Chapter 9: Data Transmission
|
|
- Madeline Copeland
- 6 years ago
- Views:
Transcription
1 Chapter 9: Data Transmission MULTIPLE CHOICE 1. In practical terms, parallel data transmission is sent: a. over short distances only c. over any distance b. usually over long distances d. usually over a coaxial cable A 2. The five-level teletype code was invented by: a. the Morkum Company c. Western Union b. the Teletype Company d. Emile Baudot 3. Data codes are also called: a. character codes c. they do not have any other name b. character sets d. both a and b C 4. Digital data that is not being used to carry characters is called: a. FIGS data c. numerical data b. binary data d. all of the above 5. Character codes include: a. alphanumeric characters c. graphic control characters b. data link control characters d. all of the above 6. ASCII stands for: a. American Standard Character-set 2 b. American Standard Code for Information Interchange c. American Standard Code 2 d. Alphanumeric Standard Code for Information Interchange 7. BS, FF, and CR are examples of: a. nonstandard character codes c. control characters b. escape characters d. none of the above C 8. LF stands for: a. Line Feed c. Line Forward
2 b. Link Feed d. Link Forward A 9. UART stands for: a. Universal Asynchronous Receiver-Transmitter b. Unidirectional Asynchronous Receiver-Transmitter c. Unaltered Received Text d. Universal Automatic Receiver for Text A 10. In asynchronous transmission, the transmitter and receiver are: a. frame-by-frame synchronized using the data bits b. frame-by-frame synchronized using a common clock c. frame-by-frame synchronized using the start and stop bits d. not synchronized at all, hence the name "asynchronous" C 11. In asynchronous transmission, the time between consecutive frames is: a. equal to zero c. equal to the start and stop bit-times b. equal to one bit-time d. not a set length 12. In synchronous transmission, the frames are: a. about the same length as ten asynchronous frames b. much longer than asynchronous frames c. 128 bytes long d bytes long 13. Synchronous transmission is used because: a. no start and stop bits means higher efficiency b. it is cheaper than asynchronous since no UARTS are required c. it is easier to implement than asynchronous d. all of the above A 14. In synchronous transmission, the receiver "syncs-up" with the transmitter by using: a. the clock bits c. the CRC bits b. the data bits d. a separate clock line 15. To maintain synchronization in synchronous transmission: a. long strings of 1s and 0s must not be allowed b. transmission must stop periodically for resynchronization c. the clock circuits must be precisely adjusted d. the channel must be noise-free
3 A 16. BISYNC: a. is an IBM product c. requires the use of DLE b. is a character-oriented protocol d. all of the above 17. HDLC: a. is an IBM product c. is identical to SDLC b. is a bit-oriented protocol d. all of the above 18. The use of flags in SDLC requires: a. "bit-stuffing" c. FEC b. different flags at either end of a frame d. ARQ A 19. The initials ARQ are used to designate: a. automatic request for resynchronization c. automatic receiver queue b. automatic request for retransmission d. automatic request for queue 20. ARQ is used to: a. correct bit errors c. put data into a temporary buffer b. correct synchronization problems d. none of the above A 21. FEC stands for: a. Fixed Error Control c. Forward Error Correction b. Forward Error Control d. False Error Condition C 22. VRC is another name for: a. FEC c. LRC b. ARQ d. parity 23. CRC stands for: a. Control Receiver Code c. Cyclic Redundancy Check b. Correct Received Character d. Cycle Repeat Character C 24. Huffman codes: a. allow errors to be detected but not corrected b. allow errors to be detected and corrected c. allow alphanumeric data to be corrected
4 d. allow alphanumeric data to be compressed 25. Run-length encoding is used to: a. encrypt data c. correct data b. compress data d. none of the above 26. Public-key encryption: a. allows the use of digital signatures c. avoids the "password problem" b. is used to convey symmetric keys d. all of the above 27. SDLC stands for: a. Synchronous Data Link Control c. Synchronous Data Link Character b. Synchronous Data Line Control d. Synchronous Data Line Character A 28. HDLC is: a. a bit-oriented protocol c. an ISO standard b. based on SDLC d. all of the above COMPLETION 1. Parallel transmission can be used only for distances. short 2. The term "baud" was named after Emil. audot 3. Data codes are also called codes. character 4. The code is a 7-bit code commonly used in communication between personal computers. ASCII 5. The two letters designate the code character used to advance a printer to the next page. FF
5 6. An asynchronous frame begins with the bit. start 7. An asynchronous frame ends with the bit. stop 8. At the end of an asynchronous frame, the line will be at the level. mark binary 1 9. An integrated circuit called a is used in an asynchronous communication system to convert between parallel and serial data. UART 10. When receiving digital data, are used to hold data until they can be read. buffers 11. Synchronous communication is more than asynchronous since there are fewer "overhead" bits. efficient 12. There must be sufficient 1-to-0 to maintain synchronization in synchronous transmission. transitions 13. Clock sync is derived from the stream of bits in synchronous transmission. data 14. In the protocol, each frame begins with at least two SYN characters. ISYNC 15. In HDLC, each frame starts with an 8-bit. flag 16. The first eight bits of an SDLC frame are BCC stands for check character.
