Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

ASSIGNMENT ITT400

PART 1: CHAPTER 6

1. Discuss types of errors possible in data communition. (1M)


I. Single-Bit Error: Only 1 bit in the data unit has changed from 1 to 0 or 0 to 1
II. Burst Error: 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1

2. Define the concept of CRC. (1M)

An error detection technique using a polynomial to generate a series of two 8-bit block check
characters that represent the entire block of data. These block check characters are
incorporated into the transmission frame and then checked at the receiving end.

3. Explain how CRC checker works. (1M)

The CRC checker determines whether the data was tampered with during transmission. This is
accomplished by creating a unique value using the data and comparing it to the value actually
received. The data is reliable if they match. If they don't match, there are errors.

4. List the steps followed in checksum generator (3M)


I. The checksum generator takes the data that needs to be transmitted or stored.
II. It breaks down the data into smaller segments, such as blocks or packets.
III. For each segment, the checksum generator performs a simple mathematical calculation.
IV. The result of the calculation is a checksum value, which is a compact presentation of the
data.
V. The checksum generator appends or adds the checksum value to the original data.
VI. The combined data and checksum are then transmitted or stored together

5. Sort these Checksum steps into order (5M)


• The two checksum values are compared by the receiving computer
• The receiving computer uses the data it receives to also calculate what it believes
should be the checksum, using the same mathematical algorithm
• The sending computer uses the block of data to be sent, and a predefined
mathematical algorithm, to calculate a checksum value
• If the checksum values don’t match, the receiving computer requests that the data is
transmitted again
• The sending computer sends the data, plus the checksum value
Answer:

I. The sending computer uses the block of data to be sent, and a predefined
mathematical algorithm, to calculate a checksum value.
II. The sending computer sends the data, plus the checksum value.
III. The receiving computer uses the data it receives to also calculate what it believes
should be the checksum, using the same mathematical algorithm.
IV. The two checksum values are compared by the receiving computer.
V. If the checksum values don't match, the receiving computer requests that the data is
transmitted again.

6. The final number in a code of numbers. It is calculated from all the other numbers in the code.
Its purpose is to spot errors on data entry. From the explanation, what is the detection
method referring to? (1M)

Checksum.

7. The receiving computer sends a copy of the data immediately back to the sending
computer for comparison. From the explanation, what is the detection method referring to?
(1M)

Echo check.

8. Sort these Parity Check steps into order (5M)


• The sending computer adds the correct parity bit to the binary data (either an extra 1 or 0)
• The receiving computer checks to make sure the overall parity of the data received is as
agreed (an even or odd number of 1 bits)
• The sending and receiving computers agree the protocol to be used (even or odd)
• If the parity of the data is incorrect, the receiving computer will request that the data is
transmitted again
• The sending computer sends the binary data, including the parity bit

Answer:

I. The sending and receiving computers agree the protocol to be used (even or odd)
II. The sending computer adds the correct parity bit to the binary data (either an extra 1 or 0).
III. The sending computer sends the binary data, including the parity bit.
IV. The receiving computer checks to make sure the overall parity of the data received is as
agreed (an even or odd number of 1 bits)
V. If the parity of the data is incorrect, the receiving computer will request that the data is
transmitted again
9. A block of data is sent alongside a calculated value. The receiving computer also
calculates what it believes should be the value. The values are then compared to see if an error
has occurred during transmission. From the explanation, what is the detection method referring
to? (1M)

Checksum.

10. An extra bit added to a string of binary code to ensure the number of 1-bits are either even or
odd, depending upon the system used. From the explanation, what is the detection
method referring to? (1M)

Simple Parity-Check Code.

11. How can the simple parity bit detect a damaged data unit? (3M)

First, an extra bit is added to a string of binary code to check whether the number of 1-bits are
either even or odd.

Then, when the string of binary code is received by the receiver, receiver will look at the string of
binary code and recalculate the number of 1-bits. If the recalculated number of 1-bits matches
the received parity bit, this means no error has occurred.

However, if the number of 1-bits does not match the parity bit, it is very likely that the data unit
is damaged.

12. What is the difference between even parity and odd parity? (4M)

Even Parity: In even parity, the parity bit is set to 0 if the number of ones in the data unit is
already even. If the number of ones is odd, the parity bit is set to 1. The goal is to make the total
number of ones (including the parity bit) even.

Odd Parity: In odd parity, the logic is opposite to even parity. The parity bit is set to 1 if the
number of ones in the data unit is already odd. If the number of ones is even, the parity bit is set
to 0. The aim is to make the total number of ones (including the parity bit) odd.

