Tuesday, May 5, 2020

Network Needs For Data Communication Samples †MyAssignmenthelp.com

Question: Discuss about the Network Needs For Data Communication. Answer: Importance of Physical layer: The physical layer refers to the first layer of the Open System Interconnection Modelor the OSI model. The bit-level transmission is managed in this layer. Transmission between physical devices is controlled by this layer. The mechanical or electrical interface that is needed for the communication between the communicating devices is also provided by this layer (Chen et al. 2015). The layer is responsible for dealing with the various physical connections that the network needs for data communication. It includes the wireless transmission, cabling standards, various types of connectors, interface cards and many more as needed by the network (Goseling, Gastpar and Weber 2015). Error free communication: The data that hardware devices generate are optimized by the layer to make it suitable for digital communication. Without the optimization the data will communication may not be effective due to discrete timing over the network. This optimization of data timing to make it suitable for the transmissions makes the communication error free. The optimization is done using the line coding technique (Zou et al. 2015). The layer also allows for interleaving of bits which helps to improve the error correction. Robust communication: The layer helps to detect the carrier collision. It can sense if there are sufficient carrier is available for data communications and this helps to avoid carrier congestion created due to the data packets undelivered for unavailability of data carriers and thus ensures robust communication (Kapetanovic, Zheng and Rusek 2015). Reliable communication: The layer with the help of Signal equalization and multiplexing technique helps in ensuring reliable communication (Mukherjee et al. 2014). Importance of Data-Link layer: The data link layer is the second layer in the seven layer OSI model. It helps to connect two nodes that are involved in the data communication. The connection is made using the logical link. The link that is established between the nodes is also terminated by the layer once the communication is completed (Marquardt 2017). Ease of communication: The layer provides end-to-end message delivery with proper acknowledgement of message delivery, thus ensures ease of communication (Cui , Yu and Yan 2016). Error free communication: In order to ensure error free transmission the layer control the traffic generated by the data frame. It communicate with the transmission node for telling it to back -off when there is no availability of buffer message (Kizza 2017). Robust communication: The layer helps in detecting the any errors occurred in the physical layers and based on that the errors are acknowledged and again retransmitted by rectifying the errors and making necessary correction. Thus ensures error free and robust communication (Ding and Jiang 2016). Importance for lower layers: The data link layer helps in error-free data transmission between the nodes with proper control over the physical layer that resides bellow the data link layer in the OSI model. The error free transmission helps layers above it in assuming transmission which is virtually error free (Zafar and Ejaz 2016). Importance of internet layers: The internet layer lies above the physical and data link layer. The layer plays an important role in data communication and also helps in managing the layers below it (Blekneni et al. 2016). Error free communication: The layer helps in controlling the subnet traffic. Whenever the any router in this layer exceeds the buffer limit the layer sends an instruction to the transmission station to hold on the transmission to avoid error in data communication (Qadir et al. 2015). Robust communication: The layer allows for frame fragmentation that helps in determining the maximum transmission unitor the MTU for the router that is used for the downstream communication. It checks if the data fragment size is less or greater than the transmission unit size. In case the fragment size is greater than the transmission unit size, then fragmentation is done on the data frame and at the time of receiving the data at the destination site the data is again reassembled to keep the data integrity and robustness of the system (Kalakech 2016). Importance for lower layers: The network layer control how the subnet will operate. It decides the allocation of the physical path for the data communication to take place to facilitate the network conditions and the service priority. The data link layer acts as an interface between the physical layer and network layer (Garman and Sherman 2015). The data link layer with the help of the network layer helps for smooth operation of the physical layer by proper resource allocation of the physical layer entities allowing for robust and error free execution of the physical layer components with proper resource management Drills: a) Boolean operation on bit patterns: not 0010111000101100 : 1101000111010011 0010111000101100 or 1110000011100001: 1110111011101100 iii. 0010111000101100 and 1110000011100001: 10000000100000 1100111000111011 and 0110111100011100: 100111000011000 b) What are the subnet masks for the following slash address blocks Slash address blocks Subnet masks /8 255.0.0.0 /15 255.254.0.0 c) Address mask validity and slash forms for the correct address masks: Address masks validity Slash forms i) 255.255.248.0 valid /21 ii) 255.224.252.0 Not valid NA iii) 255.255.255.224 valid /27 iv) 255.255.156.0 Not valid NA The criteria of a valid subnet mask is that when it is converted to binary the binary equivalent have to consists of only consecutive 1's and then 0's, but no intermittent mixing is allowed. The binary equivalent of the address mask 255.224.252.0 is 11111111.11100000. 11111100. 00000000 which is not valid according to the above mentioned criteria. The binary equivalent of the address mask 255.255.156.0 is 11111111. 11111111. 10011100.00000000 which is also not valid. d) Number of hosts in the following address blocks: Address blocks Number of hosts /13 524272 /26 62 Controlled access and contention-based access to a physical medium : Controlled access grant permission to the transmitting stations to enable it for communication. Only that station granted for permission will be allowed to send data node in the communication. This helps to control the traffic and collision of message is also avoided in this way (Thilina et al. 2015). Contention refers to media access method that is used for sending broadcasting medium. In this method any transmitting station can send data at any time. However, this might create collision in the network. In order to avoid the collision carrier sensing mechanism is used. References: Belkneni, M., Bennani, M.T., Ahmed, S.B. and Kalakech, A., 2016, October. Network Layer Benchmarking: Investigation of AODV Dependability. InInternational Symposium on Computer and Information Sciences(pp. 225-232). Springer, Cham. Chen, G., Gong, Y., Xiao, P. and Chambers, J.A., 2015. Physical layer network security in the full-duplex relay system.IEEE transactions on information forensics and security,10(3), pp.574-583. Cui, L., Yu, F.R. and Yan, Q., 2016. When big data meets software-defined networking: SDN for big data and big data for SDN.IEEE network,30(1), pp.58-65. Ding, R. and Jiang, H., 2016. Simulation of data-link networks used in cooperative terminal guidance. InElectronics, Electrical Engineering and Information Science: Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science (EEEIS2015)(pp. 504-511). Garman, S. and Sherman, R., 2015. Automation at the Network Layer. Goseling, J., Gastpar, M. and Weber, J.H., 2015. Random access with physical-layer network coding.IEEE Transactions on Information Theory,61(7), pp.3670-3681. Kalakech, A., 2016, September. Network Layer Benchmarking: Investigation of AODV Dependability. InComputer and Information Sciences: 31st International Symposium, ISCIS 2016, Krakw, Poland, October 2728, 2016, Proceedings(Vol. 659, p. 225). Springer. Kapetanovic, D., Zheng, G. and Rusek, F., 2015. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks.IEEE Communications Magazine,53(6), pp.21-27. Kizza, J.M., 2017.Guide to computer network security. Springer. Marquardt, R.R., 2017. Data Link Layer Trust Signaling in Communication Network.filed Jul,11. Mukherjee, A., Fakoorian, S.A.A., Huang, J. and Swindlehurst, A.L., 2014. Principles of physical layer security in multiuser wireless networks: A survey.IEEE Communications Surveys Tutorials,16(3), pp.1550-1573. Qadir, J., Ali, A., Yau, K.L.A., Sathiaseelan, A. and Crowcroft, J., 2015. Exploiting the power of multiplicity: a holistic survey of network-layer multipath.IEEE Communications Surveys Tutorials,17(4), pp.2176-2213. Thilina, K.M., Tabassum, H., Hossain, E. and Kim, D.I., 2015. Medium access control design for full duplex wireless systems: challenges and approaches.IEEE Communications Magazine,53(5), pp.112-120. Zafar, S. and Ejaz, U., 2016. SCTP-aware Link Layer Retransmission Mechanism for Smart-grid Communication Network.Engineering, Technology Applied Science Research,6(4), pp.1093-1098. Zou, Y., Zhu, J., Wang, X. and Leung, V.C., 2015. Improving physical-layer security in wireless communications using diversity techniques.IEEE Network,29(1), pp.42-48.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.