Data Communication Assignment Final PDF
Data Communication Assignment Final PDF
Creative Assignmnt
2. List and briefly define some of the requirements for effective communica-
tions over a data link.
Ans:
Requirements for effective communicationsover a data link layer: Because of the possibil-
ity of transmission errors, and because the receiver of data may need to regulate the rate at which
data arrive,synchronization and interfacing techniques are insufficient by themselves. It is neces-
sary to impose a layer of control in each communicating device that provides functions such as
flow control, error detection, and error control.This layer of control is known as a data link con-
trol protocol.
Flow control: It enables a receiver to regulate the flow of data from a sender so that the receier’s
buffers do not overflow.Error Control: In a data link control protocol, error control is achieved
by retransmission of damaged frames that have not been acknowledged or for which the other
side requests a retransmission.
Control Protocol: High-level data link control (HDLC) is a widely used data link control proto-
col. It contains virtually all of the features found in other data link control protocols.
Addressing: On a multipoint line, such as a local area network (LAN), the identity of the two
stations involved in a transmission must be specified
Control and data on same link: The receiver must be able to distinguish control
information from the data being transmitted.
Link management: The initiation, maintenance, and termination of a sustained data exchange
require a fair amount of coordination and cooperation among stations. Procedures for the man-
agement of this exchange are required.
3. Give a brief explanation of each of the congestion control techniques illus-
trated in the following figure.
Ans:
Congestion control techniques: there are five types of congestion control illustrated they are:
a) Policing b) Implicit Signaling c) Explicit Signaling d) Back pressure e) Choke packet
Policing: In policing, A node in the network, typically the node to which the end system attach-
es, monitors the traffic flow and compares it to the traffic contract. Excess traffic is either dis-
carded or marked to indicate that it is liable to discard or delay.
Implicit congestion signaling: In implicit, If a source is able to detect increased delays and
packet discards, then it has implicit evidence of network congestion
.
Explicit congestion signaling: Ifor explicit congestion avoidance, the network alerts end sys-
tems to growing congestion within the network and the end systems take steps to reduce the of-
fered load to the network.
Backpressure: It involves link-by-link use of flow control in a direction toward the source. This
technique produces an effect similar to backpressure in fluids flowing down a pipe.
Choke packet: A choke packet is a control packet generated at a congested node and transmitted
back to a source node to restrict traffic flow.
4. Two neighboring nodes (A and B) use a sliding-window protocol with a 3-bit sequence number. As the ARQ
mechanism, go-back-N is used with a window size of 4. Assuming A is transmitting and B is receiving, show the
window positions for the following succession of events: a. Before A sends any frames b. After A sends frames 0,
1, 2 and receives acknowledgment from B for 0 and 1 c. After A sends frames 3, 4, and 5 and B acknowledges 4
and the ACK is received by A
Ans: a)
Sender
0 1 2 3 4 5
Receiver
0 1 2 3 4 5
b)
Sender
0 1 2 3 4 5
Acknowledgement received for two bits remains in 4 bit size
Receiver
0 1 2 3 4 5
receiver has received all data hence the window
c)
Sender
0 1 2 3 4 5 6 7 0
Receiver
0 1 2 3 4 5 6 7 0
Acknowledgement received for two bits