Professional Documents
Culture Documents
Q) Explain Different Type of Error Detection Techniques?: 1. Simple Parity Check
Q) Explain Different Type of Error Detection Techniques?: 1. Simple Parity Check
3. Checksum
This scheme makes the total number of 1’s even, that is why it is called even parity checking.
In checksum error detection scheme, the data is divided into k segments each of m bits.
In the sender’s end the segments are added using 1’s complement arithmetic to get the
sum. The sum is complemented to get the checksum.
At the receiver’s end, all received segments are added using 1’s complement arithmetic to
get the sum. The sum is complemented.
Unlike checksum scheme, which is based on addition, CRC is based on binary division.
In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to
the end of data unit so that the resulting data unit becomes exactly divisible by a second,
predetermined binary number.
At the destination, the incoming data unit is divided by the same number. If at this step
there is no remainder, the data unit is assumed to be correct and is therefore accepted.
A remainder indicates that the data unit has been damaged in transit and therefore must be
rejected.
Q) What do you mean by bit stuffing in HDLC frame?
Explain.
Ans)
Q) Explain in brief about Ethernet?
Ans)
Ethernet is the traditional technology for connecting devices in a wired local area
network (LAN) or wide area network (WAN). It enables devices to communicate with
each other via a protocol, which is a set of rules or common network language.
Ethernet describes how network devices format and transmit data so other devices
on the same LAN or campus network can recognize, receive and process the
information. An Ethernet cable is the physical, encased wiring over which the data
travels.
Connected devices that use cables to access a geographically localized network --
instead of a wireless connection -- likely use Ethernet. From businesses to gamers,
diverse end users rely on the benefits of Ethernet connectivity, which include
reliability and security.
Compared to wireless LAN (WLAN) technology, Ethernet is typically less vulnerable
to disruptions. It can also offer a greater degree of network security and control than
wireless technology because devices must connect using physical cabling. This makes
it difficult for outsiders to access network data or hijack bandwidth for unsanctioned
devices.
Pure
S.NOAloha Slotted Aloha
In this
aloha, any
station can
transmit
the data at In this, any station can transmit the
1. any time. data at the beginning of any time slot.
Slotted aloha
reduces the
number of
Pure aloha collisions to half
doesn’t reduces and doubles the
the number of efficiency of pure
6. collisions to half. aloha.
Features
FDDI uses optical fiber as its physical medium.
It operates in the physical and medium access control (MAC layer) of the
Open Systems Interconnection (OSI) network model.
It provides high data rate of 100 Mbps and can support thousands of users.
Frame Format
The frame format of FDDI is similar to that of token bus as shown in the following
diagram −