6 block 18. DLE stands for data link. escape 19. HDLC uses bit- to prevent accidental flags. stuffing 20. errors cause many consecutive bits to be bad. urst 21. FEC stands for error correction. forward 22. An scheme corrects errors by requiring the retransmission of bad blocks. ARQ 23. Parity fails when an number of bits are in error. even 24. CRC codes are particularly good at detecting errors. burst 25. Huffman coding and run-length encoding are examples of data. compression 26. A is an encoding scheme that is not public in order to protect data. cipher 27. A is often used to generate an encryption key because it is easier to remember. password 28. If the key is enough, private-key encryption can be quite secure. long 29. Messages cannot be using a public key. decrypted 30. Because it is -intensive, public-key encryption can be slow.
7 computation SHORT ANSWER 1. How many different characters could be encoded using a six-bit code? What is the numerical difference between ASCII 'a' and ASCII 'A' if you treat them as hexadecimal (hex) numbers? 20 hex (32 decimal) 3. The ASCII codes for the characters '0' through '9' are what hex numbers? 30H to 39H 4. If an asynchronous frame is used to send ASCII characters in the form of bytes (8 bits), what is the shortest time it could take to send 1000 characters if each bit in a frame is 1 msec long? 10 seconds 5. Suppose an asynchronous frame holds 8 bits of data, a parity bit, and two stop bits (it could happen). Calculate the efficiency of the communication system. 66.7% 6. Suppose a synchronous frame has 16 bits of non-data in the front and a 16-bit BCC at the end. The frame carries 1024 bytes of actual data. Calculate the efficiency of the communication system. 97.0%
Lecture / The Data Link Layer: Framing and Error Detection
Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start
More information1.1. INTRODUCTION 1.2. NUMBER SYSTEMS
Chapter 1. 1.1. INTRODUCTION Digital computers have brought about the information age that we live in today. Computers are important tools because they can locate and process enormous amounts of information
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control
More informationAdvantages and disadvantages
Advantages and disadvantages Advantages Disadvantages Asynchronous transmission Simple, doesn't require synchronization of both communication sides Cheap, timing is not as critical as for synchronous transmission,
More informationDigital Fundamentals
Digital Fundamentals Tenth Edition Floyd Chapter 2 2009 Pearson Education, Upper 2008 Pearson Saddle River, Education NJ 07458. All Rights Reserved Decimal Numbers The position of each digit in a weighted
More informationDATA LINK LAYER UNIT 7.
DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission
More informationDigital Fundamentals
Digital Fundamentals Tenth Edition Floyd Chapter 2 2009 Pearson Education, Upper 2008 Pearson Saddle River, Education NJ 07458. All Rights Reserved Quiz 2 Agenda Lecture: Chapter 2 (2-7 through 2-11):
More informationDirect Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3)
Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3) ECPE/CS 5516: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams (CS) Virginia Tech courses.cs.vt.edu/~cs5516
More informationFraming and Stuffing. Advanced Computer Networks
Framing and Stuffing Advanced Computer Networks Framing & Stuffing Outline Synchronous vs Asynchronous Transmissions Asynchronous Character Transmissions Framing Identifying Synchronous Block Boundaries
More informationPacket/Frame, Error Detection How to send data efficiently & reliably?
