What is the maximum overhead in byte-stuffing algorithm

Assignment Help Computer Networking
Reference no: EM132336774

Book-COMPUTER NETWORKS By ANDREW S. TANENBAUM and DAVID J. WETHERALL

THE DATA LINK LAYER

PROBLEMS

1. An upper-layer packet is split into 10 frames, each of which has an 80% chance of arriving undamaged. If no error control is done by the data link protocol, how many times must the message be sent on average to get the entire thing through?

2. The following character encoding is used in a data link protocol:

A: 01000111 B: 11100011 FLAG: 01111110 ESC: 11100000

Show the bit sequence transmitted (in binary) for the four-character frame A B ESC

FLAG when each of the following framing methods is used:

(a) Byte count.

(b) Flag bytes with byte stuffing.

(c) Starting and ending flag bytes with bit stuffing.

3. The following data fragment occurs in the middle of a data stream for which the bytestuffing algorithm described in the text is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?

4. What is the maximum overhead in byte-stuffing algorithm?

5. One of your classmates, Scrooge, has pointed out that it is wasteful to end each frame with a flag byte and then begin the next one with a second flag byte. One flag byte could do the job as well, and a byte saved is a byte earned. Do you agree?

6. A bit string, 0111101111101111110, needs to be transmitted at the data link layer. What is the string actually transmitted after bit stuffing?

7. Can you think of any circumstances under which an open-loop protocol (e.g., a Hamming code) might be preferable to the feedback-type protocols discussed throughout
this chapter?

8. To provide more reliability than a single parity bit can give, an error-detecting coding scheme uses one parity bit for checking all the odd-numbered bits and a second parity bit for all the even-numbered bits. What is the Hamming distance of this code?

9. Sixteen-bit messages are transmitted using a Hamming code. How many check bits are needed to ensure that the receiver can detect and correct single-bit errors? Show the bit pattern transmitted for the message 1101001100110101. Assume that even parity is used in the Hamming code.

10. A 12-bit Hamming code whose hexadecimal value is 0xE4F arrives at a receiver. What was the original value in hexadecimal? Assume that not more than 1 bit is in error.

11. One way of detecting errors is to transmit data as a block of n rows of k bits per row and add parity bits to each row and each column. The bitin the lower-right corner is a parity bit that checks its row and its column. Will this scheme detect all single errors? Double errors? Triple errors? Show that this scheme cannot detect some four-bit errors.

12. Suppose that data are transmitted in blocks of sizes 1000 bits. What is the maximum error rate under which error detection and retransmission mechanism (1 parity bit per block) is better than using Hamming code? Assume that bit errors are independent of one another and no bit error occurs during retransmission.

13. A block of bits with n rows and k columns uses horizontal and vertical parity bits for error detection. Suppose that exactly 4 bits are inverted due to transmission errors. Derive an expression for the probability that the error will be undetected.

14. Using the convolutional coder of Fig. 3-7, what is the output sequence when the input sequence is 10101010 (left to right) and the internal state is initially all zero?

15. Suppose that a message 1001 1100 1010 0011 is transmitted using Internet Checksum (4-bit word). What is the value of the checksum?

16. What is the remainder obtained by dividing x 7 + x 5 + 1 by the generator polynomial x 3 + 1?

17. A bit stream 10011101 is transmitted using the standard CRC method described in the text. The generator polynomial is x 3 + 1. Show the actual bit string  transmitted. Suppose that the third bit from the left is inverted during transmission. Show that this error is detected at the receiver’s end. Give an example of bit errors in the bit string transmitted that will not be detected by the receiver.

18. A 1024-bit message is sent that contains 992 data bits and 32 CRC bits. CRC is computed using the IEEE 802 standardized, 32-degree CRC polynomial. For each of the following, explain whether the errors during message transmission will be detected by the receiver:

(a) There was a single-bit error.

(b) There were two isolated bit errors.

(c) There were 18 isolated bit errors.

(d) There were 47 isolated bit errors.

(e) There was a 24-bit long burst error.

(f) There was a 35-bit long burst error.

