Show the bit sequence transmitted for the four-char form

Assignment Help Computer Networking
Reference no: EM13945202

The following character encoding is used in a data link protocol:

A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000

Show the bit sequence transmitted (in binary) for the four-character frame: A B ESC FLAG when each of the following framing method is used:

(a) Character count.
(b) Flag bytes with byte stuffing.
(c) Starting and ending flag bytes, with bit stuffing

The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm described in the lecture is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?

One of your classmates, Scrooge, has pointed out that it is wasteful to end each frame with a flag byte and then begin the next one with a second flag byte. One flag byte could do the job as well, and a byte saved is a byte earned. Do you agree?

To provide more reliability than a single parity bit can give, an error-detecting coding scheme uses one parity bit for checking all the odd-numbered bits and a second parity bit for all the even-numbered bits. What is the Hamming distance of this code?

A block of bits with n rows and k columns uses horizontal and vertical parity bits for error detection. Suppose that exactly 4 bits are inverted due to transmission errors. Derive an expression for the probability that the error will be undetected.

A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent?

Imagine a sliding window protocol using so many bits for sequence numbers that wraparound never occurs. What relations must hold among the four window edges and the window size, which is constant and the same for both the sender and the receiver.

Suppose that we model protocol 4 using the finite state machine model. How many states exist for each machine? How many states exist for the communication channel? How many states exist for the complete system (two machines and the channel?) Ignore the checksum errors.

Reference no: EM13945202

Questions Cloud

How many units of capital should the firm use : How many units of capital should the firm use to produce 800 units of output at the lowest cost?
A single-gene inheritance pattern : Cystic fibrosis is a human genetic disorder with a single-gene inheritance pattern. A normal couple has a child with cystic fibrosis. Explain how this is possible using the following terms: allele, dominant, gene, mutation, and recessive. You can als..
What is the yield to maturity of nine year bond : What is the yield to maturity of a 9-year bond that pays a coupon rate of 20% per year, has a $1,000 par value, and is currently priced at $1,426? Assume annual interest payments.
The specimen and how the infectious agent : a. Describe the handing of the specimen and how the infectious agent, in this case a bacterial pathogen, is isolated from the sputum b. Explain techniques used to isolate bacteria from a clinical specimen using the learnSmart lab exercise," Isolation..
Show the bit sequence transmitted for the four-char form : A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent?
What is the risk-free rate of return : J&L, Inc. stock has a current market price of $55 a share. The one-year call on J&L stock with a strike price of $55 is priced at $2.50 while the one-year put with a strike price of $55 is priced at $1. What is the risk-free rate of return?
Describe what mib is : 1. List all standards of IEEE 802.11 from a to z. Describe each of them briey in a sentence or two. 2. Compare and contrast OFDM, DSSS and FHSS in terms of various metrics. Explain the current technology with IEEE 802.11a/b/g/n/ac (i.e., tell if t..
Discuss the place that the first amendment plays in shaping : Discuss the place that the First Amendment plays in shaping the perspective of religion in America. Specifically address what the First Amendment is/means, and how that affects the American religious culture, and specifically in relation to previo..
Calculate the payback period-discounted payback period : Your company can purchase new equipment to save money on your utility bills. The cost of the equipment is $270,000, and the monthly savings will be $317. The equipment has an expected life of 25 years. Should you recommend this investment? Calculate ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Reason why australians are not taking the advantage of

reason why australians are not taking the advantage of cloud computing system? what are the reason they are not aware

  Does using bgp make it easier to change the isp provider

Given the choice of protocols (RIP, RIPv2, EIRGP, OSPF and IS-IS) in a mid-size network, which protocol would be most appropriate for the size of this network and why? Does using BGP make it easier to change the ISP provider? Explain why or why not

  An organisation has been granted a block of addresses

an organisation has been granted a block of addresses starting with the address 172.154.68.022.a create three subnets

  How many point-to-point wans are needed

How many point-to-point WANs are needed to connect n LANs if each LAN should be able to directly communicate with any other LAN

  Describe what this suggests to you regarding the basic

the original commercial version of ethernet supported 10 mbps bandwidth the version introduced in the early 1990s

  Computing ip addresses per subnet

How many IP addresses would they have per subnet?

  Incident and crime scene procedures

Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidence seizure and storage procedures for these two types of investigations.

  Propose the best manner to use the terminal services

suggest the best way to use the terminal services gateway and authorization policies in different enterprise settings

  Disadvantages of using voip

Question: Discuss the advantages and disadvantages of using VOIP and any experience that you have with this protocol.

  What is the length #bytes of the ip address

What is the length #bytes of the IP Address and find IP Address of your computer and how many classes are there?

  Define a peer-to-peer system

Is it a reasonable countermeasure to put a volume limit on amount of data exported under a peer-to-peer system. Why do you feel this way

  Wireless networks are becoming increasingly popular but

wireless networks are becoming increasingly popular but many organisations fear that they are a large security risk.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd