Premium Essay

Mis 589

In:

Submitted By maoliver1
Words 534
Pages 3
PROBLEM QUESTIONS WEEK 1
Professor Milham- MIS 589

 P3. Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k time units, where k is small and fixed). Also, when such an application starts, it will continue running for a relatively long period of time. Answer the following questions, briefly justifying your answer: * a. Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why? For this scenario, circuit switching would work best because you have dedicated channels that will all for uninterrupted transmission even when there are quiet periods (no transfer) on the medium. There are inherent delays with packet switching (setup time, etc.) that are ideal for services such as voice or video streaming. * b. Suppose that a packet-switched network is used and the only traffic in this network comes from such applications as described above. Furthermore, assume that the sum of the application data rates is less than the capacities of each and every link. Is some form of congestion control needed? Why? Yes, this network should still have some measures of congestion control for several reasons. Although the scenario describes a application that runs periodically for a long period of time, it does not provide the number of users, if any, that will be using this same service. Further, there are other types of delays that must be considered such as nodal processing delay, queuing delay, transmission delay, and propagation delay.
 P4. Consider the circuit-switched network in Figure 1.13. Recall that there are 4 circuits on each link. Label the four switches A, B, C and D, going in the clockwise direction. * a. What is the maximum number of simultaneous connections that can be in progress at any one time in this network? There could be

Similar Documents

Free Essay

Mis 589 Week 1 Homework

...Week 1 Assignment Your Name Here MIS 589 Networking Concepts and Apps Keller Graduate School of Management Chapter 1 problem 3a and 3b Answer: (a) I think a circuit switched network would be better than a packet switched network in this case. Because when the application starts it will run for a long period of time this works well with a circuit switched network, also the cost of setting it up would be low. (b) Based on having enough bandwidth there is no need for congestion control. The network can handle all of the application data rates. Chapter 1 problem 4a, 4b and 4c Answer: (a) All four links can be connected at the same time, this allows for there to be 16 connections at the same time. (b) There can be 8 connections between A and C. (c) Yes all the calls can be routed through the four lines. Chapter 1 problem 18 Answer: For this problem I used a trace route from my home in Jacksonville, FL to www.google.com (a) The average times for three hours were 46.7 ms, 47.3 ms, 46.3 ms respectively. (b) There were 13 routers/hops to the destination and the path's stayed the same. (c) The packets passed through two ISP's. (d) For this portion I used www.stella-net.net which is in France. The average times for three hours were126.67 ms, 126,33 ms, 130.67ms respectively. There were 13 routers/hops to the destination and the path's stayed the same. The packets passed through four ISP's. Chapter 2 problem 1a, 1b, 1c, 1d, 1e Answer: (a) False, (b) True...

Words: 322 - Pages: 2

Free Essay

Mis 589 Week 7 Homework

...Steven Le Week 7 Text Book Questions Chapter 9—Questions R2, R4, R7 MIS 589: Networking Concepts and Applications Keller University Chapter 9 R2. What are the five areas of network management defined by the ISO? The five areas of network management are: Performance management, fault management, configuration management, accounting management, security management. Kurose, J. F., & Ross, K. W. (2012). Computer Networking: A Top-Down Approach, VitalSource for DeVry University, 6th Edition. [VitalSource Bookshelf version]. Retrieved from http://devry.vitalsource.com/books/9781256938590/id/ch09lev1sec6 R4. Define the following terms: managing entity, managed device, management agent, MIB, network management protocol. Managing entity: control the network management information and to control the devices in the network. Managed device: a piece of network equipment that is under the control of the managing entity. Management agent: a software process running on a managed device that communicated with the managing entity and takes action on the managed device under the control of the managing entity. MIB: pieces of information associated with all of the managed objects in a device. Network management protocol: runs between the managing entities of the management agents on the managed devices. Kurose, J. F., & Ross, K. W. (2012). Computer Networking: A Top-Down Approach, VitalSource for DeVry University, 6th Edition. [VitalSource Bookshelf version]...

Words: 283 - Pages: 2

Premium Essay

Mis 589 Homework Week 2

...Homework 1. Multi-point is a line or circuit interconnecting several stations/nodes in a sequential fashion. Point-to-point is a circuit or line that has only two terminals 2. Guided media are the physical links through which signals are confined to narrow path. Three common types of bounded media are used of the data transmission. These are Coaxial Cable, Twisted Pairs Cable, and Fiber Optics Cable. Twisted pair A pair of wires used in standard telephone wiring. They are twisted to reduce interference caused by the other twisted pairs in the same cable bundle. Twisted-pair wires go from homes and offices to the telephone company end office. Fiber-optic cable A transmission medium that uses glass or plastic cable instead of copper wires. Coaxial cable An insulated wire that runs through the middle of a cable. A second braided wire surrounds the insulation of the inner wire like a sheath. Used on LANs for transmitting messages between devices. 6. Analog Transmission Transmission of a continuously variable signal as opposed to a discrete on/off signal. The traditional way of transmitting a telephone or voice signal is analog. Digital transmission Is the transmission of binary electrical or light pulses in that it only has two possible states, a 1 or a 0. The most commonly encountered voltage levels range from a low of +3/−3 to...

Words: 252 - Pages: 2

Premium Essay

Mis 589 Week 2 Homework

...Week 2 Homework assignment R3) What are some of the possible service that a link-layer protocol can offer to the network layer? Which of these link layer services have corresponding services in IP? In TCP? Some of the possible services that can be offered by a link-layer protocol include Framing which encapsulates each network-layer datagram within a link layer frame prior to transmitting. Link access, Reliable delivery and Error detection and correction are the remaining services offered by a link-layer protocol. Reliable delivery has a corresponding service in TCP. Link access has corresponding services in IP. Suppose two nodes start to transmit at the same time a packet of length L over a broadcast channel of Rate R. Denote the propagation delay between the two nodes as dprop. Will there be a collision if dprop <L/R? Why or Why not. Since both nodes are transmitting at the same time, I assume Dprop would be N1/N2 =1. The efficiency is 1/ (1+ 5(1)/ dtrans. The test states that as Dprop approaches 0, the efficiency approaches 1 and vice versa. So, since dprop is 1 the efficiency is towards 0 which would suggest a collision. How big is the MAC address space? The IPv4 address space? The IPv6 address space The MAC address space is 6 bytes long or 2*48 possible MAC addresses. 281474976710656 possible MAC addresses. MAC addresses are managed by the IEEE assuring no two adapters have duplicate addresses. The addresses are normally in Hexadecimal format. The...

Words: 305 - Pages: 2

Free Essay

Army Aviation in Low Intensity Conflict

...ARMY AVIATION OPERATIONS IN LOW INTENSITY CONFLICT Introduction “Foot slogging” by infantrymen has been most important and fundamental to address an insurgency; however, there are limitations to their mobility. To increase their versatility, the Portuguese introduced two contrasting means, the helicopter and the horse. While there were other, more conventional solutions to the mobility problem, such as trucks, jeeps, and light armored cars, these vehicles required at least crude roads, had other terrain limitations, and were vulnerable to land mines. The advent of the helicopter and its application in counter-insurgency began with the British in Malaya on 1 April 1950, with the formation of the Far East Casualty Air Evacuation Flight at Seletar with strength of three Westland S-51 Dragonfly helicopters. During the Malayan Emergency the British used their helicopters primarily for casualty evacuation and later for airlifting troops. Question that looms ahead for the future, no matter what the outcome in Jammu and Kashmir, and North Eastern States, is how the army aviation succeeds against fierce insurgency in strategy and capabilities. The Taliban’s resurgence, tenacious resistance against NATO forces in Afghanistan, Al Qaeda’s ability to elude United States forces, and the trouble Israel has had in trying to subdue violence in tiny Southern Lebanon (Hezbollah) and tinier Gaza (Hamas) deepen concern that even world’s finest militaries have problems against any kind...

Words: 9536 - Pages: 39

Free Essay

Rizal: Hidden Beneath the Surface

...Nikki Vanessa V. Novales July 20, 2012 # 2012-42443 PI 10 E2-6R Rizal: Hidden Beneath The Surface A Reaction Paper On “Bayaning 3rd World” “Who is Rizal?” If you ask this question to any Filipino, they will most likely say, “He is our national hero” Or “He’s the person stamped on our 1-peso coin”. But is that all he really is? The movie “Bayaning 3rd World” is about two film makers trying to make a movie about Rizal. They found out, however, that this would not be an easy task, for their subject is a very complicated man. Rather than focusing on a single issue about Rizal, they decided to make a detective story about Rizal being the country’s national hero. They tackled several issues but focused mainly on Rizal’s retraction and Josephine Bracken. The movie was meant to be educational, but unlike most documentaries, “Bayaning 3rd World” is definitely not boring. The documentary was presented in a comical way, so that viewers of all ages would be able to understand it and grasp its meaning. I was confused at first because I didn’t know what the “Retraction Controversy” was and the two film makers started having these long conversations about it without explaining it to the viewers. But when I found out what it was all about, following the flow of the story became easy. Another controversy that arose was about Josephine Bracken, on whether she and Rizal were married or not. It was implied that if they were indeed married, then Rizal retracted...

Words: 993 - Pages: 4

Free Essay

Mis589 Week 4 You Decide

...Kimberly Pulda MIS 589 Week 4 You Decide To me there are a few important issues that need to be addressed. The first issue that needs to be fixed is from John Fischer. He states that his laptop operates at 10 megabits. That is really slow especially since it should have been running at 100 megabits. I would fix this by using a Category 6 UTP 1000 Base F Ethernet because it increases the maximum data transfer rate a hundredfold. For example it will take it from 10 megabits to 1 gigabyte per second! This type of transfer rate would definitely clear up congestion on the network, so there would not be issues in the morning when everyone is online doing attendance and checking emails. Even with the 23 other classrooms added to the network which will solve the principles issues with the slow network and the connection of all the classrooms. This type of bandwidth would make John happy because he is a HVAC Technician, and this will be usefull fort the remote access to his devices from home. This solution should make it easier for network accessories and peripherals such as printers and print servers. By working with such cabling with a built in CSMA/CD (Carrier Sense Multiple Access with Collision Detection) contention-based media access control technique, help address and solve the problem of collisions. To continue on, by assigning each network interface card (NIC) on each personal computer, it will minimize collisions to a number that users will not even see. Seeing...

Words: 587 - Pages: 3

Premium Essay

Market Equilibration Process

...Market Equilibration Process Lindsey Brito Prof. Boloorian ECON/561 LDR531 Market Equilibration Process The United States of America is essentially a free market economy, because it is facilitated by supply and demand within our society. Although, America is essentially a free market there is still some government regulations put in place to guarantee fair practices. A true free market would mean that buyers and sellers would conduct their business without any government regulations. A free market that we all see and experience is the automaker market. Numerous automakers are in constant competition to ensure that their product is outperforming the other products on the market. The automakers industry is facilitated by supply and demand. For example when we saw automobiles featuring things such as, the rearview camera, blind spot check, and so on, initially in the luxury cars. Now all automakers have innovated to create new features to compete with other automakers. Another example of how efficient and innovative automakers can be is, with the demand for automobiles with better fuel efficiency; we are now seeing cars from mid-size to SUV’s with exceptional fuel efficiency. All this innovation was done without any government regulations or mandates. Now we have American automakers competing with foreign automakers in regards to the features and fuel efficiency that each automaker is introducing into the market. When gas and oil prices began to rise, we then saw...

Words: 586 - Pages: 3

Premium Essay

Project Management

...Angel Carrasquilla D40123142 MIS-589: Networking Concepts & Applications WEEK 1: Assignment 1 Chapter 1: Problem 3. Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k time units, where k is small and fixed). Also, when such an application starts, it will continue running for a relatively long period of time. Answer the following questions, briefly justifying your answer: a. Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why? b. Suppose that a packet-switched network is used and the only traffic in this network comes from such applications as described above. Furthermore, assume that the sum of the application data rates is less than the capacities of each and every link. Is some form of congestion control needed? Why? Answer: A circuit-switched network would be better in this case, because the application involves long sessions with predictable bandwidth requirements. Since the transmission rate is fixed and known, bandwidth can be reserved for each communication. In addition, there are no overhead costs for setting up and tearing down a circuit connection. a) A circuit-switched network would be well suited to the application described, because the application involves long sessions with predictable smooth bandwidth requirements. Since the transmission rate is known and not burst, bandwidth can...

Words: 845 - Pages: 4

Premium Essay

Laudon Ch5

...Management Information Systems MANAGING THE DIGITAL FIRM Kenneth C. Laudon New York University f Jane P. Laudon Azimuth Information Systems PEARSON feerttifie tall Pearson Education International Brief Contents Part One Chapter 1 Chapter 2 Chapter 3 Chapter 4 Part One Project Organizations, Management, and the Networked Enterprise 1 Information Systems in Global Business Today 2 Global E-Business: How Businesses Use Information Systems 38 Information Systems, Organizations, and Strategy 80 Ethical and Social Issues in Information Systems 124 Analyzing Business Processes for an Enterprise System 165 Part Two Chapter 5 Chapter 6 Chapter 7 Chapter 8 Part Two Project Information Technology Infrastructure 167 IT Infrastructure and Emerging Technologies 168 Foundations of Business Intelligence: Databases and Information Management 222 Telecommunications, the Internet, and Wireless Technology 260 Securing Information Systems 312 Creating a New Internet Business 351 Part Three Chapter 9 Chapter 10 Chapter 11 Chapter 12 Part Three Project Key System Applications for the Digital Age 353 Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 354 E-Commerce: Digital Markets, Digital Goods 388 Managing Knowledge 428 Enhancing Decision Making 470 Designing an Enterprise Information Portal 508 Part Four Chapter 13 Chapter 14 Chapter 15 Part Four Project Building and Managing Systems 509 Building Systems 510 Project Management:...

Words: 3508 - Pages: 15

Free Essay

Italy

...I HISTORY OF ITALY History The migrations of Indo-European peoples into Italy probably began about 2000 B.C. and continued until 1000 B.C. From about the 9th century B.C. until it was overthrown by the Romans in the 3rd century B.C. , the Etruscan civilization was dominant. By 264 B.C. , all Italy south of Cisalpine Gaul was under the leadership of Rome. For the next seven centuries, until the barbarian invasions destroyed the western Roman Empire in the 4th and 5th centuries A.D. , the history of Italy is largely the history of Rome. From 800 on, the Holy Roman Emperors, Roman Catholic popes, Normans, and Saracens all vied for control over various segments of the Italian peninsula. Numerous city-states, such as Venice and Genoa, whose political and commercial rivalries were intense, and many small principalities flourished in the late Middle Ages. Although Italy remained politically fragmented for centuries, it became the cultural center of the Western world from the 13th to the 16th century. Etymology The assumptions on the etymology of the name "Italia" are very numerous and the corpus of the solutions proposed by historians and linguists is very wide. According to one of the more common explanations, the term Italia, from Latin: Italia, was borrowed through Greek from the Oscan Víteliú, meaning "land of young cattle" (cf. Lat vitulus "calf", Umbvitlo "calf").The bull was a symbol of the southern Italic tribes and was often depicted goring the Roman wolf as a defiant symbol...

Words: 4042 - Pages: 17

Premium Essay

Natural Environment

...Natural environment From Wikipedia, the free encyclopedia For other uses, see Environment. See also: Nature and Environment (biophysical) Land management policies have been developed to preserve the natural characteristics of Hopetoun Falls, Australia while allowing ample access for visitors Bachalpsee in the Swiss Alps; generally mountainous areas are less affected by human activity. A satellite image of the Sahara desert; the world's largest hot desert and third-largest desert after Antarctica and the Arctic The natural environment encompasses all living and non-living things occurring naturally on Earth or some region thereof. It is an environment that encompasses the interaction of all living species.[1] The concept of the natural environment can be distinguished by components: * Complete ecological units that function as natural systems without massive civilized human intervention, including all vegetation, microorganisms, soil, rocks, atmosphere, and natural phenomena that occur within their boundaries * Universal natural resources and physical phenomena that lack clear-cut boundaries, such as air, water, and climate, as well as energy, radiation, electric charge, and magnetism, not originating from civilized human activity The natural environment is contrasted with the built environment, which comprises the areas and components that are strongly influenced by humans belonging to a civilized (i.e. hierarchically structured, agricultural, densely populated...

Words: 5733 - Pages: 23

Premium Essay

Alternate Banking

...Factors Influencing the Usage of Mobile Banking – Incident from a Developing Country Author: Mohammad Rokibul Kabir * *Assistant Professor, Department of Business Administration, International Islamic University Chittagong. Cell:8801191555211 ;email: rakibais@yahoo.com Abstract The study has been conducted to investigate the factors that influence the users of banking services to use mobile banking in Bangladesh. A self-administrated questionnaire had been developed and distributed among the clients of two full fledged mobile banking service providers of Bangladesh called Brac Bank Limited and Dutch Bangla Bank Limited. Out of the 100 questionnaires, only 64 useable questionnaires were returned, yielding a response rate of 64 percent. Results were subsequently analyzed by using multiple regressions. The influencing factors are analyzed under the four major factors Perceived Risk, Trust, Convenience, Relative Advantage under which several other factors have been explored. Factors such as performance risk, security/privacy risk, time risk, social risk and financial risk are found to be negatively related with the usages of Mobile Banking as perceived risk make the users confused about their security in using mobile banking while factors like ability, integrity, benevolence, perceived usefulness, perceived ease of use relative cost and time advantages are positively related with the intention to use mobile banking services. However, social security is the only factor found...

Words: 3975 - Pages: 16

Free Essay

Framework

...A Framework for Linking the Structure of Information Systems with Organizational Requirements for Information Sharing Author(s): Sunro Lee and Richard P. Leifer Reviewed work(s): Source: Journal of Management Information Systems, Vol. 8, No. 4 (Spring, 1992), pp. 27-44 Published by: M.E. Sharpe, Inc. Stable URL: http://www.jstor.org/stable/40397996 . Accessed: 18/03/2013 20:56 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp . JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. . M.E. Sharpe, Inc. is collaborating with JSTOR to digitize, preserve and extend access to Journal of Management Information Systems. http://www.jstor.org This content downloaded on Mon, 18 Mar 2013 20:56:30 PM All use subject to JSTOR Terms and Conditions A Framework Linking Structure for the of with Information Systems Organizational for Requirements Information Sharing LEE P. SUNRO ANDRICHARD LEDFER in candidate Management Information at Sunro Lee is a doctoral Systems Rensselaer His research interests include Institute. current issuesin methodological Polytechnic andtesting, decision information...

Words: 6895 - Pages: 28

Free Essay

American Ultra

...1 00:01:50,468 --> 00:01:52,269 Nereden başlamak istersiniz? 2 00:01:53,671 --> 00:01:54,672 <i>Faraş.</i> 3 00:01:54,673 --> 00:01:55,572 <i>Kaşık.</i> 4 00:01:55,573 --> 00:01:56,874 <i>Şehriye.</i> 5 00:01:57,476 --> 00:01:58,777 <i>Ayıcık.</i> 6 00:02:01,381 --> 00:02:02,582 <i>Tava.</i> 7 00:02:03,384 --> 00:02:04,438 <i>Yangın.</i> 8 00:02:04,439 --> 00:02:05,940 <i>Maymun Apollo. "Evlenir misin benimle?"</i> 9 00:02:10,946 --> 00:02:12,988 <i>İyi de her şey hangi noktada başlamıştı?</i> 10 00:02:30,006 --> 00:02:33,309 <i>...yürürlüğe girdi. İlerici İkiteker, dinle.</i> 11 00:02:34,851 --> 00:02:39,015 <i><b>Çeviri: Zafer BAYRAKTAR (ghost_rider_96)</b></i> 12 00:02:39,616 --> 00:02:44,435 <i>Pekâlâ. Her şey üç gün kadar önce Batı Virginia'nın Liman kasabasında başladı.</i> 13 00:02:53,330 --> 00:02:56,103 <i>Kız arkadaşım Phoebe'yle burada yaşıyorduk.</i> 14 00:03:00,007 --> 00:03:03,020 <i>Başıma gelen tek güzel şey, o.</i> 15 00:03:03,640 --> 00:03:08,444 <i>Ondan önceki hayatımı hatırlayamıyorum resmen.</i> 16 00:03:09,946 --> 00:03:13,249 <i>Dünyanın en mükemmel ve adam olmaz çiftiydik.</i> 17 00:03:13,250 --> 00:03:14,932 <i>Mükemmel...

Words: 16023 - Pages: 65