppose the IEEE 802.11 RTS and CTS frames were as long as the standard DATA and ACK frames. Would there be any advantage to using the CTS and RTS frames? Why or why not
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
8.2k
views
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Provide possible source and destination port numbers for a. The segments sent from A to S.
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
251
views
How many bytes are used to represent the Node ID in a class A network
asked
Nov 22, 2021
in
Computer Networks
by
(user.guest)
0
votes
0
answers
526
views
Suppose, in the following tavles, there are two relations: employee_details and log_employee respectively. Create a trigger to add some information into employee_details relation the same data will be inserted into log_ employee table.
asked
Dec 23, 2020
in
Database Management Systems
by
anonymous
0
votes
0
answers
189
views
Network Technology involves the use of data systems to manage and deliver digital resources over a computer network. From your point of view, which network technology is better for any case.
asked
May 25, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
469
views
How does Switch learn Mac Address when pc1 wants to communicate with pc2 and pc3? Explain the process with the help of diagram
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
248
views
How does Switch learn Mac Address when pc1 wants to communicate with pc2 and pc3? Explain the process with the help of diagram
asked
Nov 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.3k
views
Consider the count-to-infinity problem in the distance vector routing. Will the count-to-infinity problem occur if we decrease the cost of a link? Why? How about if we connect two nodes which do not have a link?
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
2.2k
views
Suppose two TCP connections are present over some bottleneck link of rate R bps. Both connections have a huge file to send (in the same direction over the bottleneck link).
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
116
views
Is it possible for TCP to send data-less packets on an established connection
asked
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
2.3k
views
Show how a single ternary constraint such as “A + B = C” can be turned into three binary constraints by using an auxiliary variable.
asked
Oct 2, 2019
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
1.9k
views
Skype offers a service that allows you to make a phone call from a PC to an ordinary phone. This means that the voice call must pass through both the Internet and through a telephone network. Discuss how this might be done.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
470
views
The Intel 8085 CPU is one of the many CPUs by Intel. Compare the Intel 8085 CPU with (a) Zilog Z80 CPU (b) Motorolla 6800 CPU in term of architecture, number of instructions, addressing modes and the supporting chips.
asked
Apr 27, 2021
in
Computer Architecture
by
anonymous
+2
votes
1
answer
1.1k
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.8k
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
979
views
Explain what is meant by a ‘compensation action’ and, using an example, show why these actions may have to be included in workflows.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
237
views
A bag contains 5 red and 4 blue identical balls, if two are selected at random, one after the other, with replacement, find the probability that the first ball is red and the second is blue
asked
Dec 5, 2021
in
Maths & Statistics
by
(user.guest)
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
510
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131.107.256.80
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
797
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid:
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.9k
views
Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
10.0k
views
Consider the circuit-switched network in Figure 1.13. Recall that there are 4 circuits on each link. Label the four switches A, B, C and D, going in the clockwise direction.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
3.2k
views
We noted that network layer functionality can be broadly divided into data plane functionality and control plane functionality. What are the main functions of the data plane? Of the control plane?
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
145
views
Let f : N → Y be a function defined as f(x) = 4x + 3, where, Y = {y ∈ N: y = 4x + 3 for some x ∈ N}. Show that f is invertible. Find the inverse.
asked
Sep 29, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
885
views
A fair coin is flipped three times. Let S be the sample space of the eight possible outcomes, and let X be the random variable that assigns to an outcome the number of heads in this outcome. What is the expected value of X?
asked
Jul 26, 2021
in
Maths & Statistics
by
anonymous
0
votes
1
answer
1.7k
views
What is a private network address? Should a datagram with a private network address ever be present in the larger public Internet? Explain.
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
266
views
Given that 0.04% of vehicles break down when driving through a certain tunnel find the probability of (a) no (b) at least two breakdowns in an hour when 2,000 vehicles enter the tunnel?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
0
votes
0
answers
255
views
Your friend also wants to know why congestion occurs and how to prevent it? Provide proper explanation.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...