Question

In: Statistics and Probability

In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point....

In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point. Since the transmission is wireless, errors can occur that may render the packet useless, so, when received in error, the packet is discarded. As a protection for errors, an acknowledgement is expected, and if the packet is received in error, it is retransmitted, until correctly received. Consider that the probability that a packet is discarded is p=0.6.

(a) What is the probability that the packet needs to be transmitted 3 times or more?

(b) If you could use more powerful coding to reduce the value of p, what should be p, such that the probability of having no more than two transmissions for the same packet is 0.8?

Solutions

Expert Solution

Probability of the packet is discarded = p = 0.6

therefore, Probability of the packet is transmitted susscefully = q = 0.4

X be a random variable.

X: Number of times packet needs to be discarded. ; 0 X

A)   

here we will use geometric distribution.

Packet need to be trasmitted 3 times or more that mean it has to be discard at least 2 times

P(X 2)

= 1 - P(X < 2)

= 1 - px q

= 1 - (0.4 + (0.6*0.4))

= 1 - (0.4 + 0.24)

= 1 - 0.64

= 0.46

B)

Probability of having no more than 2 transmission (we have to discard the transmission at most only once) = 0.8

therefore,

P(X 1) = 0.8

= px q = 0.8

= (q + p*q) = 0.8

= q (1+p) = 0.8

= (1-p) (1+p) = 0.8

= 1 - p2 = 0.8

= p2 = 1- 0.8 = 0.2

= p =

= p = 0.4472


Related Solutions

You have been using your phone and your school's Wi-Fi network to access hosts on the...
You have been using your phone and your school's Wi-Fi network to access hosts on the Internet. Suddenly, you cannot reach Internet hosts. Create a two-column table. a) In the first column, create a list of possible causes. b) In the second column, describe how you would test each one. (You may not be able to test them all.) Create a table list.
Include a webpage link showing a Wi-Fi wireless access point that can mount on the wall...
Include a webpage link showing a Wi-Fi wireless access point that can mount on the wall or ceiling. For one option, select a device that can receive its power by PoE from the network cable run to the device. For the other option, select a device that requires an electrical cable to the device as well as a network cable.
CASE 1-WI-FI INC. OVERVIEW Attach Wi-Fi to a broadband modem and any nearby computer equipped with...
CASE 1-WI-FI INC. OVERVIEW Attach Wi-Fi to a broadband modem and any nearby computer equipped with Wi-Fi receptors and you can log on to the Net. Wi-Fi networks, known as hot spots have popped up so tfast that more than 18 million people worldwide have logged on, and the numbers are growing daily. The challenge is to transform this innovation into a global business, developing coherent and dependable networks, coming up with billing systems, roaming agreements, and technical standards. Wi-Fi...
What is the relationship between Bluetooth and Wi-Fi? What security challenges do Wi-Fi and Bluetooth technology...
What is the relationship between Bluetooth and Wi-Fi? What security challenges do Wi-Fi and Bluetooth technology present for a company?
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with a one-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee...
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Create the official communication document.   Part II:     18.  a) What is the main problem with IPv4 that IPv6 was created to solve?            b) How does IPv6 solve this problem?    19.  a) What has been holding back the adoption of IPv6?           b) What is pushing IPv6 adoption now?
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by packet sniffers, which monitor all the packets that are transmitted in a wireless Internet access point?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network...
The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network that appears correlated with a border Network slow down. The network team is unable to capture traffic, but logs from Network Services are available. No users have authenticated recently there was a guest networks captive portal DDoS mitigation systems are not alerting DNS resolver logs show some very long domain names Which of the following is the best step for security analysis to take...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT