0% found this document useful (0 votes)
16 views7 pages

Data Commsnet 2

The document discusses various error detection mechanisms including parity schemes, checksums, and cyclic redundancy checks (CRC). It explains how parity bits can detect odd numbers of errors, while checksums and CRC provide more robust error detection methods. Additionally, it covers the Media Access Control (MAC) layer protocols, highlighting their responsibilities and various protocols like ALOHA and PPP.

Uploaded by

jhin.fb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views7 pages

Data Commsnet 2

The document discusses various error detection mechanisms including parity schemes, checksums, and cyclic redundancy checks (CRC). It explains how parity bits can detect odd numbers of errors, while checksums and CRC provide more robust error detection methods. Additionally, it covers the Media Access Control (MAC) layer protocols, highlighting their responsibilities and various protocols like ALOHA and PPP.

Uploaded by

jhin.fb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

The scheme however is extremely simple, and is in fact used in some

transmissions of numbers stations.

Parity Schemes : A parity bit is an error detection mechanism . A parity bit is an

extra bit transmitted with a data item, chose to give the resulting bits even or odd

parity.

Parity refers to the number of bits set to 1 in the data item. There are 2 types of

parity

Even parity - an even number of bits are 1

Even parity - data: 10010001, parity bit 1

Odd parity - an odd number of bits are 1

Odd parity - data: 10010111, parity bit 0

The stream of data is broken up into blocks of bits, and the number of 1 bits is

counted. Then, a "parity bit" is set (or cleared) if the number of one bits is odd (or

even).This scheme is called even parity; odd parity can also be used.

There is a limitation to parity schemes. A parity bit is only guaranteed to detect

an odd number of bit errors (one, three, five, and so on). If an even number of

bits (two, four, six and so on) are flipped, the parity bit appears to be correct,

even though the data is corrupt.

For exapmle

Original data and parity: 10010001+1 (even parity)

Incorrect data: 10110011+1 (even parity!)

Parity usually used to catch one-bit errors

Checksum : A checksum of a message is an arithmetic sum of message code

words of a certain word length, for example byte values, and their carry value.

The sum is negated by means of ones-complement, and stored or transferred as

an extra code word extending the message. On the receiver side, a new checksum

may be calculated, from the extended message. If the new checksum is not 0,
error is detected.Checksum schemes include parity bits, check digits, and

longitudinal redundancy check.

Suppose we have a fairly long message, which can reasonably be divided into

shorter words (a 128 byte message, for instance). We can introduce an

accumulator with the same width as a word (one byte, for instance), and as each

word comes in, add it to the accumulator. When the last word has been added,

the contents of the accumulator are appended to the message (as a 129th byte, in

this case). The added word is called a checksum.

Now, the receiver performs the same operation, and checks the checksum. If the

checksums agree, we assume the message was sent without error.

Finally, if the Hamming distance is four, then we can correct a single-bit

error and detect a double-bit error. This is frequently referred to as a

SECDED (Single Error Correct, Double Error Detect) scheme.

Cyclic Redundancy Checks : For CRC following some of Peterson & Brown's

notation here . . .

k is the length of the message we want to send, i.e., the number of

information bits.

n is the total length of the message we will end up sending the

information bits followed by the check bits. Peterson and Brown call this a

code polynomial.

n-k is the number of check bits. It is also the degree of the generating

polynomial. The basic (mathematical) idea is that we're going to pick the

n-k check digits in such a way that the code polynomial is divisible by the

generating polynomial. Then we send the data, and at the other end we

look to see whether it's still divisible by the generating polynomial; if it's

not then we know we have an error, if it is, we hope there was no error.
The way we calculate a CRC is we establish some predefined n-k+1 bit number P

(called the Polynomial, for reasons relating to the fact that modulo-2 arithmetic is

a special case of polynomial arithmetic). Now we append n-k 0's to our message,

and divide the result by P using modulo-2 arithmetic. The remainder is called the

Frame Check Sequence. Now we ship off the message with the remainder

appended in place of the 0's. The receiver can either recompute the FCS or see if

it gets the same answer, or it can just divide the whole message (including the

FCS) by P and see if it gets a remainder of 0.

As an example, let's set a 5-bit polynomial of 11001, and compute the CRC of a 16

bit message :

---------------------

11001)10011101010101100000

11001

-----

1010101010101100000

11001

-----

110001010101100000

11001

-----

00011010101100000

11001

-----

0011101100000

11001

-----

100100000
11001

-----

10110000

11001

-----

1111000

11001

-----

11100

11001

-----

0101

In division don‘t bother to keep track of the quotient; we don't care about the

quotient. Our only goal here is to get the remainder (0101), which is the FCS.

CRC's can actually be computed in hardware using a shift register and some

number of exclusive-or gates.

Q.6. Describe the MAC Layer Protocols?

Ans.: The Media Access Control (MAC) data communication protocol sub-layer, also

known as the Medium Access Control, is a sub-layer of the data link layer

specified in the seven-layer OSI model. The medium access layer was made

necessary by systems that share a common communications medium. Typically

these are local area networks. In LAN nodes uses the same communication

channel for transmission. The MAC sub-layer has two primary responsibilities:

Data encapsulation, including frame assembly before transmission, and

frame parsing/error detection during and after reception.

Media access control, including initiation of frame transmission and

recovery from transmission failure.


Following Protocols are used by Medium Access Layer :

ALOHA : ALOHA is a system for coordinating and arbitrating access to a

shared communication channel. It was developed in the 1970s at the

University of Hawaii. The original system used terrestrial radio

broadcasting, but the system has been implemented in satellite

communication systems. A shared communication system like ALOHA

54. The HDLC procedure uses a flag synchronous system, these are

a. Bit order of transmission (information frame)

b. Bit order of transmission (supervisor frame)

c. Both a & b

d. None of these

55. FCS (frame check sequence) is a _______ sequence for error control

a. 4bit

b. 16bit

c. 32bit

d. 64bit

56. The disadvantage of SLIP are as follows

a. No error check function is available

b. Protocols other than IP cannot be used

c. No function is available to authenticate link level connections

d. No function is available to detect loops

e. All of these

57. PPP has several advantages over non-standard protocol such as

a. SLIP

b. X.25

c. Both a & b
d. None of these

e.

58. PPP was designed to work with layer 3 network layer protocols including ___________

a. IP

b. IPX

c. Apple talk

d. All of these

59. PPP can connect computers using _________

a. Serial cable, phone line

b. Trunk line, cellular telephone

c. Specialized radio links

d. Fiber optic links

e. All of these

60. Most dial-up access to Internet is accomplished by using _____

a. HDLC

b. PPP

c. IP

d. IPX

61. RAS has an important role in the proliferation of Internet based services in the form of

_________________

a. VoIP

b. Data over IP

c. Both a & b

d. None of these

62. Which is opening new challenges in the development of RAS where VoIP enabled RAS

are the need of time

a. Voice convergence
b. Data convergence

c. Voice and data convergence

d. None of these

63. Remote access is possible through an __________________

a. Internet service provider

b. Dial up connection through desktop

c. Notebook over regular telephone lines

d. Dedicated line

e. All of these

64. A remote access server also known as ____________________

a. Communication

b. Communication server

c. Layer

d. None of these

65. RAS technology can be divided into two segments _________

a. Enterprise

b. Infrastructure

You might also like