Question

In: Computer Science

a. Critically analyse the role of flow and error control in a computer network. In your...

a. Critically analyse the role of flow and error control in a computer network. In your explanation appropriate figures and examples are expected.

b. Calculate the CRC for the X binary data shown as shown below, when the divisor is 1101.

(A)2 = (200 + X)10 X = 1001100

c. Consider a scenario where a frame would be sent after appending the checksum to the original data. How would you prove that the frame received is error free?

Solutions

Expert Solution

a)

FLOW CONTROL ERROR CONTROL
It refers to the proper tansmission of data from sender to receiver. It refers to the error-free delivery of data to the receiver

Feedback based flow control and rate -based flow control are the approaches to achieve the proper flow control.

This mechanism detects and corrects error in the data.
Protocols for flow control Stop & Wait ARQ , Go Back N ARQ & Selective Repeat ARQ Parity Checking , CRC and CheckSum are the approaches to detect the error where as Hamming Code are the ways to correct error .

Flow control is maintained at DLL and Transport Layer when a sender sends the frames faster than the receiver can accept.In this case , even the data is received without any error .So inorder to overcome the speed mismatch of sender and receiver a mechanism known as Flow control is used.

This is also maintained at DDL & Transport Layer for error detection and correction of frames delivered to receiver.The error occured in the frame may be a single bit error or brust error.Single bit error refers to exchange of 0 ->1 & 1->0 where as brust error include duplicate packet , packet loss, ACK lost .

c)

CheckSum: It is a error detection method

Working Scenario :

Step1: At Sender Side

i) If m bit checksum is used , the data unit to be transmitted is divided into segments of m bits.

ii) All the m bits added, SUM is then complemented using 1's complement arithmetic , value so obtained is called as CheckSum.

Step2:Data along with the CheckSum value is transmitted into the receiver.

Step3: At Receiver Side,

i) If m bit checksum is being used , the received data unit is divided into segments of m bits.

ii) All the m bits segments are added along with the checksum value , the value so obtained is complemented and result is checked.

Two Cases would be possible :

Case1: Result =0 ,Receiver assumes no error occured during the transmission and accepts data.

Case2:Result !=0 ,Receiver assumes error occured during the transmission and discards the data and asks for retransmission.


Related Solutions

QUESTION 1: Error detection and Checksum Methods [15 Marks] a. Critically analyse the role of flow...
QUESTION 1: Error detection and Checksum Methods [15 Marks] a. Critically analyse the role of flow and error control in a computer network. In your explanation, appropriate figures and examples are expected. [6 Marks] b. Calculate the CRC for the X binary data shown as shown below, when the divisor is 1101. (A)2 = (200 + X)10 X = 1001100 [6 Marks] c. Consider a scenario where a frame would be sent after appending the checksum to the original data....
critically analyse how IT and e-procurement are changing the role of procurement
critically analyse how IT and e-procurement are changing the role of procurement
q1) Critically assess how the computer monitor image differs from a television image and analyse the...
q1) Critically assess how the computer monitor image differs from a television image and analyse the limitations in creating images on the computer destined for a television screen
A. The 802.11 LLC unacknowledged connectionless service provides no flow control or error control. TRUE or...
A. The 802.11 LLC unacknowledged connectionless service provides no flow control or error control. TRUE or FALSE B. An 802.11 extended service set (ESS) consists of two or more BSS’ interconnected by a distribution system (DS). TRUE or FALSE C. The 802.11 "integration service" performs address translation during a logical connection between the WLAN and external 802.x LANs. TRUE or FALSE
Analyse the potential effects of climate on building design and services: Critically analyse: - The potential...
Analyse the potential effects of climate on building design and services: Critically analyse: - The potential effect of environmental resources to the building design and services - The potential effect of local climate on building design and services. Smart building.
Critically analyse the validity of the median voter theory.
Critically analyse the validity of the median voter theory.
*2-  Describe the role of the communication layer, the network-wide state-management layer, and the network-control application layer...
*2-  Describe the role of the communication layer, the network-wide state-management layer, and the network-control application layer in the SDN controller. *3- Name the four different types of ICMP messages including type and code. What two types of ICMP messages are received at the sending host executing the Traceroute program? *4- Why are different inter-AS and intra-AS protocols used in the internet? Explain your answer.
franchising is a safe environment. critically analyse this statement as an entrepreneur
franchising is a safe environment. critically analyse this statement as an entrepreneur
Critically analyse the concept of corporate internal rules and management
Critically analyse the concept of corporate internal rules and management
Critically analyse the three pillars with respect to the Basel Accords
Critically analyse the three pillars with respect to the Basel Accords
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT