Question

In: Computer Science

A stream of bits, 01111011111011111101111100, needs to be transmitted at the data link layer using bit...

A stream of bits, 01111011111011111101111100, needs to be transmitted at the data link layer using bit stuffing, what is actually transmitted after the bit stuffing? 2) We are transmitting 16-bit data using a Hamming code. What is the minimum number of check bits is needed to ensure that the receiver can correct a single-bit error?

Solutions

Expert Solution

A stream of bits, 01111011111011111101111100, needs to be transmitted at the data link layer using bit stuffing, what is actually transmitted after the bit stuffing?

Answer: Since most of the protocols use the 8-bit pattern 01111110 as flag, that is why to differentiate the message from the flag, a single bit is stuffed in the message. a 0 bit is added at the end of five consecutive 1 bits in the message.

The original message is 01111011111011111101111100

After bit stuffing the transmitted message is

01111011111001111101011111000

(3 bits added, in bold)

2) We are transmitting 16-bit data using a Hamming code. What is the minimum number of check bits is needed to ensure that the receiver can correct a single-bit error?

Answer:

For transmitting 16-bit data using a Hamming code to ensure that the receiver can correct a single-bit error r number of redundancy bits are needed.

where. 2r >= n + r + 1

Here n = 16, so minimum value of r is 5.

Therefore, minimum 5 check bits is needed to ensure that the receiver can correct a single-bit error


Related Solutions

A binary data stream 111010010 is to be transmitted using DPSK. Determine the encoded data and...
A binary data stream 111010010 is to be transmitted using DPSK. Determine the encoded data and phase of the DPSK o/p .
Assume that a data stream with data rate R=36 Mbit/s is to be transmitted on an...
Assume that a data stream with data rate R=36 Mbit/s is to be transmitted on an RF channel. Assume Nyquist filtering and an allowable bandwidth of 36MHz (a)Which modulation technique would you choose for this requirement? (b)What is the value of Tb and TS this the question and please answer it is it is.
question: Bits 0 and 1 are transmitted in the data transmission channel,  due to a noise, a...
question: Bits 0 and 1 are transmitted in the data transmission channel,  due to a noise, a single bit is incorrectly received by a probability of 0.3 , Playback For encoding instead of bit 0, the code word 00000 and bit 1 are transmitted as code word 11111,The receiver decodes the codeword received by selecting the most frequently occurring bit ,  for example 00000 → 0, 01010 → (a) What is the probability that the received code word is correctly decoded? (b)...
Suppose that x bits of user data are to be transmitted over a k-hop path in...
Suppose that x bits of user data are to be transmitted over a k-hop path in a packetswitched network as a series of packets, each containing p data bits and h header bits, with x >> p + h. The bit rate of the lines is b bps and the propagation delay is negligible. What value of p minimizes the total delay? Assume that the header size (h bits) is NOT included in the data size (p bits)
The bits transmitted by four stations A, B, C and D are multiplexed using Code Division...
The bits transmitted by four stations A, B, C and D are multiplexed using Code Division Multiplexing (CDMA). Assume A transmits a 1 bit, B transmits a 0 bit, C transmits a 1 bit, and D is silent. Assume the following are the chip sequences of the four stations, answer below questions: SA = (-1 -1 -1 +1 +1 -1 +1 +1); SC = (-1 -1 +1 -1 +1 +1 +1 -1) SB = (-1 +1 -1 +1 +1 +1...
Link Layer Describe the idea of self-learning in a link layer switch. Specifically, describe how a...
Link Layer Describe the idea of self-learning in a link layer switch. Specifically, describe how a switch fills the switch table entries.
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In...
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In exclusive or, 0⊕0 = 0, 1⊕0 = 1, 0⊕1 = 1, and 1⊕1 = 0.) a. Recover the original message from the random stream and encrypted stream, by filling in the blanks in the “Recovered” and “ASCII” rows. (In the ASCII column, interpret the byte as an ASCII character and write the value in that row.) Message: ? ? ? ? ? ? ?...
ENCODE THE FOLLOWING STREAM OF BITS USING 4B/5B encoding :- 1101011011101111 what is the ratio of...
ENCODE THE FOLLOWING STREAM OF BITS USING 4B/5B encoding :- 1101011011101111 what is the ratio of redundant bits in 4B/5B?
A sender wants to transmit 16 frames in data link layer to a receiver, and every...
A sender wants to transmit 16 frames in data link layer to a receiver, and every 4th transmission is lost. How many total transmissions are required if A) Go-back-3 flow control is used? B) Selective repeat is used? C) Stop-and-wait is used?
a) TCP/IP what is the name of the packets at the data link layer? b) What...
a) TCP/IP what is the name of the packets at the data link layer? b) What are the two identifiers to locate a process in other part of the world so we can connect to it? c) Supposed you are making a broadcast in your local network and the broadcasts reach a router . Would the router forward this broadcast message further or stop it? Why or why not? d) Tcp/IP is the defacto network architecture for today's internet/ What...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT