DCC PIP On Chapter 3
DCC PIP On Chapter 3
2. 802.4:Token Bus
Answer
3. 802.5:Token Ring
COI403.3
4.802.11:Wi Fi(Wireless Fidelity)
2 R 2 State types of Errors
Marking Scheme 1 M for 1 each
1.Bit Error
Answer 2.Burst Error
4 U 6 A system uses CRC on a block of 8 bytes. How many redundant bits are sent per block?
What is the ratio of useful bits to total bits?
Marking Scheme Description 6 M The student may assume a polynomial or a divisor and do the problem
Answer CRC is one of the most common and powerful error detecting code which can be describe as
follows. The polynomial code also known as CRC with co-efficient of 0s and 1s. In this method
the sender and receiver must agree upon generator polynomial g(x) in advance. Both the high and
low order bits of the generator (divisor) must be 1. To compute the checksum for some frame
(data) with m bits, the frame must be longer than generator polynomial. The idea is to
append
checksum to the end of frame in such a way that the polynomial represented by the checksum
frame is divisible by g(x). When the receiver gets the checksum frame it
tries dividing it by g(x). If there is remainder there has been a transmission error and zero
remainder means no error in the transmission. r is degree of g(x) polynomial.
Step by step procedure:
1. Append a string of r zero bits to the lower order end of data word(m) where r is less than the
number of bits pre-decided divisor by 1 bit i.e. if divisor = 5 bits then r
= 4 zeros. Now data word contains m+r bits
2. Divide the newly generated data unit in step 1 by the divisor. It is module – 2 division
3. The remainder obtained after division is the r bit CRC.
4. This CRC will replace the r zeros appended to the data unit to get the code word to be
transmitted.
NOTE: The polynomial code for calculation of redundant bits is not given .hence the data given is
insufficient for calculating redundant bits and the ratio of useful bits to total bits.
5 U 2 Classify mobile generations.
Marking Scheme All generations to be mentioned- 2M
First Generation (1G)
Second Generation (2G)
Answer Third Generation (3G)
Fourth Generation (4G)
Fifth Generation (5G)
6 U 2 Compare LRC and CRC (Any two points each)
LRC VRC
Longitudinal Redundancy Check (LRC)is a Cyclic Redundancy Check (CRC) is one of the most
method in which a block of bits is organized common and powerful error detecting codes in
in table(rows and columns)calculate the which a sequence of redundant bits, called the
parity bit for each column and the set of this CRC is appended to the end of the unit so that the
parity bit is also sending with original data. resulting data unit become exactly divisible by a
Answer From the block of parity we can check the second, predetermined binary number
redundancy
LRC of n bits can easily detect CRC is more powerful than LRC & VRC
A longitudinal redundancy check (LRC) is CRC is based on binary division.
an error-
detection method based on binary addition
Answer The IEEE 802.11 standard defines the physical layer and media access control (MAC) layer for a
wireless local area network. Wireless LANs transmit and receive data over the atmosphere, using
radio frequency (RF) or infrared optical technology, thereby; eliminating the need for fixed wired
connections.
802.11 Architecture:
The 802.11architecture defines two types of services:
• The basic services set contain stationary or mobile wireless stations and a Central base station
called access point (AP).
• The use of access point is optional.
• If the access point is not present, it is known as stand-alone network. Such a BSS cannot send
data to other BSSs. This type of architecture is known as adhoc architecture.
• The BSS in which an access point is present is known as an infrastructure network.
An extended service set is created by joining two or more basic service sets (BSS)
Having access points (APs).
These extended networks are created by joining the access points of basic services sets through a
wired LAN known as distribution system.
There are two types of stations in ESS:
Access Controllers
In the absence of adequate security, quality of service (QoS), and roaming mechanisms in
wireless network standards, companies offer access-control solutions to strengthen wireless
systems. The key component to these solutions is an access controller, which is typically
hardware that resides on the wired portion of the network between the access points and the
protected side of the network. Access controllers provide centralized intelligence behind the
access points to regulate traffic between the open wireless network and important resources. In
some cases, the access point contains the access control function.
Application Connectivity Software
Web surfing and e-mail generally perform well over wireless networks. All it takes is a browser
and e-mail software on the client device. Users might lose a wireless connection from time to
time, but the protocols in use for these relatively simple applications are resilient under most
conditions.
Special application connectivity software is necessary as an interface between a user's computer
device and the end system hosting the application's software or database.
Distribution System
A wireless network is seldom entirely free of wires. The distribution system, which often
includes wiring, is generally necessary to tie together the access points, access controllers, and
servers. In most cases, the common Ethernet
comprises the distribution system.
• All communication is between master and a slave. Salve-slave communication is not possible.
• In addition to seven active slave station, a piconet can have upto 255 parked nodes. These
parked nodes are secondary or slave stations and cannot take part in communication until it is
moved from parked state to active state.
2. Scatternet
• Scattemet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet and deliver the
message to its slaves in other piconet where it is acting as master. This node is also called bridge
slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets.