Department: Computer Science & Engineering
Course Title: Data Communication
Course Code:CSE-3105
Faculty: Shah Reza Fahad Hossain
Student ID: 18304003
Name: MD. Rakibul Islam
Creative Assignmnt
Final Examination: Spring 2020
1.Explain how multiplexing is so cost-effective. How is interference avoided by
using frequency division multiplexing?
Ans:
Multiplexing is very cost effective: It is a popular networking technique that integrates multiple
analog and digital signals into a signal transmitted over a shared medium. Multiplexing helps
cost effectiveness by allowing multiple parties to share the cost of a link. The closer that you can
get the link to pure 100% utilization, the better off you are, from an efficiency perspective. Stat
muxing is especially interesting because it can typically achieve a higher real goodput than other
forms of muxing.. Interference is avoided under frequency division multiplexing by the use of
guard bands, which are unused portions of the frequency spectrum between subchannels.
Inteference avoided by using frequency division multiplexing: Interference is avoided under
frequency division multiplexing by the use of guard bands, which are unused portions of the fre-
quency spectrum between subchannels.
2. List and briefly define some of the requirements for effective communica-
tions over a data link.
Ans:
Requirements for effective communicationsover a data link layer: Because of the possibil-
ity of transmission errors, and because the receiver of data may need to regulate the rate at which
data arrive,synchronization and interfacing techniques are insufficient by themselves. It is neces-
sary to impose a layer of control in each communicating device that provides functions such as
flow control, error detection, and error control.This layer of control is known as a data link con-
trol protocol.
Flow control: It enables a receiver to regulate the flow of data from a sender so that the receier’s
buffers do not overflow.Error Control: In a data link control protocol, error control is achieved
by retransmission of damaged frames that have not been acknowledged or for which the other
side requests a retransmission.
Control Protocol: High-level data link control (HDLC) is a widely used data link control proto-
col. It contains virtually all of the features found in other data link control protocols.
Addressing: On a multipoint line, such as a local area network (LAN), the identity of the two
stations involved in a transmission must be specified
Control and data on same link: The receiver must be able to distinguish control
information from the data being transmitted.
Link management: The initiation, maintenance, and termination of a sustained data exchange
require a fair amount of coordination and cooperation among stations. Procedures for the man-
agement of this exchange are required.
3. Give a brief explanation of each of the congestion control techniques illus-
trated in the following figure.
Ans:
Congestion control techniques: there are five types of congestion control illustrated they are:
a) Policing b) Implicit Signaling c) Explicit Signaling d) Back pressure e) Choke packet
Policing: In policing, A node in the network, typically the node to which the end system attach-
es, monitors the traffic flow and compares it to the traffic contract. Excess traffic is either dis-
carded or marked to indicate that it is liable to discard or delay.
Implicit congestion signaling: In implicit, If a source is able to detect increased delays and
packet discards, then it has implicit evidence of network congestion
.
Explicit congestion signaling: Ifor explicit congestion avoidance, the network alerts end sys-
tems to growing congestion within the network and the end systems take steps to reduce the of-
fered load to the network.
Backpressure: It involves link-by-link use of flow control in a direction toward the source. This
technique produces an effect similar to backpressure in fluids flowing down a pipe.
Choke packet: A choke packet is a control packet generated at a congested node and transmitted
back to a source node to restrict traffic flow.
4. Two neighboring nodes (A and B) use a sliding-window protocol with a 3-bit sequence number. As the ARQ
mechanism, go-back-N is used with a window size of 4. Assuming A is transmitting and B is receiving, show the
window positions for the following succession of events: a. Before A sends any frames b. After A sends frames 0,
1, 2 and receives acknowledgment from B for 0 and 1 c. After A sends frames 3, 4, and 5 and B acknowledges 4
and the ACK is received by A
Ans: a)
Sender
0 1 2 3 4 5
Receiver
0 1 2 3 4 5
b)
Sender
0 1 2 3 4 5
Acknowledgement received for two bits remains in 4 bit size
Receiver
0 1 2 3 4 5
receiver has received all data hence the window
c)
Sender
0 1 2 3 4 5 6 7 0
Receiver
0 1 2 3 4 5 6 7 0
Acknowledgement received for two bits