Explore BrainMass
Share

Character Encoding in Data Link Protocol & Other Questions

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Please see attached file.

The following character encoding is used in a data link protocol:

A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000

Show the bit sequence transmitted (in binary) for the four-character frame: A B ESC FLAG when each of the following framing method is used:

(a) Character count.
(b) Flag bytes with byte stuffing.
(c) Starting and ending flag bytes, with bit stuffing

The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm described in the lecture is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?

One of your classmates, Scrooge, has pointed out that it is wasteful to end each frame with a flag byte and then begin the next one with a second flag byte. One flag byte could do the job as well, and a byte saved is a byte earned. Do you agree?

To provide more reliability than a single parity bit can give, an error-detecting coding scheme uses one parity bit for checking all the odd-numbered bits and a second parity bit for all the even-numbered bits. What is the Hamming distance of this code?

A block of bits with n rows and k columns uses horizontal and vertical parity bits for error detection. Suppose that exactly 4 bits are inverted due to transmission errors. Derive an expression for the probability that the error will be undetected.

A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent?

Imagine a sliding window protocol using so many bits for sequence numbers that wraparound never occurs. What relations must hold among the four window edges and the window size, which is constant and the same for both the sender and the receiver.

Suppose that we model protocol 4 using the finite state machine model. How many states exist for each machine? How many states exist for the communication channel? How many states exist for the complete system (two machines and the channel?) Ignore the checksum errors.

© BrainMass Inc. brainmass.com October 24, 2018, 11:51 pm ad1c9bdddf
https://brainmass.com/computer-science/error-detection-correction/character-encoding-in-data-link-protocol-other-questions-207857

Attachments

Solution Preview

I have tried to provide sufficient information for you to complete your assignment. If you use this material in your work, please remember to cite BrainMass properly.

Remember that my job as an OTA is NOT to complete the work for you, but to provide you with ideas, definitions, research help, and instructions on how you should approach the assignment. It is important to remember that I am an Online Teaching Assistant and my role is to help guide your thinking so that you can improve your understanding of the material and your academic skills set.

--Jim

===================================================

The following character encoding is used in a data link protocol:

A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000

Show the bit sequence transmitted (in binary) for the four-character frame: A B ESC FLAG when each of the following framing method is used:

(a) Character count.
(b) Flag bytes with byte stuffing.
(c) Starting and ending flag bytes, with bit stuffing

Answer:
(a) 00000101 01000111 11100011 11100000 01111110
(b) 01111110 01000111 11100011 11100000 11100000 11100000 0111111001111110
(c) 01111110 01000111 110100011 111000000 011111010 01111110

(Ref: http://www.cs.mu.oz.au/522/Assignments/tute-w3-model-2005.pdf)

The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm described in the lecture is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?

Answer: After stuffing we get: A ...

Solution Summary

6 questions inclduing character encoding, data streams, flags and parity.

$2.19
See Also This Related BrainMass Solution

You and the other members of the IT team for Surebank need to get up to speed on the OSI model.

Scenario:

You are currently working for Surebank, a mid-size financial institution. The organization has approximately 80 people working in their main location where your office is located. The bank also has two branch locations. You have been very successful in your career as a Network Operation Specialist, serving at the help desk, assisting many users with routine problems with their desktop PC's and the company software. Your supervisor, the Network Administrator, was recently fired because of poor attendance. As you are the senior NOS and have performed very capably, you have been appointed as the Interim Network Administrator. If you do well, the interim position could become permanent for you.

Windows 2000 operating system and the Microsoft Office 2000 Suite is on all of the desktop computers (each staff member has a PC). These are the two primary applications you maintain on the network. The staff also uses a text-based interface to the financial system that operates on a mini-main frame similar to a UNIX machine. This interface is supported by consultants. You only need to coordinate the support calls for this software.

Each branch office has only two computers. Those computers are connected to the main office over a Frame Relay network that is supported by your local Internet Service Provider.

When you moved into your new office, you discovered that there is no network inventory, no network diagram, and very little information on how to maintain the network. You believe that the former Network Administrator took all of this information with him in retaliation for being terminated. You are not allowed to contact him, so you are on your own to learn and recreate the information you will need to be successful in this new position.

You will be able to use Internet search engines as well as have access to vendor information and technical resources to assist you in the work.

The main office computers are connected via an Ethernet network and a Token Ring network. Your predecessor was working on a presentation to your boss about having the Token Ring network replaced and converted to Ethernet. You have not been able to find the presentation so you will need to redo his work. In the coming weeks, you will need to both maintain current projects and systems, as well as take on any projects management asks of you.

You and the other members of the IT team for Surebank need to get up to speed on the OSI model. Describe the seven layers of the OSI model. Describe and explain each function of the seven layers, the protocols used, and the network components involved. State your findings as a short presentation.

View Full Posting Details