Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A-The transmission of packets across a computer network involves a number of ste

ID: 3763922 • Letter: A

Question

A-The transmission of packets across a computer network involves a number of steps. After a character in the message is translated into ASCII code, what should happen next?

B-If a packet has been destroyed during the transmission of a message across a network, is it possible for the receiver to obtain the missing packet ? true or false

C-What is the purpose of setting a parity bit?

D-If several packets are sent across a network, will they arrive in the same sequence in which they were sent?

E-One of two methods used in the Networking to encrypt data contained within a binary string include which of the following:

F-To decrypt an encrypted message using the techniques in Lab 11, we would use the ___________ of the process we used to encrypt it.

G-What is the purpose of a packet sequence number ?

H-What is the result of encrypting the encrypted data using the same matrix?

Explanation / Answer


A-The transmission of packets across a computer network involves a number of steps.
After a character in the message is translated into ASCII code, what should happen next?

Answer :

Discrete signals can also be represented digitally. The presence of a signal
could be coded as a 1 and the absence of a signal coded as a 0. The digits 0
and 1 are used because computer circuitry is based on binary digital data.
Codes are used to group a set number of bits together and have a group of
bits represent a letter, number, or other character. The computer’s brain,
the central processing unit (CPU), transforms these codes of 0s and 1s into
the voice, video and data we see. One coding scheme, ASCII, codes an “a”
as the binary number 0110-0001.
Digital data is based on two states, on or off. The binary numbering
system uses only two digits, 0 and 1, so it makes sense to use the binary
numbering system. One digit, 0 represents off, the other digit represents
on. A single 0 or 1 is called a bit. One byte is equal to eight bits (also
called an octet when discussing TCP/IP). In ASCII code, one octet is the
equivalent of one alphabetic or numeric character. In order to
appreciate how computers communicate over networks, it is necessary to be aware of
how they encode information.


B-If a packet has been destroyed during the transmission of a message across a network,
is it possible for the receiver to obtain the missing packet ?
Answer : true

C-What is the purpose of setting a parity bit? :
Answer : check the packet is corrupted or not receiver side

D-If several packets are sent across a network, will they arrive in the same sequence
in which they were sent? yes..
Answer: If any packet is not lost. If packet is lost receiver will request the packet which it is lost
         during the packet transmission.

E-One of two methods used in the Networking to encrypt data contained within a binary string
   include which of the following:
Answer: Deterministic Random Bit Generator

F-To decrypt an encrypted message using the techniques in Lab 11, we would use the ___________ of the
process we used to encrypt it. No Idea

G-What is the purpose of a packet sequence number ? ..

Answer:
If the packets are following with sequence numbers. It will help in number packets are transmitted without
packet loss. or if packet is lost during transmission it will help the retransmitting of that packet by
using sequence number.

H-What is the result of encrypting the encrypted data using the same matrix?

See the below example you will get full idea :

Consider the message "Red Rum"

A message is converted into numeric form according to some scheme. The easiest scheme is to let space=0, A=1, B=2, ..., Y=25, and Z=26. For example, the message "Red Rum" would become 18, 5, 4, 0, 18, 21, 13.

This data was placed into matrix form. The size of the matrix depends on the size of the encryption key. Let's say that our encryption matrix (encoding matrix) is a 2x2 matrix. Since I have seven pieces of data, I would place that into a 4x2 matrix and fill the last spot with a space to make the matrix complete. Let's call the original, unencrypted data matrix A.
    18 5
A = 4 0
    18 21
   13 0

There is an invertible matrix which is called the encryption matrix or the encoding matrix. We'll call it matrix B. Since this matrix needs to be invertible, it must be square.

This could really be anything, it's up to the person encrypting the matrix. I'll use this matrix.
B = 4 -2
    -1 3

The unencrypted data is then multiplied by our encoding matrix. The result of this multiplication is the matrix containing the encrypted data. We'll call it matrix X.
    67 -21
X = A B = 16 -8
    51 27
    52 -26

The message that you would pass on to the other person is the the stream of numbers 67, -21, 16, -8, 51, 27, 52, -26.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote