0% found this document useful (0 votes)
7 views8 pages

CV Assignment 2

The document discusses the differences between character stuffing and bit stuffing in data transmission, highlighting their respective methods and examples. It also explains the roles of the physical and network layers in the OSI model, detailing how data is encapsulated and transmitted. Additionally, it covers error detection techniques such as CRC and checksum, along with the concepts of Go-Back-N and Selective Repeat protocols for reliable data transfer.

Uploaded by

lovelybanu55
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

CV Assignment 2

The document discusses the differences between character stuffing and bit stuffing in data transmission, highlighting their respective methods and examples. It also explains the roles of the physical and network layers in the OSI model, detailing how data is encapsulated and transmitted. Additionally, it covers error detection techniques such as CRC and checksum, along with the concepts of Go-Back-N and Selective Repeat protocols for reliable data transfer.

Uploaded by

lovelybanu55
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

S.

bhany Venka tesh


Assignnen- 2 Qa35|A4aFO
Dfeemtiale betaeen character sifing am bit sfcing
b,
with Eaample
A, chaacter klaßing i ceoed When Pameá consist of
chaactet 6lafing
ED(Ed Delimite) then, a byle
CharacteA, I ata Centaims
ints lata to dfesentate it frem ED.
á Blalfed Can le
contains '$'amyshee it
Let ED : 'sitolata
Ebcaped wsimg '1o'chaacte. e6afped using
1o)6\03 (3 is
centaina "\0s' them, c&e
2 dato
Dala gromupp lay
Fla g

Pamesent Stutteol
Mag Heade? ESC Hag tfater Flag

Pame eceived Exha a bytea


Flag Heade CSC Fhg C5C E5C TAailer Flag

Flag
Data toupPeRlayer
I¢ i Vercy costly and obiolele method
DISaduantage
Bit 5tuing : O||)
det ED- bll and i data
to beak the Patton i.e, heie
Semden btfa a bit
data olllol.
ppema a o in
Receiver Aeceiyes the ame HenoVe& the
centaind ollie/. AecelveY
2If ata
teads the clata.
Oand Datafrom oPPeN Aayet

Ragsent stoed
RaslHeade o ool olIto ojilil ola 4nal yka9
Kageceiyed
Mag Meade7 ooo|llloll ooll!l oal000 4haule Kag
Cunstued
oo0|ll|||loolll|el 000
Data to ufr laye
Egomples nd dataafce?
hen,
olaoo1/|10 anyED -)olll
f Data
bit tufing?
Jollol 0ob/|ollo0
hem,Jind data
’/000
-ll60ol00o/amdED
I} Data ?
after bit tuffing
’lloolo)ooll
link layer?
i66esof data 5ycem
thedebig (opem
) Explain laye in the osz belween he
dataink Model,sthe
The
Tntesuennectiens)
the Phyoical aye anmd he netaok layer Ths laye
CerTS the au transmission joity PHovilec
by the Physical laye to a ocliable ano RRMOT fre
link.
The main unelions amd the cebign isus ot the tayer
aie
to the neaoAk laye
Phovidin Serviecs
. aming
Flo conoel
he o5/ Model, eah
Netwoxk laye In it and Provide
Services to the layebelocu
the sevic es ct the link kayer uses
laye uses it. he olata
laye ale
lay. The PAimay
5eries to the bey the Phylcal cell defenedd
theSerrices ofrea PHovide a
tayes is to
7tunction of this fletaotk layeraloUeL.
SeRVice interface t

Nelaork laye

DATAUNKLAyeR
em the Phuslcal
feiices
JPHYGICAL (AVER
emapsulates tach
he data link laye into ameá
FHaming netaoxk layer
the
data PacHet rem
tsansmitead.
|hatase hen
|Po cked
Heade fau bod eclel jrs oles
Ener cen tuol :- The data link laye enbtes e s
ee imk lor data branEme ssian. the ikSS it Caters
to ci th e6pect to ece7Cenbrol ae
Dealing with tansmission roS
kmeteolgerment rames n neliate
Sending ac
Cenmections
Relsansmitling lo5 rame
oluplicale rames amd deleling then
Tdentilying of
acces5 to shaeolchammels in case
Conltolling
bsoadcasting
data ink laye? nequlales loa Conßtol
Flowcemtoli The a slod Mece iver.
senler loC% not oloown
So hat a fast Very high épeedlo,
When the Sender benals Pames at
able to hamle it. Thete
a slou Meçeive maynot le the oansmission is
cwill be am e losseseem it
tlocu
e o - Piee.The kwo conmen appAoa ches f
Cenliol ate
e
Feedback baseal lowCOnbol
Rate baj edloConbs
Geneale he cRC Code o9
Explain aboet CRC aol eneralb polynotnial
3, Geien g
message llolo[6l0l.

kedundancycheck(cRc):
yelu check(cRC) ia n
Cylic Redunanyin ligital netcwostA
deteclien coe utedd acidemtal
ero - delec
5oage devices to babed on bnay
and olala. Its
Changek to Aatw
divisiern
1.

the sender opends a Brecia number ot


ZeeR (equal to He degree of he generalor Polymoni.
he degtee
- ae) to the enod f ho message
liribien The 6emde lurides he modi.
Q.odulo- a mial
polgno
-ed message ly the generalor
modulo-2 diisi en
wsing oblained pem the diviso7n
CKC Coole ;- The 9emaindes
3. Code.
t6 he cRC the 0Higiral
tzansets
T TAamsmistion :. The 6enler
alona awith he cRC Code. nesage
7mesaage teceived
ive divides the
: The Aece
5. vexfcation gemeate Polymemial.
5ame
by the
9enainde? zoo, the eceive
tho Csansmision
Erxo detectien. It
erot occ we dwing
eros
that no
assumes it indicales ha
HeseMaenoer is non- zero,
I
OCCUHedl.
Plx): |l olol olo i
9(a): 2"+|: lolol
1olol)ololololoooo(uilllo

olo

Iolol
O0000
toloi) Itol O) olelo |! oCi|Mo
lo10

Iolol

The coC is ollO


find the checksum
imbief.Also 10noO||
about checkbum Sequac
4) Discubk amdeceiver for he
bemdet cala
To/olol| ol6llolo |6/olol? smal-6igeolblock of
at
a jor the
AchecKsum is digitallata
ChecK&umm;- anoher Mockof leen intod
hae
may check&m
|eived rom cAxotsthat
detecting toiage Alied
Pwyose ff tansssiern e ate not
its integrib,brct
-uced dusingverilycta
aecubeol to authentiity. Vale
veiy dala acheckKBUm
uponto caleulates
The bemder bpeip algotihn.
Calulatien: wbinga
oigiral oata oriqinal
Pem te bansi the
Bender
TRansmissiemi- the calulafeolchecksum.
the
data aleng with
ive calulates achecksum Value
3
Veificatien :- The ece same algoatm
em omthe Hecelved data cu&ing the
cempaies the calcelaleo
7Compaibeni- The Prceiver
received checksum:T hey Match,
tamsmituol
|Check6wmaith he dataaas Rely
indica tes hat he
it
Cuihot eetk.
OMiginaldata
lololol
0lo!|o [o
lollooll lol6loll
Receiver
Semden
lollol|
I010/0Il
lolloll
Gloloton
JIolll0

Ololi | | OlolloIo
0l0l10 lo

IlOl0lol
lololo|

complement:olllo000
o|loo00
I6
tkcomplement

9epeat and Go-


Difenentiate between selective
5, toccls ?
basknpYo
Go-Back-N
5elective Repeat
Ketoansmit allfmes
the .
b only Hetsansmits aas Pom he ot
lost damaged
Specifie pame hat ame lo the crd of
the airolo.

s Equal to he SendeA
oinole bige
3. N
3. N(whete NLS the neumles
ot Piames) , cumalativeacknoleche
Tniidual ac nteulely helabt pram
4, -ment Jeot
menti jo Each prame. Yece ived CooTeCtly

ob - Discasols o t -ef
5, Can hanlle ot 5,
bybfa
Oides pamesdeliwering
SSdeA.
-ing themand Buene.
hem inthe coect
efeiemt eefatially 6. les6 efficient olue Eo
6. Mote wnecessty Aelaans
in kigheeh tate envig -misions
-Ormemy.

imple.
7, Mete cemleatheto neec 7, les6 corplex to implem
- ment due to -ent.
ecoadleN
to beulf and
yames.

You might also like