13. Discuss the two-dimensional parity check and the types of errors it can and cannot detect. (5M)

A two-dimensional parity check is when a block of bits is organized in a table of rows and
columns. Firstly, the parity bit is calculated for each data unit. Then, the parity bit is organized
into a table. This method of error detection increases the likelihood of detecting burst
errors.

However, it has its limitations and cannot detect certain types of errors. For example, If an even
number of bit errors occurs in the data structure, it may result in no change in the parity bits,
leading to the false assumption that the transmission is error-free. Next, If multiple bit errors
occur within the same row or column, but the number of errors is even, the parity checks may
not detect these errors.
14. Discuss the concept of redundancy in error detection. (4M)

Redundacy is the process of adding extra bits to original data by the sender in order to detect
or correct errors.

Redundancy aims to add enough extra information so that, in the event of transmission or
storage problems, it can be found and fixed. Redundancy makes it possible for the receiver or
the error detection device to assess any inconsistencies between the received data and the
original data.

The use of error-checking codes, like parity bits or checksums, is one typical way to add
redundancy. To ensure that the total number of 1s in the data plus the parity bit is either even
(even parity) or odd (odd parity), parity bits are extra bits that are appended to the data. Errors
can be found by comparing the received parity bit to the calculated parity bit.

On the other hand, checksums entail adding the calculated sum or hash value to the original
material. The receiver conducts the identical calculation and checks for mistakes by comparing
the calculated and received checksums.

15. How does the check sum method of error detection take place? (4M)

Checksums involves calculating a sum or hash value of the data and appending it to the original
data. The receiver performs the same calculation and compares the received checksum with the
calculated checksum to determine if any errors have occurred.

The sender divides the data unit into equal parts of n bits using the check sum generator. These
sections are joined together using ones complement mathematics in a way that makes the sum
also n bits long. The check sum field, which is composed of redundant bits, is then added to, and
appended to the and o the original data unit in addition to that sum. The network is used to
send the expanded data unit. Therefore, the checksum will be T if portion of the data segment is
T.

The data unit is divided by the receiver, who then adds each segment and completes the
calculation. The sum of the values obtained by adding the data segments and the check sum
field should be 0 if the extended data unit is complete. If the outcome is not zero, an error has
been introduced, and the packet is rejected by the receiver
PART 2: CAHAPTER 7

1. Identify Address Class for each Logical Address (10 Marks)

Address - Class

148.17.9.1 - B

193.42.1.1 - C

126.8.156.0 - B

220.200.23.1 - C

230.230.45.58 - D

10110001. 01100100. 00010010.00000100 - B

01110111. 00010010.00101101.00000000 - A

11111001. 11110000.01010000.01001110 - E

01011111.00000000.0000010101.01011010 - A

10011110.01100010.01010000.00000000 – B

2.

3.
4. Using the following IP address and subnet mask, write the network address:(10 Marks)

IP Address Subnet Mask Network Address

192.149.24.191

255.255.255.0 192.149.24.0

150.203.23.19

255.255.0.0 150.203.0.0

27.125.200.151

255.0.0.0 27.0.0.0

223.69.230.250

255.255.0.0 223.69.230

28.212.250.254

255.255.0.0 28.12.0.0

199.20.150.35

255.255.255.0 199.20.150.0

10.10.10.10

255.0.0.0 10.0.0.0

186.13.23.110

255.255.255.0 186.13.23.0

10.10.48.80

255.255.255.0 10.10.48.0

188.10.18.2

255.255.0.0 188.10.0.0
255.255.1.0

5. Write the correct subnet mask for each of the following addresses: (10 Marks)

IP Address Subnet Masks

126.123.23.1 255.0.0.0

223.69.230.250 255.255.255.0

192.12.35.105 255.255.255.0

77.251.200.51 255.0.0.0

189.210.50.1 255.255.0.0
88.45.65.35 255.0.0.0

128.212.250.254 255.255.0.0

193.100.77.83 255.255.255.0

125.125.250.1 255.0.0.0

1.1.10.50 255.0.0.0

6. Given the address 23.56.7.91 and the default class A mask, find the first address (network
address).

The default mask is 255.0.0.0, meanwhile, the network address is 23.0.0.0

7. Given the address 132.6.17.85 and the default class B mask, find the first address
(network address).

The defult mask is 255.255.0.0, meanwhile, the network address is 132.6.0.0

8. Buat sendiri

You might also like