19. In the discussion of ARQ protocol in Section 3.3.3, a scenario was outlined that resulted in the receiver accepting two copies of the same frame due to a loss of acknowledgement frame. Is it possible that a receiver may accept multiple copies of the same frame when none of the frames (message or acknowledgement) are lost?

20. A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50%?

21. In protocol 3, is it possible for the sender to start the timer when it is already running? If so, how might this occur? If not, why is it impossible?

22. A 3000-km-long T1 trunk is used to transmit 64-byte frames using protocol 5. If the propagation speed is 6 μsec/km, how many bits should the sequence numbers be?

23. Imagine a sliding window protocol using so many bits for sequence numbers that wraparound never occurs. What relations must hold among the four window edges and the window size, which is constant and the same for both the sender and the receiver?

24. If the procedure between in protocol 5 checked for the condition a ≤ b ≤ c instead of the condition a ≤ b<c, would that have any effect on the protocol’s correctness or efficiency? Explain your answer.

25. In protocol 6, when a data frame arrives, a check is made to see if the sequence number differs from the one expected and no nak is true. If both conditions hold, a NAK is sent. Otherwise, the auxiliary timer is started. Suppose that the else clause were omitted. Would this change affect the protocol’s correctness?

26. Suppose that the three-statement while loop near the end of protocol 6 was removed from the code. Would this affect the correctness of the protocol or just the performance? Explain your answer.

27. The distance from earth to a distant planet is approximately 9 × 1010 m. What is the channel utilization if a stop-and-wait protocol is used for frame transmission on a 64 Mbps point-to-point link? Assume that the frame size is 32 KB and the speed of light is 3 × 108 m/s.

28. In the previous problem, suppose a sliding window protocol is used instead. For what send window size will the link utilization be 100%? You may ignore the protocol processing times at the sender and the receiver.

29. In protocol 6, the code for frame arrival has a section used for NAKs. This section is invoked if the incoming frame is a NAK and another condition is met. Give a scenario where the presence of this other condition is essential.

30. Consider the operation of protocol 6 over a 1-Mbps perfect (i.e., error-free) line. The maximum frame size is 1000 bits. New packets are generated 1 second apart. The timeout interval is 10 msec. If the special acknowledgement timer were eliminated, unnecessary timeouts would occur. How many times would the average message be
transmitted?

31. In protocol 6, MAX SEQ = 2n − 1. While this condition is obviously desirable to make efficient use of header bits, we have not demonstrated that it is essential. Does the protocol work correctly for MAX SEQ = 4, for example?

32. Frames of 1000 bits are sent over a 1-Mbps channel using a geostationary satellite whose propagation time from the earth is 270 msec. Acknowledgements are always
piggybacked onto data frames. The headers are very short. Three-bit sequence numbers are used. What is the maximum achievable channel utilization for

(a) Stop-and-wait?

(b) Protocol 5?

(c) Protocol 6?

33. Compute the fraction of the bandwidth that is wasted on overhead (headers and retransmissions) for protocol 6 on a heavily loaded 50-kbps satellite channel with data frames consisting of 40 header and 3960 data bits. Assume that the signal propagation time from the earth to the satellite is 270 msec. ACK frames never occur. NAK frames are 40 bits. The error rate for data frames is 1%, and the error rate for NAK frames is negligible. The sequence numbers are 8 bits.

34. Consider an error-free 64-kbps satellite channel used to send 512-byte data frames in one direction, with very short acknowledgements coming back the other way. What is the maximum throughput for window sizes of 1, 7, 15, and 127? The earth-satellite propagation time is 270 msec.

35. A 100-km-long cable runs at the T1 data rate. The propagation speed in the cable is 2/3 the speed of light in vacuum. How many bits fit in the cable?

36. Give at least one reason why PPP uses byte stuffing instead of bit stuffing to prevent accidental flag bytes within the payload from causing confusion.

37. What is the minimum overhead to send an IP packet using PPP? Count only the overhead introduced by PPP itself, not the IP header overhead. What is the maximum
overhead?

38. A 100-byte IP packet is transmitted over a local loop using ADSL protocol stack. How many ATM cells will be transmitted? Briefly describe their contents.

39. The goal of this lab exercise is to implement an error-detection mechanism using the standard CRC algorithm described in the text. Write two programs, generator and verifier. The generator program reads from standard input a line of ASCII text containing an n-bit message consisting of a string of 0s and 1s.

The second line is the kbit polynomial, also in ASCII. It outputs to standard output a line of ASCII text with n + k 0s and 1s representing the message to be transmitted. Then it outputs the polynomial, just as it read it in. The verifier program reads in the output of the generator program and outputs a message indicating whether it is correct or not. Finally, write a program, alter, that inverts 1 bit on the first line depending on its argument (the bit number counting the leftmost bit as 1) but copies the rest of the two lines correctly.

By typing

generator <file | verifier

you should see that the message is correct, but by typing

generator <file | alter arg | verifier

you should get the error message.

Reference no: EM132336774

Questions Cloud

Why ethical safeguards designed for clinical research : Describe why ethical safeguards designed for clinical research may not be feasible or appropriate for evidence-based practice or evidence-based practice.
Focusing on conditions such as depression and schizophrenia : Should music therapy be used as treatment over other forms of treatment patients with psychosis? Focusing on Conditions such as depression and schizophrenia.
Describe historical events that have influenced development : Describe two historical events (united states only) that have influenced the development of ethical codes and regulations for nursing and healthcare research.
How the theories apply to your own experience : As health care consumers, we all expect quality care and positive outcomes. It is important as professionals that we meet these demands of health care consumers
What is the maximum overhead in byte-stuffing algorithm : THE DATA LINK LAYER-Computer Networks for HND RQF Level-How many times must the message be sent on average to get the entire thing through?
How clinical pathways used to coordinate care of caseloads : Describe how clinical pathways are used to coordinate care of caseloads of patients. What is the role of the case manager in evaluating a patient's progress?
Three guidelines for designing for the user : State at least three guidelines for designing for the user, and explain how following these guidelines will help developers create user-centered site?
Print a message that informs the user the city : If it is not found, the program should print a message that informs the user the city name is not found in the list of valid cities in Michigan.
Demonstrate ability to thoroughly assess the learning styles : Demonstrate ability to thoroughly assess the learning styles of an individual or family using given developmental or cultural models.

Reviews

Write a Review

Computer Networking Questions & Answers

  How is a network layer protocol different from a layer

ISE 218:How is a Network Layer protocol different from a Transport Layer protocol?Which bytes will be sent next?

  Installation and configure enterprise network servers

Plan and implement various application servers for an organisation - identify and propose the required servers and server roles (services), and (iii) provide

  Kind of networking hardware used-dsl for internet connection

Most homeowners select to install a DSL for Internet connection what kind of networking hardware would you suggest?

  How you implement a firewall solution for organization

Describe how you implement a firewall solution for a large organization with only system (end point) firewalls (i.e., Microsoft XP firewall). Explain the challenges of not having a firewall which is centrally located at the network's core and not ..

  You are required to set up a small network with network id

you are required to set up a small network with network id 200.100.50.16027. in this network there are three routers

  Operating systems

The figure below shows a tunnel going through a mountain and two streets parallel to each other-one at each end of the tunnel. Traffic lights are located at each end of the tunnel to control the cross flow of traffic through each inter¬section.

  Identify three current or future security issues in sdn

MN502 - Overview of Network Security Literature review on Software Defined Networking (SDN) and Identify three current or future security issues in SDN.

  Advantages of a client-server system using a LAN

An alternative to a LAN is simply a big timesharing system with terminals for all users. Give two advantages of a client-server system using a LAN

  Which has access to the raw message

Please answer this post like discussion if you agree or disagree, and why? Please explain it. This post is the answer from somebody else about question

  The senior network architect for a larger corporation

You are the senior network architect for a larger corporation, and your company bought a new building and to which the entire workforce will move shortly. The seating arrangement in the new building has part of the sales team on the second floor and ..

  Neural network show from sources like , my md''s office, dm

What kind of patterns might the neural network show from sources like , my MD's office, the DMV?

  Apply the following formatting attributes to the range a7:g8

Melissa Gehring, manager of the Los Angeles office for First Choice Travel, has prepared a worksheet listing European destinations and the current package pricing options. Melissa has requested that you enhance the worksheet with clip art and form..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd