Sie sind auf Seite 1von 9

Data Communications

Faculty of Engineering Technology


Department of Electrical and Computer Engineering

Please fill this form accurately and annex it to the first page of your assignment at the point
indicated on the marked assignment.

OFFICE USE ONLY


Student Registration No 317147659

Student Name W.B.S Livera

Course Code EEX5534

Course Name Data Communications

Mini project/Case study


TMA 01
or TMA Title

TMA/Case study No. TMA 01

Due Date 15th Jun, 2018

Please write your name & Address on the dotted lines below

From:
Dept. of Electrical and Computer Engineering
Dept. of ___________________________________
The Open University of Sri Lanka

_ P. O. Box 21

Nawala, Nugegoda

To:W B S Livera
………………………………………………………………
238,
………………………………………………………………
Kopiwaththa rd,
………………………………………………………………
Minuwangoda.
………………………………………………………………

………………………………………………………………
Q1. (a)

i) Layered architecture basically means dividing the design in to small pieces, and each piece build on
some other lower level piece of the design. Each piece has range of tasks to perform to make whole
communication between systems.

Since the whole communication process is divided in to pieces, each piece need to provide service to
other pieces and maintain necessary commination between them. For this purpose between each
layer interfaces are maintained. The interface defines which primitives function and services the
lower layer offers to the upper layer adjacent to it.

ii)
 Communication as a whole a big task, by dividing big task to layers, implementation and
troubleshooting become simple and flexible.

 Since the implementation of layer is abstract, each layer could be reusable in different
implementations with minimal changes, which also increase the scalability.

 Since the intermediate layer(s) provide a unique abstraction for various network
technologies, applications need not to re-implement for each network technology.

iii) The packet is the basic unit of information transferred across a network. It contains at least a header
with the sending and receiving hosts' addresses with message, to be transferred. As the packet
travels through the layers of network (such as TCP/IP) , the protocols at each layer either add or
remove fields from the basic header. When a protocol on the sending host adds data to the packet
header, the process is called data encapsulation. So without encapsulation, it would be very hard to
transport and there will be high security risk associate with the packet as packet could be viewed by
any host.

iv)

TCP/IP Model OSI Model


TCP/IP model has 4 layers, which used for data OSI Model is generic model which includes 7
transmission in internet. layers
Transport Layer could be connection oriented or
Transport Layer is Connection Oriented.
connection less.

Follows horizontal approach. Follows vertical approach.

TCP/IP is a client-server model. OSI is a reference model.

Both models are layered.

Share common layer, application but services provided are different.

All the layers from bottom till Transport Layer provides End to End Transport Service.
(b) i) If the sampling frequency and the maximum signal frequency is

According to sampling theorem


Here

ii.

iii.

iv.

35dB
35dB
Q2. (a)

i. Single Parity Check

In Single parity check, a bit is added to end of each frame, if the number of ‘1’ in the data frame is odd,
then parity bit will be ‘1’ to make the number of ‘1’ even, ‘0’ otherwise. It can’t detect all the errors
though. If there is even number of errors, it can’t be detected

For example

0 1 1 1 0 1 Parity bit

0 1 1 1 0 1 Received correctly.

0 0 1 0 0 1 Received incorrectly.

In above example, in last frame, the received frame two bits have changed their values form ‘1’ to ‘0’
which makes the number ‘1’s odd in the data frame so the parity bit is correct compared to number of ‘1’s.
Hence the both frames would identify as valid by the receiving end.

ii. Two Dimensional Parity Check


In two dimensional parity check multiple data frames are structured as matrix and then the single parity
check is applied to each columns and rows. For each frame a parity bit is added which represents the row
parity bit while separate frame will be transmitted to represent row parity bits.

For example suppose transmitting following frames

0011001 1110100 1011011 0001011

0 0 1 1 0 0 1 1
1 1 1 0 1 0 0 0
1 0 1 1 0 1 1 1
0 0 0 1 0 1 1 1
0 1 1 1 1 0 1 1
Transmitting frames

Correctly transmitted Corrupted


0 0 1 1 0 0 1 1 0 0 1 1 0 0 1 1
1 1 1 0 1 0 0 0 1 1 1 0 1 0 0 0
1 0 1 1 0 1 1 1 1 0 1 1 0 0 0 1
0 0 0 1 0 1 1 1 0 0 0 1 0 0 0 1
0 1 1 1 1 0 1 1 0 1 1 1 1 0 1 1

As per the above example in the corrupted version will also detect as valid since the both last two data
frames’ row bits identified as valid, and also the column parity bit transmitted also identified as valid. Since
the each column and row check as same as single parity check when there is even number of errors in two
or more units in exactly same position it can’t be detected.
Q2. (b)

i.

10001010100
10011 100100110110000
10011
10110
10011
10111
10011 MSG = 10010011011
10000 CRC = 1100
10011 ENCODED = 100100110111100
1100

ii. To received message to be valid, it is required to encoded message divisible by

110011100100
10011 110110110111100
10011
10000
10011
11110
10011
11011
10011
10001
10011
10110
10011
1010 Since the reminder is present, error will be detected

iii.
11001010100
10011 110111110111100
10011
10001
10011
10110
10011
10111
10011
10011
10011
000
Since the reminder is 0, error won’t be detected

iv. Validating of the encoded message is done by checking the encoded message divisible by
polynomial, , If bits of message get changed in a such a way the resulted corrupted frame also
divisible by polynomial then it won’t be able to detect. For example compare the (ii) where the reminder
was not 0 while in the (iii) even the data got changed it could be divided by the polynomial.
Q2. (c)

1 1 0 0 1 0 1 1 1 0 1

i. Bipolar RZ

ii. Manchester

iii. Differential
Manchester
Q3. (a)

i. CSMA/CD stands for Carrier sense multiple access/collision detection and it is media access control
method used in Ethernet wired connections. This can be simplified to two part, carrier sense and
collision detection. When one host requires transmitting data over media, first it will sense the media to
check whether the media is free, it starts transmitting data if it is free only.

Collision detection part comes in to play when two or more hosts sense carrier simultaneously and
detect that the media is free. Since now every host tries to transmit data, a collision results. In such case
hosts get informed about the collision and they will set clock with random time, once the random time
period ends, they will try to transmit data again through the media.

For proper functioning of CSMA/CD frames, the farthest node of the network has to be able to sense the
transmission before the transmission ends. If the frames are very small, the source can complete
transmitting before collision happens in farthest node of the network, in such case there won't be any
way to inform collision to sender. This is called as the minimum frame size of Ethernet.

ii. CSMA/CA stands for Carrier sense multiple access/collision avoidance and it is media access control
method used in wireless connections. Since this is wireless transmitting it is very hard to detect the
collision so it requires sending out a signal to the network even before transmitting data to check
whether media is free to transmit (increase network traffic). When a node receives data for sending, the
first thing it does is to listen to the broadcast channel for a pre-specified time frame to determine if
another node is broadcasting on the channel inside the wireless range. If the broadcast channel is
detected as free the node can then start transmitting the data packet.

Once the data is received by the receiving end, it sends back an acknowledgment packet (ACK) after a
short while. If the ACK is not received, it is assumed that the packet is lost and then a retransmission is
set up.

In a wireless network, it is possible that the node at the far edge of the access point's range, can see the
access point, but not the other node at the opposite end of the access point's range. In such case when
those two nodes start to send packets same time to the access point both can't able to sense the carrier.
As a result of this collision avoidance (CSMA/CA) does not work, so the collisions occur.
b)

a. 6 LANs

b. Factory building will use WLAN since it is hard to draw cables due to heavy machinery and all others will
use Ethernet.

c. IP VPN is a Virtual Private Network (VPN)

d. Rough Diagram

IP
IP/VPN
VP

Q4.

a) The IETF is a large open international community of network designers, operators, vendors, and researchers
concerned with the evolution of the Internet architecture and the proper operation of the Internet. It
consists of a number of working groups (WGs) classified into several areas. Currently, there are seven areas:
Applications, General, Internet, Operations and, Management, Routing, Security, Transport. They
work together to develop open standards through open processes to make the Internet work better. The
IETF is open to anyone to get involved by simply signing up.

b)

RFC 2026 is a document that specifies an Internet Best Current Practices for the Internet Community and request
discussion and suggestions for improvements. It documents the process used by the Internet Community for the
standardization of protocols and procedures.

Once a specification submitted it is become Internet-Draft, and available for community review. Upon IETF
working group recommendation it will move to IESG.

Then IESG review the specification whether it satisfies the applicable criteria for the recommended action, and if
it does next IESG sends notice to the IETF of the pending IESG consideration of the document(s) to permit a final
review by the general Internet community.

Once the last-call period expires, the IESG determine whether to recommend draft for action.

Once the action is approved, it will be published as RFC, and same time it will be removed from the internet-
draft.
c)

RFC 1157 RFC 1035 RFC 1883


Written
May 1990 November 1987 December 1995
On
Jeffrey D. Case
Mark Fedor Stephen E. Deering
Author/s P. Mockapetris
Martin Lee Schoffstall Robert M. Hinden
James R. Davin

Primary goal of this RFC to


describe protocol which can be
RFC primary goal is to
used to monitor and control
describe domain name
network elements such as Primary goal of this RFC to
resolving mechanism. It
Primary gateways, terminals etc which describe IP v6 by focusing on the
describes a way which should
Goal can reduce complexity of IPv6 header options and the
be used to name resources to
network managing operations. packet sizes.
access them from different
The protocol is named as
hosts, networks etc.
Simple Network Management
Protocol.

Das könnte Ihnen auch gefallen