Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Q) Explain different type of Error detection techniques?

Ans- Different types of techniques for error detection are:

1. Simple Parity check

2. Two-dimensional Parity check

3. Checksum

4. Cyclic redundancy check

1. Simple Parity check


Blocks of data from the source are subjected to a check bit or parity bit generator form, where a
parity of :

 1 is added to the block if it contains odd number of 1’s, and

 0 is added if it contains even number of 1’s

This scheme makes the total number of 1’s even, that is why it is called even parity checking.

2. Two-dimensional Parity check


Parity check bits are calculated for each row, which is equivalent to a simple parity check bit. Parity
check bits are also calculated for all columns, then both are sent along with the data. At the
receiving end these are compared with the parity bits calculated on the received data.
3. Checksum

 In checksum error detection scheme, the data is divided into k segments each of m bits.

 In the sender’s end the segments are added using 1’s complement arithmetic to get the
sum. The sum is complemented to get the checksum.

 The checksum segment is sent along with the data segments.

 At the receiver’s end, all received segments are added using 1’s complement arithmetic to
get the sum. The sum is complemented.

 If the result is zero, the received data is accepted; otherwise discarded.


4. Cyclic redundancy check (CRC)

 Unlike checksum scheme, which is based on addition, CRC is based on binary division.

 In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to
the end of data unit so that the resulting data unit becomes exactly divisible by a second,
predetermined binary number.

 At the destination, the incoming data unit is divided by the same number. If at this step
there is no remainder, the data unit is assumed to be correct and is therefore accepted.

 A remainder indicates that the data unit has been damaged in transit and therefore must be
rejected.
Q) What do you mean by bit stuffing in HDLC frame?
Explain.
Ans)
Q) Explain in brief about Ethernet?
Ans)

 Ethernet is the traditional technology for connecting devices in a wired local area
network (LAN) or wide area network (WAN). It enables devices to communicate with
each other via a protocol, which is a set of rules or common network language.
 Ethernet describes how network devices format and transmit data so other devices
on the same LAN or campus network can recognize, receive and process the
information. An Ethernet cable is the physical, encased wiring over which the data
travels.
 Connected devices that use cables to access a geographically localized network --
instead of a wireless connection -- likely use Ethernet. From businesses to gamers,
diverse end users rely on the benefits of Ethernet connectivity, which include
reliability and security.
 Compared to wireless LAN (WLAN) technology, Ethernet is typically less vulnerable
to disruptions. It can also offer a greater degree of network security and control than
wireless technology because devices must connect using physical cabling. This makes
it difficult for outsiders to access network data or hijack bandwidth for unsanctioned
devices.

Q) Difference between pure ALOHA and Slotted ALOHA?


Ans)

Pure
S.NOAloha Slotted Aloha
In this
aloha, any
station can
transmit
the data at In this, any station can transmit the
1. any time. data at the beginning of any time slot.

In this, The time In this, The time is


is continuous discrete and
and not globally globally
2. synchronized. synchronized.
Vulnerable time Vulnerable time
for pure aloha for Slotted aloha
3. = 2 x Tt = Tt

In Pure Aloha, In Slotted Aloha,


Probability of Probability of
successful successful
transmission of transmission of
data packet data packet
4. = G x e-2G = G x e-G

In pure aloha, In slotted aloha,


Maximum Maximum
efficiency efficiency
= 18.4% = 36.8%
5.

Slotted aloha
reduces the
number of
Pure aloha collisions to half
doesn’t reduces and doubles the
the number of efficiency of pure
6. collisions to half. aloha.

Q) Explain FDDI token ring network?


Ans) Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO standards for
transmission of data in local area network (LAN) over fiber optic cables. It is
applicable in large LANs that can extend up to 200 kilometers in diameter.

Features
 FDDI uses optical fiber as its physical medium.
 It operates in the physical and medium access control (MAC layer) of the
Open Systems Interconnection (OSI) network model.
 It provides high data rate of 100 Mbps and can support thousands of users.

Frame Format
The frame format of FDDI is similar to that of token bus as shown in the following
diagram −

Q) Show that the window site for selective repeat ARQ


protocol should be less than 2^m-1.
Ans)
Window size for Go-Back-N ARQ
 We choose m = 2, which means the size of the window
can be 2m - 1, or 3. We can now show why the size of
the send window must be less than 2m.
 If the size of the window is 3 (less than 22) and all three
acknowledgments are lost, the frame 0 timer expires
and all three frames are resent.
 The receiver is now expecting frame 3, not frame 0, so
the duplicate frame is correctly discarded. On the other
hand, if the size of the window is 4 (equal to 22) and all
acknowledgments are lost, the sender will send a
duplicate of frame O.
 However, this time the window of the receiver expects
to receive frame 0, so it accepts frame 0, not as a
duplicate, but as the first frame in the next cycle. This is
an error.

You might also like