Packet/Frame, Error Detection How to send data efficiently & reliably? Packet and Packet Communication - Shared Network Resource, Fairness, Reliability Frame - Byte Oriented Frame and Bit Oriented Frame
More informationFig.12.5 Serial Data Line during Serial Communication
Lecture-66 Asynchronous Serial Data Communication A serial data signal is divided into time intervals called bit times as shown in fig.2.5. During each bit time interval (T B ), the signal is either a
More informationChapter 3: Number Systems and Codes. Textbook: Petruzella, Frank D., Programmable Logic Controllers. McGraw Hill Companies Inc.
Chapter 3: Number Systems and Codes Textbook: Petruzella, Frank D., Programmable Logic Controllers. McGraw Hill Companies Inc., 5 th edition Decimal System The radix or base of a number system determines
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationInput-Output Organization
Ted Borys - CSI 404 5/1/2004 Page 11-1 Section 11 Input-Output Organization ASCII Character Set 94 printable characters Upper & lowercase letters 10 numerals Special characters such as $, @, #, % 34 control
More informationThe data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.
Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationSerial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey
4: Serial I/O CET360 Microprocessor Engineering J. Sumey Introduction serial, i.e. bit-at-a-time, interfacing techniques are useful when parallel interfacing limitations become problematic distance limitations
More informationConfiguration of Synchronous Protocols
encor! enetworks TM Version A, September 2010 2013 Encore Networks, Inc. All rights reserved. Configuration of Synchronous Protocols This chapter discusses synchronous protocols that you can configure
More informationSRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of
More informationIntroduction to Computer Networks. 03 Data Link Layer Introduction
Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple
More informationChapter 6 Digital Data Communications Techniques
Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit
More informationPositional Number System
Positional Number System A number is represented by a string of digits where each digit position has an associated weight. The weight is based on the radix of the number system. Some common radices: Decimal.
More informationFundamentals of Programming (C)
Borrowed from lecturer notes by Omid Jafarinezhad Fundamentals of Programming (C) Group 8 Lecturer: Vahid Khodabakhshi Lecture Number Systems Department of Computer Engineering Outline Numeral Systems
More informationLecture 5: Data Link Layer Basics
Lecture 5: Data Link Layer Basics Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Layer 2 PDU: Frame 2 1 Bit-oriented vs. Byte-oriented Layer 2 protocols
More informationChapter 4: Computer Codes. In this chapter you will learn about:
Ref. Page Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence Ref. Page
More informationCSE 123: Computer Networks
Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:
More informationData Link Protocols DATA LINK PROTOCOLS. Asynchronous Protocols. Types of Data Link Protocols XMODEM. Asynchronous Protocols.
Data Link Protocols DATA LINK PROTOCOLS Data Link Protocols are sets of rule and regulations used to implement data link layer. They contain rules for: Line Discipline Gursharan Singh Tatla mailme@gursharansingh.in
More informationUniversal Asynchronous Receiver Transmitter Communication
Universal Asynchronous Receiver Transmitter Communication 13 October 2011 Synchronous Serial Standard SPI I 2 C Asynchronous Serial Standard UART Asynchronous Resynchronization Asynchronous Data Transmission
More informationUNIT 7A Data Representation: Numbers and Text. Digital Data
UNIT 7A Data Representation: Numbers and Text 1 Digital Data 10010101011110101010110101001110 What does this binary sequence represent? It could be: an integer a floating point number text encoded with
More informationplc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. 3. NUMBERS AND DATA Topics: Number bases; binary, octal,, hexa Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
More informationET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code
More informationTransmission SIGNALs
Chapter 6 Digital Communications Basics 6.1 Introduction 6.2 Transmission media 6.3 Source of signal impairment 6.4 Asynchronous Transmission 6.5 Synchronous Transmission 6.6 Error Detection Methods 6.7
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet
More informationData Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1
Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation
More informationData Representation and Binary Arithmetic. Lecture 2
Data Representation and Binary Arithmetic Lecture 2 Computer Data Data is stored as binary; 0 s and 1 s Because two-state ( 0 & 1 ) logic elements can be manufactured easily Bit: binary digit (smallest
More informationOverview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer
Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer
More informationChapter 2 Number Systems and Codes Dr. Xu
Chapter 2 Number Systems and Codes Dr. Xu Chapter 2 Objectives Selected areas covered in this chapter: Converting between number systems. Decimal, binary, hexadecimal. Advantages of the hexadecimal number
More informationI/O Organization John D. Carpinelli, All Rights Reserved 1
I/O Organization 1997 John D. Carpinelli, All Rights Reserved 1 Outline I/O interfacing Asynchronous data transfer Interrupt driven I/O DMA transfers I/O processors Serial communications 1997 John D. Carpinelli,
More informationA GUIDE TO RS-232 COMMUNICATION WITH FX PLCS
A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS Page 1 of 35 A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS This document has been written specifically for FX and FX0N users that are unfamiliar with RS-232
More informationPART III. Data Link Layer MGH T MGH C I 204
PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control
More informationDec Hex Bin ORG ; ZERO. Introduction To Computing
Dec Hex Bin 0 0 00000000 ORG ; ZERO Introduction To Computing OBJECTIVES this chapter enables the student to: Convert any number from base 2, base 10, or base 16 to any of the other two bases. Add and
More informationPPP. Point-to-Point Protocol
PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,
More informationCS 4453 Computer Networks Winter
CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session
More informationData Link Layer. Overview. Links. Shivkumar Kalyanaraman
Data Link Layer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU) Overview The data link layer problem Error detection and correction
More informationFault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes
Fault Tolerance & Reliability CDA 5140 Chapter 2 Additional Interesting Codes m-out-of-n codes - each binary code word has m ones in a length n non-systematic codeword - used for unidirectional errors
More informationumber Systems bit nibble byte word binary decimal
umber Systems Inside today s computers, data is represented as 1 s and 0 s. These 1 s and 0 s might be stored magnetically on a disk, or as a state in a transistor. To perform useful operations on these
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More informationUNIT I FUNDAMENTALS & LINK LAYER
Building a network: UNIT I FUNDAMENTALS & LINK LAYER A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing
More informationDirect Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion
Areas for Discussion Direct Link s Joseph Spring School of Computer Science 3COM0271 Computer Protocols & Architecture s Based on Chapter 2, Peterson & Davie, Computer s: A Systems Approach, 4 th Ed Problems
More informationRECOMMENDATION ITU-R BS.776 * Format for user data channel of the digital audio interface **
Rec. ITU-R BS.776 1 RECOMMENDATION ITU-R BS.776 * Format for user data channel of the digital audio interface ** The ITU Radiocommunication Assembly considering (1992) a) that there is a real need for
More informationData Link Control Protocols
Data Link Control Protocols need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error control addressing control and data link management Flow Control
More informationHP 48 I/O Technical Interfacing Guide
HP 48 I/O Technical Interfacing Guide HP 48 I/0 Technical Interfacing Guide CONTENTS INTRODUCTION... 3 WIRED SERIAL I/O HARDWARE... 3 CABLE WIRING... 3 SERIAL FORMAT... 5 Example: an 'H' (48 hex)... 5
More informationThe Gray Code. Script
Course: B.Sc. Applied Physical Science (Computer Science) Year & Sem.: IInd Year, Sem - IIIrd Subject: Computer Science Paper No.: IX Paper Title: Computer System Architecture Lecture No.: 9 Lecture Title:
More informationReview of Number Systems
Review of Number Systems The study of number systems is important from the viewpoint of understanding how data are represented before they can be processed by any digital system including a digital computer.
More informationBINARY SYSTEM. Binary system is used in digital systems because it is:
CHAPTER 2 CHAPTER CONTENTS 2.1 Binary System 2.2 Binary Arithmetic Operation 2.3 Signed & Unsigned Numbers 2.4 Arithmetic Operations of Signed Numbers 2.5 Hexadecimal Number System 2.6 Octal Number System
More informationRepresenting Characters, Strings and Text
Çetin Kaya Koç http://koclab.cs.ucsb.edu/teaching/cs192 koc@cs.ucsb.edu Çetin Kaya Koç http://koclab.cs.ucsb.edu Fall 2016 1 / 19 Representing and Processing Text Representation of text predates the use
More informationDigital codes. Resources and methods for learning about these subjects (list a few here, in preparation for your research):
Digital codes This worksheet and all related files are licensed under the Creative Commons Attribution License, version 1.0. To view a copy of this license, visit http://creativecommons.org/licenses/by/1.0/,
More informationData link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection
2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow
More information3COM0271 Computer Network Protocols & Architectures A
3COM0271 Computer Network Protocols & Architectures A Week 4: Bit Stuffing and Un-stuffing Practical You should be familiar with the idea of framing from Chapter 2 of Peterson and Davie and also from the
More information15110 Principles of Computing, Carnegie Mellon University - CORTINA. Digital Data
UNIT 7A Data Representa1on: Numbers and Text 1 Digital Data 10010101011110101010110101001110 What does this binary sequence represent? It could be: an integer a floa1ng point number text encoded with ASCII
More information(Refer Slide Time: 2:20)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-15 Error Detection and Correction Hello viewers welcome to today s lecture
More informationCompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4
CompSci 356: Computer Network Architectures Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4 Xiaowei Yang xwy@cs.duke.edu Overview Review: link/network performance metrics
More informationUNIT-II 1. Discuss the issues in the data link layer. Answer:
UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing
More informationDIGITAL SYSTEM DESIGN
DIGITAL SYSTEM DESIGN UNIT I: Introduction to Number Systems and Boolean Algebra Digital and Analog Basic Concepts, Some history of Digital Systems-Introduction to number systems, Binary numbers, Number
More informationComparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:
Comparison of ISO-OSI and TCP/IP Suit Functions of Data Link Layer: 1. Frame generation ( Character Count, Character Stuffing, Bit Stuffing) 2. Error Processing (Parity(EVEN or ODD), Block Parity, Hamming
More informationBinary. Hexadecimal BINARY CODED DECIMAL
Logical operators Common arithmetic operators, like plus, minus, multiply and divide, works in any number base but the binary number system provides some further operators, called logical operators. Meaning
More informationData Link Layer. Indian Institute of Technology Madras
Data Link Layer Study of algorithms for achieving reliable, efficient communication between two adjacent machines at DLL. adjacent - two machines physically connected using a communication channel that
More information)454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU
INTERNATIONAL TELECOMMUNICATION UNION )454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+ #/$%).$%0%.$%.4 %22/2#/.42/, 3934%- )454 Recommendation 6 (Extract
More informationModbus Remote Communication Protocol for REM 54_. Technical Description
Modbus Remote Communication Protocol for REM 54_ 1MRS 750781-MUM Issued: 08.03.2002 Version: A/18.06.2002 Checked: ML Approved: AF Remote Communication Protocol for REM 54_ Modbus We reserve the right
More informationDirect Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems
Areas for Discussion Direct Link s Joseph Spring School of Computer Science 3COM0088 Computer Protocols & Architecture s Based on Chapter 2, Peterson & Davie, Computer s: A Systems Approach, 3 rd Ed Problems
More information2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme
2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme repeated (integer) division by two. Example: What is
More informationPayLink-IP/232 Configuration Guide 2005 Lava Computer MFG Inc.
PayLink-IP/232 Configuration Guide 2005 Lava Computer MFG Inc. www.lavalink.com Rev. A07 PayLink-IP/232 Configuration Guide This document describes the configuration features of the PayLink-IP/232. It
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More informationDigital Logic. The Binary System is a way of writing numbers using only the digits 0 and 1. This is the method used by the (digital) computer.
Digital Logic 1 Data Representations 1.1 The Binary System The Binary System is a way of writing numbers using only the digits 0 and 1. This is the method used by the (digital) computer. The system we
More informationSpecification. Current Consumption Range 8m * Rotational Angle +/- 50 degrees * Shear Angle +/- 40 degrees *
HX11TR Ultrasonic Positioning Device The HX11TR can be set up to operate as a ultrasonic signal receiver, ultrasonic transmitter, ultrasonic caller and ultrasonic transponder. It is small size and economical.
More informationPretty Good Privacy (PGP
PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. Pretty Good Privacy (PGP
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationNumber System (Different Ways To Say How Many) Fall 2016
Number System (Different Ways To Say How Many) Fall 2016 Introduction to Information and Communication Technologies CSD 102 Email: mehwish.fatima@ciitlahore.edu.pk Website: https://sites.google.com/a/ciitlahore.edu.pk/ict/
More information(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.
Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL
More informationWhere we are in the Course
Link Layer Where we are in the Course Moving on up to the Link Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Scope of the Link Layer Concerns how to transfer messages
More informationCOMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?
Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability
More informationCHAPTER 4 DATA COMMUNICATION MODES
USER S MANUAL CHAPTER DATA COMMUNICATION MODES. INTRODUCTION The SCC provides two independent, full-duplex channels programmable for use in any common asynchronous or synchronous data communication protocol.
More informationChapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify
More informationCHAPTER 2 Data Representation in Computer Systems
CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting
More informationCHAPTER 2 Data Representation in Computer Systems
CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting
More informationDATA LINK LAYER: NEED
Page no: 1 Department of Computer Science and Engineering CS6004 Computer Networking Subject Notes: UNIT-II DATA LINK LAYER: NEED Data Link Layer is second layer of OSI Layered Model. This layer is one
More informationCode No: RR Set No. 1
Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,
More informationData Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.
Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1 LOGICAL L LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL MEDIA ATTACHMENT
More information3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.
Code No: RR320503 Set No. 1 III B.Tech II Semester Supplimentary Examinations, Aug/Sep 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,
More informationLaboratory Finite State Machines and Serial Communication
Laboratory 11 11. Finite State Machines and Serial Communication 11.1. Objectives Study, design, implement and test Finite State Machines Serial Communication Familiarize the students with Xilinx ISE WebPack
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationUTF and Turkish. İstinye University. Representing Text
Representing Text Representation of text predates the use of computers for text Text representation was needed for communication equipment One particular commonly used communication equipment was teleprinter
More informationEITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst
EITF25 Internet Techniques and Applications L3: Data Link layer Stefan Höst Communication on physical layer To transmit on the physical medium use signals At each computer it can be seen as transmitting
More informationParallel and Serial Bus Analysis Instructor s Guide
A collection of lab exercises to explore analysis of parallel and serial buses with a digital oscilloscope. Revision 1.0 Page 1 of 21 Copyright Notice and Reproduction Rights 2009 Tektronix, Inc. This
More informationT325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:
T305 T325 B BLOCK 4 T325 Summary Prepared by: Session 3 [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Dr. Saatchi, Seyed Mohsen T325 Error Control Coding
More informationUNIT I FUNDAMENTALS & LINK LAYER
UNIT I FUNDAMENTALS & LINK LAYER Building a network Requirements - Layering and protocols - Internet Architecture Network software Performance ; Link layer Services - Framing - Error Detection Flow control.
More informationDATA COMMUNICATION. Part TWO Data Transmission
DATA COMMUNICATION Part TWO Data Transmission This Chapter intends to create basic concepts of Data communication. We will be covering some basic definitions and details Q: What are the basics Communication
More informationCC411: Introduction To Microprocessors
CC411: Introduction To Microprocessors OBJECTIVES this chapter enables the student to: Use number { base 2, base 10, or base 16 }. Add and subtract binary/hex numbers. Represent any binary number in 2
More informationRepresenting Characters and Text
Representing Characters and Text cs4: Computer Science Bootcamp Çetin Kaya Koç cetinkoc@ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2018 1 / 28 Representing Text Representation of text predates the
More information