Table of Contents Part 1: General review of data link layer 2 a) Explain the working principles of the data link layer. 2 b) Is controlled access better than contention for media access control? Discuss. 2 c) Why is error detection important in this layer? What is being measured? 3 d) Identify three significant noises that can cause errors in data communication digital circuits. Briefly explain. 3 Part 2: General review of error correction 4 a) Why is cyclical redundancy check (CRC) most popular error checking scheme? 4 b) How is Hamming distance used in error correction? Explain. 4 c) Briefly explain how parity is used to find the location of single-bit errors in the forward error correction …show more content…
What is being measured? The responsibility of the data link layer is sending and receiving messages to and from different computers without errors. The data link layer also accepts streams of bits from the physical layer and organizes them into coherent messages that it passes to the network layer (Fitzgerald & Dennis 2009). Error detection is important in this layer because it protects the network from errors. There are human errors and network errors. The network errors are those that occur during transmission of messages from one computer to another computer. During transmission of messages there are two possibilities of network errors that is corrupt data (data that have been changed) and lost data. The data link layer is responsible for the transmission of messages without errors from one computer over one circuit to the next computer where the message needs to go. Even if we know what types of errors can occur, we can recognize the error only if we have a copy of the intended transmission for comparison. But if we don’t have the copy of transmission then detecting errors for machine would be slow, costly and of questionable value (Forouzan 2002). The error detection uses the concept of redundancy which means short group of bits appended to or inserted to each unit of data. The extra bits are redundant to the information (message); they are then discarded as soon as the accuracy of the transmission is determined for detecting errors
It is operating on best effort delivery model, i.e. it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission
The parity bit is also used to restore the data because it matches the same parity bit that matches the data on other row and they can be used to restore the data.
When the input is positive, the digital output bit-stream contains more P bits than N bits. There can be consecutive P bits, but each N bit is separated by at least one P bit. Thus, there are no adjacent N bits when the input is positive. Similarly, when the input is negative, the output bit-stream consists of single P bits separated by one or more N bits. A Delta Sigma bit-stream toggles equally between N bits and P bits when its analog value is 0. Delta Sigma modulation is a type of Pulse Density Modulation (PDM), which means the output digital bit-stream can be converted back to an analog value using a digital moving-average filter. Therefore, in a Delta Sigma modulated bit sequence ai, which has a total of W bits, if there are n bits having the value N, and p bits having the value P, then the analog value y of this bit sequence can be written
Message Loss: This type of failure happens when a message that has been sent from one computer on the distributed system to another computer on the distributed system never reaches the computer that it was sent to. This can be minor or severe depending on what type of message was sent from the sending computer. Message loss is similar to data loss in a way that a message contains data and when it’s lost, the data in it is lost.
Data Link Layer communicates two routers by means of physical channel. In Transport Layer the communication is achieved throughout a subnet.
flow between sender and receiver, and perform the overall error control to recover any lost data to protect
The proposed concept is implemented as a prototype and this document gives a detailed insight about the prototype. The prototype considers wired and wireless communication and the data exchanges between them. All the simulations are executed on a windows laptop.
Information will only have value if customers can access it at the right times. Availability can be affected by system errors, and malicious attacks as well as infrastructure problems. Availability is ensured by maintaining hardware as well as repairing hardware immediately when need arise. A correct functioning operating system should also be maintained in the environment free of software conflicts. Adequate communication bandwidth should also be addressed as well as preventing bottlenecks from occurrence.
layer 2 | Bridges and switches, Ethernet incorporates both this layer and the Physical layer. | - |
In this Exercise, you will explain how data travels long distances in a real world example.
12. The I/O processor has a straight admission to....................... And covers a number of independent data channels.
An informatics needs assessment is a critical step in the selection and implementation of the Electronic Health Record (EHR). The purpose of a needs assessment is to understand the organization and the needs of the organization well enough to boost the positive impact of an EHR while minimizing the negative effects (American Medical Association, n.d.).
Example 1 – Consider the following relational database for the Super Baseball League. It keeps track of teams in the league, coaches and players on the teams, work experience of the coaches, bats belonging to each team, and which players have played on which teams. Note the following facts about this environment:
It is generally accepted that information is a vital commodity for the successful operation of today’s organizations. Nowadays modern business organizations are using computerized information systems in order to obtain such information. However as the technology advances rapidly the main issue is how can an organization should effectively use such an information system - which its management sometimes can be unpredictable - in order to effectively help the whole organization structure to improve and take the most out of it.
Advancements in the information technology sector have brought many benefits to the people all around the world. Today with computer networking, we can chat, speak and see each other over a long distance. Data communication refers to the transmission of the digital signals over a communication channel between the transmitter and receiver computers. Communication is possible only with wired and wireless connectivity of the computers with each other.