You are on page 1of 3

ANNEXURE

Homework type/no: _3___________________Course code: _cse 306___________

Date of allotment: _8/4/2010___________Date of submission: 22/4/2010______

Student roll no: __A27___ Section no: __D1801__Regd. No:-10802027______

Declaration:

I declare that this assignment is my individual work. I have not copied from any other
student’s work or from any other source except where due acknowledgment is made
explicitly in the text, nor has been written for me another person.

Student’s signature: Rohit Kumar Garg

Evaluator’s comments:

Marks obtained _____________________ out of________________________

Content of home work should start from this page only:

CSE-306 -Computer Networks

HomeWork 3

1.Data Link Layer Protocols always put CRC in there trailer rather than in the header.
Why?

Ans 1. The CRC is computed while the packet is being transmitted and then incorporated in a
trailer. Similarly, the receiver computes the CRC and compares it with the transmitted one.
From both points of view, it is better to have the CRC in a trailer.

Because then you can compute the CRC as you transmit the packet, and then splat out the
final CRC at the end. If you put it in the header, you would have to make *one* pass over the
packet computing the CRC, then send the CRC, and then a *second* pass actually stuffing
each byte out the interface
2. Slotted aloha is a improved version on aloha protocol. On what factors the
improvement is implemented in slotted aloha.

Ans 2. Factors are time and collision:

Time-In slotted ALOHA, time is divided into slots and the station is forced to send only at
the beginning of the time slot. In slotted ALOHA vulnerable time is reduced to one-half
because there is the possibility of collisions.

Collision- In terms of collision that is there was less collision rate. In pure aloha the
percentage of transmission was abt 19 % and in case of sorted it was doubled that is 38%

3. When bit stuffing is used, is it possible for loss, insertion or modification of a single
bit to cause an error not detected by checksum? If not why not? If so how? Does
checksum play a role there?

Ans 3. It is possible possible for loss, insertion or modification of a single bit to cause an
error not detected by checksum. If data is 01111110 -> 011111010 if the second 0 is lost due
to transmission error, 01111110 will received, which can be interpreted as end of frame.
The bits before the end of the frame will then be interpreted as the checksum. If the checksum
is 4 bits, there is 1 chance in 24 that these random bits will be interpreted as a valid
checksum. The longer the checksum, the less likely that this mistake will happen.

4. Give two reasons why network might use an error correcting code instead of error
detection and retransmission?

Ans 4. Error correction can be handled in 2 ways-In one, when an error is discovered the
receiver can have the sender transmit the entire data unit. In the other, receiver can use an
error correcting code, which automatically corrects certain errors. In theory, it is possible to
correct any binary code errors automatically. Error correcting codes however are more
sophisticated than error detection codes and require more redundancy bits The number of bits
required to correct a multiple bits or a burst error is so high that in most cases it is inefficient
to do so. For this reason, error correction is preferred over error detection and retransmission.

5. Wireless transmission and wired transmission use different set of multiple channel
allocation strategies. Why there was a need of avoidance when detection was already
available?

Ans 5. If the collision is detected, then the frame is resend later to the receiver. So it’s better
to avoid the collision rather than to detect and retransmit the data.

6. Bluetooth supports two types of links between a slave and master .What are they and
why is each one used for?

Ans 6. Each frame is transmitted over a logical channel, called a link, between the master
and slave. There are two kinds of links:
(a) ACL (Asynchronous Connection-Less) link, which is used for packet-switched data
available at irregular intervals.
(b) SCO (Synchronous Connection Oriented) link, which is for real-time data, such as
telephone connections.

7. Using 5-bit sequence numbers, what is the maximum size of the send and receive
windows for each of the following protocols?

a. Stop-and-Wait ARQ

b. Go-Back-N ARQ

c. Selective-Repeat ARQ

Ans 7. a. Send window size:1

Receive window size:1

b. Send window size:32-1=31

Receive window size:1

c. Send window size:32/2=16

Receive window size:32/2=16

8. If an Ethernet destination address is 07:01:02:03:04:05, what is the type of the

address (unicast, multicast, or broadcast)?

Ans 8. The first byte in binary is 00000111. The least significant bit is 1. This
means that the pattern defines a multicast address.

You might also like