Environmental interference and physical defects

Assignment Help Basic Computer Science
Reference no: EM132812137

Environmental interference and physical defects in the communication medium can cause random bit errors during data transmission. Error coding is a method of detecting and correcting these errors to ensure information is transferred intact from its source to its destination. Error coding is used for fault tolerant computing in computer memory, magnetic and optical data storage media, satellite and deep space communications, network communications, cellular telephone networks, and almost any other form of digital data communication. Error coding uses mathematical formulas to encode data bits at the source into longer bit words for transmission. The "code word" can then be decoded at the destination to retrieve the information. The extra bits in the code word provide redundancy that, according to the coding scheme used, will allow the destination to use the decoding process to determine if the communication medium introduced errors and in some cases correct them so that the data need not be retransmitted. Different error coding schemes are chosen depending on the types of errors expected, the communication medium's expected error rate, and whether or not data retransmission is possible. Faster processors and better communications technology make more complex coding schemes, with better error detecting and correcting capabilities, possible for smaller embedded systems, allowing for more robust communications. However, tradeoffs between bandwidth and coding overhead, coding complexity and allowable coding delay between transmission, must be considered for each application.

For this assignment, you may need do some research for below questions.

1. What is the definition of a linear block code?

2. In a codeword, we add two redundant bits to each 8-bit word. Find the number of a. valid codewords & b. invalid codewords

3. If we want to be able to detect 2-bit errors, what should be the minimum Hamming distance?

4. In CRC, if the dataword is 5 bits and the codeword is 8 bits, how many 0s need to be added to the dataword to make the dividend? What is the size of the remainder? What is the size of the divisor?

5. In CRC, which of the following generators (divisors) guarantees the detection of an odd number of errors?

a. 10111 b. 101101 c. 111

6. Assume we are sending data items of 16-bit length. If two data items are swapped during transmission, can the traditional checksum detect this error? Explain your answer.

7. Explain why flags are needed when we use variable-size frames.

8. Compare and contrast byte-oriented and bit-oriented protocols.

9. In a byte-oriented protocol, should we first unstuff the extra bytes and then remove the flags or reverse the process?

10. Compare and contrast flow control and error control.

11. Compare and contrast HDLC with PPP.

Reference no: EM132812137

Questions Cloud

Make life journey about more difficult : We all had the unfortunate experience of seeing how computers can, at times, make life's journey about more difficult.
Telecom Network Security : Compare and contrast the difference of network security within an on-premise environment and a cloud environment.
Miles worth of driving data from policyholders : Telematic devices (e.g., safe driving devices) are used by insurance companies to collect billions of miles worth of driving data from policyholders.
Resistance to change is normal everyday aspect : Resistance to change is a normal everyday aspect in the workplace.
Environmental interference and physical defects : Environmental interference and physical defects in the communication medium can cause random bit errors during data transmission.
Deals for cloud access security broker : By 2020, 80% of new deals for Cloud Access Security Broker (CASB) technology will be packaged with network firewall, secure web gateway (SWG)
Changed your perspective or outlook moving forward : This discussion topic is to be reflective of the course material. How has this course changed your perspective or outlook moving forward?
Impacts culture and change management practices : Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.
What are baseline security requirements : What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd