Networks Summary and Q&A
Networks Summary and Q&A
Summary
• Data communications are the transfer of data from one device to another via some form of transmission
medium.
• A data communications system must transmit data to the correct destination in an accurate and timely
manner.
• The five components that make up a data communications system are the message, sender, receiver,
medium, and protocol.
• Text, numbers, images, audio, and video are different forms of information.
• Data flow between two devices can occur in one of three ways: simplex, half-duplex, or full-duplex.
• A network is a set of communication devices connected by media links.
• In a point-to-point connection, two and only two devices are connected by a dedicated link. In a multipoint
connection, three or more devices share a link.
• Topology refers to the physical or logical arrangement of a network. Devices may be arranged in a mesh,
star, bus, or ring topology.
• A network can be categorized as a local area network or a wide area network.
• A LAN is a data communication system within a building, plant, or campus, or between nearby buildings.
• A WAN is a data communication system spanning states, countries, or the whole world.
• An internet is a network of networks.
• The Internet is a collection of many separate networks.
• There are local, regional, national, and international Internet service providers.
• A protocol is a set of rules that govern data communication; the key elements of a protocol are syntax,
semantics, and timing.
• Standards are necessary to ensure that products from different manufacturers can work together as
expected.
• The ISO, ITD-T, ANSI, IEEE, and EIA are some of the organizations involved in standards creation.
• Forums are special-interest groups that quickly evaluate and standardize new technologies.
• A Request for Comment is an idea or concept that is a precursor to an Internet standard.
M.E.N
1) Identify the five components of a data communications system.
The five components of a data communication system are the sender, receiver, transmission medium,
message, and protocol.
The advantages of distributed processing are security, access to distributed databases, collaborative
processing, and faster problem solving.
3) What are the three criteria necessary for an effective and efficient network?
The three criteria are performance, reliability, and security.
4) What are the advantages of a multipoint connection over a point-to-point connection?
a) Point-to-point:
• Mesh
• Star
• Ring
b) Multipoint
• Bus
7) What is the difference between half-duplex and full-duplex transmission modes?
In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities
can send at the same time.
8) Name the four basic network topologies and cite an advantage of each type.
• Mesh: secure
• Bus: easy installation
• Star: robust
• Ring: easy fault isolation
M.E.N
9) For n devices in a network, what is the number of cable links required for a mesh, ring, bus, and star
topology?
• Mesh: n (n – 1) / 2
• Star: n
• Ring: n – 1
• Bus: one backbone and n drop lines
10) What are some of the factors that determine whether a communication system is a LAN or WAN?
The general factors are size, distances (covered by the network), structure, and ownership.
A protocol defines what is communicated, in what way and when. This provides accurate and timely
transfer of information between different devices on a network.
Standards are needed to create and maintain an open and competitive market for manufacturers, to
coordinate protocol rules, and thus guarantee compatibility of data communication technologies.
14) What is the maximum number of characters or symbols that can be represented by Unicode?
Unicode uses 32 bits to represent a symbol or a character. We can define 232 different symbols or
characters.
15) A color image uses 16 bits to represent a pixel. What is the maximum number of different colors that
can be represented?
With 16 bits, we can represent up to 216 different colors.
16) Assume six devices are arranged in a mesh topology. How many cables are needed? How many ports
are needed for each device?
a. Cable links: n (n – 1) / 2 = (6 × 5) / 2 = 15
b. Number of ports: (n – 1) = 5 ports needed per device.
M.E.N
17) For each of the following four networks, discuss the consequences if a connection fails.
a. Five devices arranged in a mesh topology
Mesh topology: If one connection fails, the other connections will still be working.
Star topology: The other devices will still be able to send data through the hub; there will be no
access to the device which has the failed connection to the hub.
c. Five devices arranged in a bus topology
Bus Topology: All transmission stops if the failure is in the bus. If the drop-line fails, only the
corresponding device cannot operate.
d. Five devices arranged in a ring topology
Ring Topology: The failed connection may disable the whole network unless it is a dual ring or there
is a by-pass mechanism.
18) You have two computers connected by an Ethernet hub at home. Is this a LAN, a MAN, or a WAN?
Explain your reason.
19) In the ring topology in Figure 1.8, what happens if one of the stations is unplugged?
Theoretically, in a ring topology, unplugging one station, interrupts the ring. However, most ring
networks use a mechanism that bypasses the station; the ring can continue its operation.
20) In the bus topology in Figure 1.7, what happens if one of the stations is unplugged?
In a bus topology, no station is in the path of the signal. Unplugging a station has no effect on the operation
of the rest of the network.
21) Draw a hybrid topology with a star backbone and three ring networks.
M.E.N
22) Draw a hybrid topology with a ring backbone and two bus networks.
23) Performance is inversely related to delay. When you use the Internet, which of the following
applications are more sensitive to delay?
a. Sending an e-mail:
E-mail is not an interactive application. Even if it is delivered immediately, it may stay in the
mailbox of the receiver for a while. It is not sensitive to delay.
b. Copying a file:
We normally do not expect a file to be copied immediately. It is not very sensitive to delay.
c. Surfing the Internet:
Surfing the Internet is very sensitive to delay. We except to get access to the site we are
searching.
24) When a party makes a local telephone call to another party, is this a point-to-point or multipoint
connection? Explain your answer.
In this case, the communication is only between a caller and the callee. A dedicated line is established
between them. The connection is point-to-point.
25) Compare the telephone network and the Internet. What are the similarities? What are the
differences?
The telephone network was originally designed for voice communication; the Internet was originally
designed for data communication. The two networks are similar in the fact that both are made of
interconnections of small networks. The telephone network, as we will see in future chapters, is mostly a
circuit-switched network; the Internet is mostly a packet-switched network.
M.E.N
Chapter 2
SUMMARY
• The International Standards Organization created a model called the Open Systems Interconnection,
which allows diverse systems to communicate.
• The seven-layer OSI model provides guidelines for the development of universally compatible networking
protocols.
• The physical, data link, and network layers are the network support layers.
• The session, presentation, and application layers are the user support layers.
• The transport layer links the network support layers and the user support layers.
• The physical layer coordinates the functions required to transmit a bit stream over a physical medium.
• The data link layer is responsible for delivering data units from one station to the next without errors.
• The network layer is responsible for the source-to-destination delivery of a packet across multiple network
links.
• The transport layer is responsible for the process-to-process delivery of the entire message.
• The session layer establishes, maintains, and synchronizes the interactions between communicating
devices.
• The presentation layer ensures interoperability between communicating devices through transformation
of data into a mutually agreed upon format.
• The application layer enables the users to access the network.
• TCP/IP is a five-layer hierarchical protocol suite developed before the OSI model. U The TCP/IP application
layer is equivalent to the combined session, presentation, and application layers of the OSI model.
• Four levels of addresses are used in an internet following the TCP/IP protocols: physical (link) addresses,
logical (IP) addresses, port addresses, and specific addresses.
• The physical address, also known as the link address, is the address of a node as defined by its LAN or
WAN.
• The IP address uniquely defines a host on the Internet.
• The port address identifies a process on a host.
• A specific address is a user-friendly address.
M.E.N
1. List the layers of the Internet model.
The Internet model, as discussed in this chapter, include physical, data link, network, transport, and
application layers.
2. Which layers in the Internet model are the network support layers?
The network support layers are the physical, data link, and network layers.
4. What is the difference between network layer delivery and transport layer delivery?
The transport layer is responsible for process-to-process delivery of the entire message, whereas the network
layer oversees host-to-host delivery of individual packets.
Peer-to-peer processes are processes on two or more devices communicating at a same layer
6. How does information get passed from one layer to the next in the Internet model?
Each layer calls upon the services of the layer just below it using interfaces between each pair of adjacent
layers.
7. What are headers and trailers, and how do they get added and removed?
Headers and trailers are control data added at the beginning and the end of each data unit at each layer of
the sender and removed at the corresponding layers of the receiver. They provide source and destination
addresses, synchronization points, information for error detection, etc.
8. What are the concerns of the physical layer in the Internet model?
The physical layer is responsible for transmitting a bit stream over a physical medium. It’s concerned with
M.E.N
9. What are the responsibilities of the data link layer in the Internet model?
10. What are the responsibilities of the network layer in the Internet model?
The network layer is concerned with delivery of a packet across multiple networks; therefore, its
responsibilities include:
b. routing
11. What are the responsibilities of the transport layer in the Internet model?
The transport layer oversees the process-to-process delivery of the entire message. It is responsible for:
12. What is the difference between a port address, a logical address, and a physical address?
The physical address is the local address of a node; it is used by the data link layer to deliver data from
one node to another within the same network. The logical address defines the sender and receiver at the network
layer and is used to deliver messages across multiple networks. The port address (service-point) identifies the
application process on the station.
13. Name some services provided by the application layer in the Internet model.
The application layer services include file transfer, remote access, shared database management, and
mail services.
14. How do the layers of the Internet model correlate to the layers of the OSI model?
The application, presentation, and session layers of the OSI model are represented by the application
layer in the Internet model. The lowest four layers of OSI correspond to the Internet model layers.
M.E.N
15. How are OSI and ISO related to each other?
16. Match the following to one or more layers of the OSI model:
17. Match the following to one or more layers of the OSI model:
d. Provides user services such as e-mail and file transfer: application layer
18. Match the following to one or more layers of the OSl model:
d. Responsibility for carrying frames between adjacent nodes: data link layer
19. Match the following to one or more layers of the OSI model:
M.E.N
20. In Figure 2.22, computer A sends a message to computer D via LAN l, router R l, and LAN2. Show the contents
of the packets and frames at the network and data link layer for each hop interface.
21. In Figure 2.22, assume that the communication is between a process running at computer A with port
address i and a process running at computer D with port address j. Show the contents of packets and frames at
the network, data link, and transport layer for each hop.
22. Suppose a computer sends a frame to another computer on a bus topology LAN. The physical destination
address of the frame is corrupted during the transmission. What happens to the frame? How can the sender be
informed about the situation?
If the corrupted destination address does not match any station address in the network, the packet is lost.
If the corrupted destination address matches one of the stations, the frame is delivered to the wrong station. In
this case, however, the error detection mechanism, available in most data link protocols, will find the error and
discard the frame.
M.E.N
23. Suppose a computer sends a packet at the network layer to another computer somewhere in the Internet.
The logical destination address of the packet is corrupted. What happens to the packet? How can the source
computer be informed of the situation?
Before using the destination address in an intermediate or the destination node, the packet goes through
error checking that may help the node find the corruption (with a high probability) and discard the packet.
Normally the upper layer protocol will inform the source to resend the packet.
24. Suppose a computer sends a packet at the transport layer to another computer somewhere in the Internet.
There is no process with the destination port address running at the destination computer. What will happen?
Most protocols issue a special error message that is sent back to the source in this case.
25. If the data link layer can detect errors between hops, why do you think we need another checking
mechanism at the transport layer?
The errors between the nodes can be detected by the data link layer control, but the error at the node
(between input port and output port) of the node cannot be detected by the data link layer.
M.E.N
Chapter 7
7.5 SUMMARY
• Transmission media lie below the physical layer.
• A guided medium provides a physical conduit from one device to another. Twisted pair
cable, coaxial cable, and optical fiber are the most popular types of guided media.
• Twisted-pair cable consists of two insulated copper wires twisted together. Twisted pair
cable is used for voice and data communications.
• Coaxial cable consists of a central conductor and a shield. Coaxial cable can carry signals
of higher frequency ranges than twisted-pair cable. Coaxial cable is used in cable TV
networks and traditional Ethernet LANs.
• Fiber-optic cables are composed of a glass or plastic inner core surrounded by cladding,
all encased in an outside jacket. Fiber-optic cables carry data signals in the form of light.
The signal is propagated along the inner core by reflection. Fiberoptic transmission is
becoming increasingly popular due to its noise resistance, low attenuation, and high-
bandwidth capabilities. Fiber-optic cable is used in backbone networks, cable TV
networks, and Fast Ethernet networks.
• Unguided media (free space) transport electromagnetic waves without the use of a
physical conductor.
• Wireless data are transmitted through ground propagation, sky propagation, and line of
sight propagation. Wireless waves can be classified as radio waves, microwaves, or
infrared waves. Radio waves are omnidirectional; microwaves are unidirectional.
Microwaves are used for cellular phone, satellite, and wireless LAN communications.
• Infrared waves are used for short-range communications such as those between a PC and
a peripheral device. It can also be used for indoor LANs.
• (UTP) = unshielded twisted-pair AND (STP) = shielded twisted-pair
M.E.N
1. What is the position of the transmission media in the OSI or the Internet model?
The transmission media is located beneath the physical layer and controlled by the physical layer.
2. Name the two major categories of transmission media.
The two major categories are guided and unguided media.
3. How do guided media differ from unguided media?
Guided media have physical boundaries, while unguided media are unbounded.
M.E.N
Chapter 8
SUMMARY
• A switched network consists of a series of interlinked nodes, called switches. Traditionally' three
methods of switching have been important: circuit switching, packet switching, and message switching.
• We can divide today's networks into three broad categories: circuit-switched networks, packet-
switched networks, and message-switched. Packet-switched networks can also be divided into two
subcategories: virtual-circuit networks and datagram networks.
• A circuit-switched network is made of a set of switches connected by physical links, in which each link
is divided into n channels. Circuit switching takes place at the physical layer. In circuit switching, the
resources need to be reserved during the setup phase; the resources remain dedicated for the entire
duration of data transfer phase until the teardown phase.
• In packet switching, there is no resource allocation for a packet. This means that there is no reserved
bandwidth on the links, and there is no scheduled processing time for each packet. Resources are
allocated on demand.
• In a datagram network, each packet is treated independently of all others. Packets in this approach are
referred to as datagrams. There are no setup or teardown phases.
• A virtual-circuit network is a cross between a circuit-switched network and a datagram network. It has
some characteristics of both.
• Circuit switching uses either of two technologies: the space-division switch or the time-division switch.
• A switch in a packet-switched network has a different structure from a switch used in a circuit-switched
network. We can say that a packet switch has four types of components: input ports, output ports, a
routing processor, and switching fabric.
M.E.N
1. Describe the need for switching and define a switch.
Switching provides a practical solution to the problem of connecting multiple devices in a
network. It is more practical than using a bus topology; it is more efficient than using a star topology
and a central hub. Switches are devices capable of creating temporary connections between two or
more devices linked to the switch.
2. List the three traditional switching methods. What are the most common today?
1) circuit switching
2) packet switching
3) message switching.
6. What is the role of the address field in a packet traveling through a virtual circuit network?
The address field defines the virtual circuit number (local) addressing.
M.E.N
from time slots in the order received. Slots are then sent out in an order based on the decisions of a
control unit.
9. Define blocking in a switched network.
In multistage switching, blocking refers to times when one input cannot be connected to an
output because there is no path available between them—all the possible intermediate switches are
occupied. One solution to blocking is to increase the number of intermediate switches based on the Clos
criteria.
10. List four major components of a packet switch and their functions.
1) Input ports: performs the physical and data link functions of the packet switch.
2) Output ports: performs the same functions as the input port, but in the reverse order.
3) The routing processor: performs the function of table lookup in the network layer.:
4) The switching fabric: responsible for moving the packet from the input queue to the output
queue.
13. Transmission of information in any network involves end-to-end addressing and sometimes local
addressing (such as YCI). Table 8.2 shows the types of networks and the addressing mechanism used in each
of them.
Datagram End-ta-end
a. Why does a circuit-switched network need end-to-end addressing during the setup and teardown
phases? Why are no addresses needed during the data transfer phase for this type of network?
In a circuit-switched network, end-to-end addressing is needed during the setup and teardown phase
to create a connection for the whole data transfer phase. After the connection is made, the data flow
travels through the already-reserved resources. The switches remain connected for the entire
duration of the data transfer; there is no need for further addressing.
M.E.N
b. Why does a datagram network need only end-to-end addressing during the data transfer phase, but
no addressing during the setup and teardown phases?
In a datagram network, each packet is independent. The routing of a packet is done for each
individual packet. Each packet, therefore, needs to carry an end-to-end address. There is no setup and
teardown phases in a datagram network (connectionless transmission). The entries in the routing
table are somehow permanent and made by other processes such as routing protocols.
c. Why does a virtual-circuit network need addresses during all three phases?
In a virtual-circuit network, there is a need for end-to-end addressing during the setup and teardown
phases to make the corresponding entry in the switching table. The entry is made for each request
for connection. During the data transfer phase, each packet needs to carry a virtual-circuit identifier
to show which virtual-circuit that particular packet follows.
14. We mentioned that two types of networks, datagram and virtual-circuit, need a routing or switching table
to find the output port from which the information belonging to a destination should be sent out, but a circuit-
switched network has no need for such a table. Give the reason for this difference.
A datagram or virtual-circuit network handles packetized data. For each packet, the switch needs to
consult its table to find the output port in the case of a datagram network, and to find the combination
of the output port and the virtual circuit identifier in the case of a virtual-circuit network. In a circuit-
switched network, data are not packetized; no routing information is carried with the data. The whole
path is established during the setup phase.
15. A datagram or virtual-circuit network handles packetized data. For each packet, the switch needs to
consult its table to find the output port in the case of a datagram network, and to find the combination of the
output port and the virtual circuit identifier in the case of a virtual-circuit network. In a circuit-switched
network, data are not packetized; no routing information is carried with the data. The whole path is
established during the setup phase.
In circuit-switched and virtual-circuit networks, we are dealing with connections. A connection needs to
be made before the data transfer can take place. In the case of a circuit-switched network, a physical
connection is established during the setup phase and the is broken during the teardown phase. In the
case of a virtual-circuit network, a virtual connection is made during setup and is broken during the
teardown phase; the connection is virtual, because it is an entry in the table. These two types of networks
are considered connection oriented. In the case of a datagram network no connection is made. Any time
M.E.N
a switch in this type of network receives a packet, it consults its table for routing information. This type
of network is considered a connectionless network.
16. The minimum number of columns in a datagram network is two; the minimum number of columns in a
virtual-circuit network is four. Can you explain the reason? Is the difference related to the type of addresses
carried in the packets of each network?
The switching or routing in a datagram network is based on the final destination address, which is
global. The minimum number of entries is two; one for the final destination and one for the output port.
Here the input port, from which the packet has arrived is irrelevant. The switching or routing in a
virtual-circuit network is based on the virtual circuit identifier, which has a local jurisdiction. This means
that two different input or output ports may use the same virtual circuit number. Therefore, four pieces
of information are required: input port, input virtual circuit number, output port, and output virtual
circuit number.
17. Figure 8.27 shows a switch (router) in a datagram network. Find the output port for packets with the
following destination addresses:
Packet 1: 7176
Packet 2: 1233
Packet 3: 8766
Packet 4: 9144
Ans:
Packet 1: 2
Packet 2: 3
Packet 3: 3
Packet 4: 2
M.E.N
18. Figure 8.28 shows a switch in a virtual circuit network. Find the output port and the output VCI for packets
with the following input port and input VCI addresses:
Packet 1: 3, 78
Packet 2: 2, 92
Packet 3: 4, 56
Packet 4: 2, 71
Ans:
Packet 1: 2, 70
Packet 2: 1, 45
Packet 3: 3, 11
Packet 4: 4, 41
a. Can a routing table in a datagram network have two entries with the same destination address? Explain.
In a datagram network, the destination addresses are unique. They cannot be duplicated in the routing
table.
b. Can a switching table in a virtual-circuit network have two entries with the same input port number? With
the same output port number? With the same incoming VCls? With the same outgoing VCls? With the same
incoming values (port, VCI)? With the same outgoing values (port, VCI)?
In a virtual-circuit network, the VCIs are local. A VCI is unique only in relationship to a port. In other
words, the (port, VCI) combination is unique. This means that we can have two entries with the same
input or output ports. We can have two entries with the same VCIs. However, we cannot have two entries
with the same (port, VCI) pair.
20. It is obvious that a router or a switch needs to do searching to find information in the corresponding table.
The searching in a routing table for a datagram network is based on the destination address; the searching in a
switching table in a virtual circuit network is based on the combination of incoming port and incoming VCI.
Explain the reason and define how these tables must be ordered (sorted) based on these values.
When a packet arrives at a router in a datagram network, the only information in the packet that can help
the router in its routing is the destination address of the packet. The table then is sorted to make the
M.E.N
searching faster. Today’s routers use some sophisticated searching techniques. When a packet arrives at
a switch in a virtual-circuit network, the pair (input port, input VCI) can uniquely determine how the packet
is to be routed; the pair is the only two pieces of information in the packet that is used for routing. The
table in the virtual-circuit switch is sorted based on this pair. However, since the number of port numbers
is normally much smaller than the number of virtual circuits assigned to each port, sorting is done in two
steps: first according to the input port number and second according to the input VCI.
M.E.N
Chapter 10
SUMMARY
• Data can be corrupted during transmission. Some applications require that errors be detected and corrected.
• In a single-bit error, only one bit in the data unit has changed. A burst error means that two or more bits in the
data unit have changed.
• To detect or correct errors, we need to send extra (redundant) bits with data.
• There are two main methods of error correction: forward error correction and correction by retransmission.
• We can divide coding schemes into two broad categories: block coding and convolution coding.
• In coding, we need to use modulo-2 arithmetic. Operations in this arithmetic are very simple; addition and
subtraction give the same results. we use the exclusive OR operation for both addition and subtraction.
• In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits
to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
• In block coding, errors be detected by using the following two conditions:
• The receiver has (or can find) a list of valid codewords.
• The original codeword has changed to an invalid one.
• The Hamming distance between two words is the number of differences between corresponding bits. The
minimum Hamming distance is the smallest Hamming distance between all possible pairs in a set of words.
• To guarantee the detection of up to s errors in all cases, the minimum Hamming distance in a block code must
be dmin = s + 1. To guarantee correction of up to t errors in all cases, the minimum Hamming distance in a block
code must be dmin = 2t + 1.
• In a linear block code, the exclusive OR (XOR) of any two valid codewords creates another valid codeword.
• A simple parity-check code is a single-bit error-detecting code in which n = k + 1 with dmin = 2. A simple parity-
check code can detect an odd number of errors.
• All Hamming codes discussed in this book have dmin = 3. The relationship between m and n in these codes is
n= 2m - 1.
• Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword is cyclically
shifted (rotated), the result is another codeword.
• A category of cyclic codes called the cyclic redundancy check (CRC) is used in networks such as LANs and WANs.
• A pattern of O’s and I’s can be represented as a polynomial with coefficients of 0 and 1.
• Traditionally, the Internet has been using a I6-bit checksum, which uses one's complement arithmetic. In this
arithmetic, we can represent unsigned numbers between o and 2n -1 using only n bits.
M.E.N
Questions
1. How does a single-bit error differ from a burst error?
In a single bit error only one bit of a data unit is corrupted; in a burst error more than one bit is
corrupted (not necessarily contiguous).
At least three types of error cannot be detected by the current checksum calculation. First, if two
data items are swapped during transmission, the sum and the checksum values will not change.
Second, if the value of one data item is increased (intentionally or maliciously) and the value of
another one is decreased (intentionally or maliciously) the same amount, the sum and the checksum
cannot detect these changes. Third, if one or more data items is changed in such a way that the
change is a multiple of 216 − 1, the sum or the checksum cannot detect the changes.
10. Can the value of a checksum be all Os (in binary)? Defend your answer. Can the value be all Is (in binary)?
Defend your answer.
The value of a checksum can be all 0s (in binary). This happens when the value of the sum (after
wrapping) becomes all 1s (in binary). It is almost impossible for the value of a checksum to be all 1s.
For this to happen, the value of the sum (after wrapping) must be all 0s which means all data units
must be 0s.
11. What is the maximum effect of a 2-ms burst of noise on data transmitted at the following rates?
a. 1500 kbps: vulnerable bits = (1,500) × (2 × 10−3) = 3 bits
b. 12 kbps: vulnerable bits = (12 × 103) × (2 × 10−3) = 24 bits
c. 100 kbps: vulnerable bits = (100 × 103) × (2 × 10−3) = 200 bits
d. 100 Mbps: vulnerable bits = (100 × 106) × (2 × 10−3) = 200,000 bits
12. Apply the exclusive-or (XOR) operation on the following pair of patterns:
a) (10001) XOR (10000) = 00001
b) (10001) XOR (10001) = 00000 (What do you infer from the result?)
c) (11100) XOR (00000) = 11100 (What do you infer from the result?)
M.E.N
d) (10011) XOR (11111) = 01100 (What do you infer from the result?)
Comment: The above shows three properties of the exclusive-or operation. First, the result of XORing
two equal patterns is an all-zero pattern (part b). Second, the result of XORing of any pattern with an all-
zero pattern is the original non-zero pattern (part c). Third, the result of XORing of any pattern with an
all-one pattern is the complement of the original non-one pattern.
13. In Table 10.1, the sender sends dataword 10. A 3-bit burst error corrupts the codeword. Can the receiver
detect the error? Defend your answer.
The codeword for dataword 10 is 101. This codeword will be changed to 010 if a 3-bit burst error
occurs. This pattern is not one of the valid codewords, so the receiver detects the error and discards
the received pattern.
14. In Table 10.2, the sender sends dataword 10. If a 3-bit burst error corrupts the first three bits of the codeword,
can the receiver detect the error? Defend your answer.
The codeword for dataword 10 is 10101. This codeword will be changed to 01001 if a 3-bit burst
error occurs. This pattern is not one of the valid codewords, so the receiver discards the received
pattern.
15. What is the Hamming distance for each of the following codewords?
a. d (10000, 00000) = 1
b. d (10101, 10000) = 2
c. d (11111,11111) = 0
d. d (000, 000) = 0
Comment: Part c and d show that the distance between a codeword and itself is 0.
16. Find the minimum Hamming distance for the following cases:
17. Using the code in Table 10.2, what is the dataword if one of the following codewords is received?
a. 01011
01
b. 11111
Error
c. 00000
00
d. 11011
Error
18. Prove that the code represented by Table 10.8 is not a linear code. You need to find only one case that violates
the linearity.
We show that the exclusive-or of the second and the third code-words.
(01011) ⊕ (10111) = 11100, which is not in the code. Therefore, the code is not linear.
19. Although it can mathematically be proved that a simple parity check code is a linear code, use manual testing
of linearity for five pairs of the codewords in Table 10.3 to partially prove this fact.
M.E.N
We show the dataword, the codeword, the corrupted codeword, and the interpretation of the receiver for each case:
a. Dataword: 0100 → Codeword: 0100011 → Corrupted: 0010011 This pattern is not in the table. → Correctly discarded.
b. Dataword: 0111 → Codeword: 0111001 → Corrupted: 1111000 This pattern is not in the table. → Correctly discarded.
c. Dataword: 1111 → Codeword: 1111111 → Corrupted: 0101110 This pattern is in the table. → Erroneously accepted as
0101.
d. Dataword: 0000 → Codeword: 0000000 → Corrupted: 1101000 This pattern is in the table. → Erroneously accepted as
1101.
Comment: The above result does not mean that the code can never detect three errors. The last two cases show that it
may happen that three errors remain undetected.
We show the dataword, codeword, the corrupted codeword, the syndrome, and the interpretation of each case:
a. Dataword: 0100 → Codeword: 0100011 → Corrupted: 1100011 → s2s1s0 = 110 Change b3 (Table 10.5) → Corrected
codeword: 0100011 → dataword: 0100 The dataword is correctly found.
b. Dataword: 0111 → Codeword: 0111001 → Corrupted: 0011001 → s2s1s0 = 011 Change b2 (Table 10.5) → Corrected
codeword: 0111001→ dataword: 0111 The dataword is correctly found.
c. Dataword: 1111 → Codeword: 1111111 → Corrupted: 0111110 → s2s1s0 = 111 Change b1 (Table 10.5) → Corrected
codeword: 0101110→ dataword: 0101 The dataword is found, but it is incorrect. C(7,4) cannot correct two errors.
d. Dataword: 0000 → Codeword: 0000000 → Corrupted: 1100001 → s2s1s0 = 100 Change q2 (Table 10.5) → Corrected
codeword: 1100101→ dataword: 1100 The dataword is found, but it is incorrect. C(7,4) cannot correct three errors.
M.E.N
22) We need a dataword of at least 11 bits. Find the values of k and n in the Hamming code C (n ,k) with dmin =3.
We need to find k = 2m −1 − m ≥ 11. We use trial and error to find the right answer:
d. Let m = 4 k = 2m −1 − m = 24 −1 − 4 = 11 (acceptable)
101110 → x5 + x3 + x2 + x
x3 × (x5 + x3 + x2 + x) = x8 + x6 + x5 + x4
24) Which of the following CRC generators guarantee the detection of a single bit error?
a. x3 + x + 1 → It meets both criteria.
25) Assuming even parity, find the parity bit for each of the following data units.
M.E.N
26) Given the dataword 1010011110 and the divisor 10111,
a. Show the generation of the codeword at the sender site (using binary division).
b. Show the checking of the codeword at the receiver site (assume no error).
M.E.N
27) Repeat Exercise 30 using polynomials.
M.E.N