The token bucket algorithm is a popular method for traffic shaping (recap the algorithm in textbook Ch. 5.3.2). A computer uses a token bucket with a capacity of 400 megabytes (MB), and a rate of 10 MB per second. The machine starts generating 20 MB per second continuously when the bucket contains 200 MB. How long will it take to send 1000 MB?
Q: Please solve it correctly and please provide explanation of your answers. A PC and a Web Server…
A: Understanding sequence numbers and acknowledgments is crucial when it comes to TCP (Transmission…
Q: The latest super-duper supercomputer has memory locations that are 64-bits wide. What is the…
A: Understanding the representation of numbers in computer memory is a fundamental concept in computer…
Q: A bit (meaning binary digit) is 0 or 1. An ordered array of eight bits (such as01101001) is a byte.…
A: A byte will have eight bits. to find number of different bytes we have to find the number of…
Q: Please solve it correctly and please provide explanation of your answers. A PC and a Web…
A: In a TCP communication between a PC and a Web Server, the PC initiated the connection with a…
Q: A two digital number a ∗ 10 + b can form a link to the number a ∗ b. Note that there is not…
A: I have answered this question in step 2.
Q: Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure by…
A: note : The question was incomplete I'm doing this question with my experience on subject Answer :
Q: ppose the RSA cryptosystem is used for sending secret messages with the private key (15,3) and the…
A: Required: suppose the RSA cryptosystem is used for sending secret messages with the private key…
Q: Suppose you’re consulting for a bank that’s concerned about fraud detection, and they come to you…
A: →We have to use the divide and conquer method to divide the n cards seq S into two groups of n/2…
Q: A string is called a palindrome if it reads the same when reversed. That is, the string x1 x2 ... xn…
A: The solution for the above given question is given below:
Q: The Hi-Fi modem company has designed a new frequency modulation that can transmit 38400 bits/sec.…
A:
Q: One way to electrically or optically represent a binary 1 or 0 is to use the transition between a…
A: GIVEN: One way to electrically or optically represent a binary 1 or 0 is to use the transition…
Q: Develop a simulation program to simulate an 8-port Ethernet switch. The switch initially has no…
A: C program is a general purpose programming language. It was developed by Dennis Ritchie in the year…
Q: Write a program to simulate the behavior of the CSMA/CD protocol over Ethernet when ther are N…
A: Actually, CSMA/CD is Carrier Sense Multiple Access with Collision Detection , Which carries…
Q: When Bob wants to send Alice a message M on the Internet, he breaks M into n data packets, numbers…
A: Alice can use the fragmentation scheme as in computer networks. Let's say the message size is…
Q: Pet
A: The Vigenère cipher is a polyalphabetic substitution cipher, which means it uses multiple…
Q: A messaging system reads message as 4-digit positive integer d1d2d3d4 and stores encoding of the…
A: Algorithm: Start READ n Set i=4, j=0 and e=0 Compute: rem=n%10; Compute: e=e+(rem+i)%3 *…
Q: The function f(R, K)- P(S(E(R XOR K)) of the DES cryptographic protocol manipulates different sizes…
A: Given:
Q: A symmetric block encryption algorithm is shown below. 16-bit blocks of plaintext P are encrypted…
A: a. The ciphertext C must be the same size as the plaintext P,that is ,it must not be larger than 16…
Q: Using C programming language: A Transposition Cipher A very simple transposition cipher…
A: #include <stdio.h> #include <stdlib.h> #include <string.h> //The function…
Q: In computing, time scales usually store the current time as the number of seconds that have elapsed…
A: Given Data, For the year 2020, Number of seconds passed = 3665044 we know, number of seconds per day…
Q: Next time you snap a picture, you realize you are capturing millions of pixels into a buffer. The…
A: Below, I have provided the code for performing the task asked in question. I have changed the code a…
Q: Apply the CRC method on given data dividend= 100100 and number of zero’s appended should be 1 less…
A: CRC or Cyclic Redundancy Check is a method of detecting accidental changes/errors in the…
Q: The Reflection algorithm can be used to encrypt a C-string (character array terminated with the null…
A: Ans a. String be encrypted to by the Reflection algorithm?“Call me at 662-2002 Ext 85393” So in…
Q: Write a script using PHP that takes a link from the user and parses through its associated web page…
A: <!DOCTYPE html> <html> <head> <title>Web Crawler</title> </head>…
Q: Encryption is commonly used to disguise messages on the internet. A Caesar cipher performs a shift…
A: #include <stdio.h>#include <stdlib.h> int main(){ int size=100; char val[size];…
Q: Write a program to simulate routing using ooding. Each packet should contain a counter that is…
A: Actually, program is a executable software that runs on a computer.
Q: Prior to the introduction of IEEE 802.11i, the security scheme for IEEE 802.11 was Wired Equivalent…
A: Given :- Prior to the introduction of IEEE 802.11i, the security scheme for IEEE 802.11 was Wired…
Q: Alice wants to send Bob her account number for his dining dollars. Bob’s account number is 24. Bob…
A: RSА enсryрtiоn wоrks under the рremise thаt the аlgоrithm is eаsy tо соmрute in оne…
Q: suppose the RSA cryptosystem is used for sending secret messages with the private key (15,3) and the…
A: Lets see the solution.
Q: A video system can take videos from one of the two video sources, but can only display one source at…
A: A decoder is a circuit which has n inputs and 2n outputs, and outputs 1 on the wire corresponding to…
Q: Write a program to simulate the behaviour of the CSMA/CD protocol over Ethernet when there are N…
A: Actually, CSMA/CD is Carrier Sense Multiple Access with Collision Detection , Which carries…
Q: The notation from this problem is from Understanding Cryptography by Paar and Pelzl. Sappose you…
A: Introduction Cryptography: Cryptography is the practice of securing information by transforming it…
Q: In an RSA system, the public key (n,e) of a given user is (323, 11). 1. What is the value of the…
A: 1. What is the value of the exponent in the private key(n,d) of the user? 2. Suppose you want to…
Q: An input string S of length N is transferred through the network using a special protocol. The…
A: Algorithm: The first line of input will contain a single integer T, denoting the number of test…
The token bucket
the algorithm in textbook Ch. 5.3.2). A computer uses a token bucket with a capacity of 400
megabytes (MB), and a rate of 10 MB per second. The machine starts generating 20 MB per
second continuously when the bucket contains 200 MB. How long will it take to send 1000 MB?
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- The Hi-Fi modem company has designed a new frequency modulation that can transmit 38400 bits/sec. The baud rate is 4800. How many frequency levels can each interval have? 3. 4. Given a location with 7 bits what is the minimum and maximum value that it can hold A) As an unsigned location B) As a signed locationThe parity function is a very simple hash function producing a one-bit digest, which is 0 if the number of bits in the message is even and 1 if it is odd. Consider a communication system that uses 7 bits out of every byte to transmit data, and reserves the 8th bit (the one on the right) to transmit the parity of the other seven bits, for purposes of error checking. Below is the binary representation of some bytes that were transmitted using this system. For each one, tell whether there is a reason to suspect an error in transmission, giving the reason for your answer. 10110011 11101111 10101100 00110011One way to electrically or optically represent a binary 1 or 0 is to use the transition between a voltage level (for example, going from a state of no voltage to a state of voltage, or vice versa, on a copper cable) or the transition of having light or no light on a fiber-optic cable to represent a binary 1. Similarly, a binary 0 is represented by having no transition in a voltage level or light level from one time period to the next. This approach of representing binary digits is called state transition modulation.
- Suppose you’re consulting for a bank that’s concerned about fraud detection, and they come to youwith the following problem. They have a collection of n bank cards that they’ve confiscated, suspectingthem of being used in fraud. Each bank card is a small plastic object, containing a magnetic stripe withsome encrypted data, and it corresponds to a unique account in the bank. Each account can have manybank cards corresponding to it, and we’ll say that two bank cards are equivalent if they correspond to thesame account.It’s very difficult to read the account number off a bank card directly, but the bank has a high-tech “equivalence tester” that takes two bank cards and, after performing some computations, determines whether theyare equivalent.Their question is the following: among the collection of n cards, is there a set of more than n/2 of themthat are all equivalent to one another? Assume that the only feasible operations you can do with the cardsare to pick two of them and plug them…A computer system with 32 bit word length is implementing paging with 14 bit logical addresses and 4KB pages. If physical memory size is 64K Bytes, mark all correct statements below: O In logical addresses , p is 4 bits long. O In physical addresses , f is 6 bits long. O Logical memory size is at most 32 pages per program. O In logical addresses , d is 10 bits long. O Physical memory has 16 frames. O Frame size is 4K words. O In physical addresses , d is 12 bits long. O Maximum program memory size is 16 K words.A bit (meaning binary digit) is 0 or 1. An ordered array of eight bits (such as01101001) is a byte. How many different bytes are there? If you select a byte at random, what is the probability that you select 11000010? What is the probability that you select a byte containing three 1’s and five 0’s?
- Alice's RSA public key is P = (e,n) = (5,901). Bob sends Alice the message by encoding it as follows. First he assigns numbers to characters: A is 3, B is 4, ..., Z is 28, a blank is 29, quotation marks: 30, a period: 31, a coma: 32, an apostrophe: 33. Then he uses RSA to encode each number separately. Bob's encoded message is: 030 673 332 785 171 589 782 171 828 589 785 568 782 785 713 782 813 785 123 589 828 673 589 487 589 785 813 890 243 813 785 733 243 813 890 589 733 243 813 673 422 769 785 673 769 785 769 673 733 171 828 589 291 785 673 813 785 673 769 785 782 713 828 482 785 123 589 422 243 500 769 589 785 813 890 589 482 785 568 782 785 713 782 813 785 549 589 243 828 673 367 589 785 890 782 587 785 422 782 733 171 828 673 422 243 813 589 568 785 828 673 332 589 785 673 769 777 030 Decode Bob's message. Notice that you don't have Bob's secret key, so you need to "break" RSA to decrypt his message. For the solution, you need to provide the following: (a) Describe step by step…Computer scienceComputer science
- Next time you snap a picture, you realize you are capturing millions of pixels into a buffer. The buffer data is read and converted into JPEG in real time. Each pixel in that buffer is an unsigned int (four bytes ): Alpha, Blue, Green, and Red. Let us ignore alpha for now. As you know, a unsigned byte can have a value 0 to 255. In remote sensing jargons, it is called blue channel, green channel, and red channel. Each channel provides valuable information such as, say farm lands, forest fire, drought, landscape, diseases , If a pixel has a value (say in hex) = 0x00a1b1c1 , then 0xc1 is the red pixel, 0xb1 is the green pixel, 0xa1 is the blue and 00 is the alpha. #define RED 1 #define GREEN 2 #define BLUE 3 then, develop a function void calculateSum ( unsigned int *ptr , int count , unsigned char channel , unsigned int *sum, float *average ) { *sum = 0; if (channel == RED ) calculate sum and average for red channel else if (channel == GREEN )…Part 1 A small computer on a smart card has four page frames. At the first clock tick, the R bits are 0111 (page 0 is 0, the rest are 1). At subsequent clock ticks, the values are 1011, 1010, 1101, 0010, 1010, 1100, and 0001. If the aging algorithm is used with an 8-bit counter, give the values of the four page counters after the last tick. Part 2 A computer has four page frames. The time of loading, time of last access, and the R and M bits for each page are as shown below (the times are in clock ticks): Page Loaded Last Referenced R M 0 176 330 1 0 1 280 315 0 1 2 190 320 0 0 3 160 335 1 1 (a) Which page will NRU replace? (b) Which page will FIFO replace? (c) Which page will LRU replace? (d) Which page will second chance replace?Consider a "little-endian" byte-addressable computer which has the a 0x01 at address 0, 0x23 at address 1, 0x45 at address 2, and a 0x67 at address 3. If I tell the computer to print the integer at address O in hex format, what will the computer print out? 67452301 O 01234567 O 23016745 O 45670123 O 76543210 O 45670123