Assignment No 3

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

Assignment no 3

Computer networks

Submitted to:
submitted by:

Parul oberoi mam


sarang

Cse dept
sec:d1801

Roll
no: rd1801b31

R
egd no; 10800074
1:

. The CRC is computed while the packet is being transmitted and then incorporated in a trailer.
Similarly, the receiver computes the CRC and compares it with the transmitted one. From both
points of view, it is better to have the CRC in a trailer. Because then you can compute the CRC
as you transmit the packet, and then splat out the final CRC at the end. If you put it in the header,
you would have to make *one* pass over the packet computing the CRC, then send the CRC,
and then a *second* pass actually stuffing each byte out the interface …

Ans 2:

we can say that slotetd aloha is better than aloha,,,,,,,,,,and slotted aloha is improved version of
aloha protocol because in pure aloha vulnerable time is 2*Tfr…..this is because there is no rule
that defines when the station can send…..a station may send soon after another station has started
or soon before another station has finished….but in slotted aloha we divide the time into slots of
Tfr and force the station to send only at the beginning of the time slot…so in this way vulnerable
time is reduced to Tfr….which is half than of pure aloha……

Ans 3: yes it is possible that for loss, insertion or modification of a single bit to cause an error
not detected by checksum……as a byte oriented protocol the flag is PPP is a byte and needs to
be escaped whenever it appears in the data section of the frame,,,,,the escape byte is 01111101
which means that every time he flagbit pattern appears in the data,,this extra byte is stuffed to tell
the receiver that the next byte isnot a flag..so the last bits can be taken as checksum but bin
actual it is not checksum,,,,

Ans 4:

The general idea for achieving error detection and correction is to add some
redundancy (i.e., some extra data) to a message, which receivers can use to check
consistency of the delivered message, and to recover data determined erroneous.
Error-detection and correction schemes can be either systematic or non-systematic:
In a systematic scheme, the transmitter sends the original data, and attaches a
fixed number of check bits (or parity data), which are derived from the data bits by
some deterministic algorithm. If only error detection is required, a receiver can
simply apply the same algorithm to the received data bits and compare its output
with the received check bits; if the values do not match, an error has occurred at
some point during the transmission. In a system that uses a non-systematic code
the original message is transformed into an encoded message that has at least as
many bits as the original message.

Ans 5:

No doubt that detection was already there…..but it will not be appropiable to detect the error
every time and then correct it….so to avoid this it is better to use avoidance….so that the time
will be saved,,,and there will be no need to detect error…

Ans 6:

Bluetooth supports two type of links between slave and the master……they are:

a) Sco(synchronous connection oriented)- this link is used when avoiding latency is more
important then integrity,,,,in aan sco link a physical link is created between the primary
and secondary by reserving specific slotsat regular intervals…..

b) Acl( asynchronous connection less link)- is used when data integrity is more imp than the
avoidance latency……in this,,if a payload encapsulated in the frame is corrupted it is
retransmitted,,,

Ans 7:the size of the sender window is 31 and the receiver size of window is 1.

b) the sender window is 31 and receiver window is 1.

c) the size of sender window is 16 and the size of receiver window is 16.

Ans 8:

07:01:02:03:04:05\-----It is a multitask adderess..

You might also like