Cat 1 Exam Notes - CN Unit 2
Cat 1 Exam Notes - CN Unit 2
Cat 1 Exam Notes - CN Unit 2
PART – A
3.What is HDLC?
High-level Data Link Control (HDLC) is a bit-oriented protocol. HDLC
is used for communication over point-to-point and multipoint links. HDLC
implements the Stop-and-Wait protocol. Since it is a data link protocol, data is
organized into frames. A frame is transmitted via the network to the destination
that verifies its successful arrival
ERROR CONTROL:
Used for detecting and retransmitting damaged or lost frames and to
prevent duplication of frames. This is achieved through a trailer added at the
end of the frame.
6. Infer why the data link layer is subdivided into two sublayers.
The data link layer is divided into two sublayers: Thus, it controls the
synchronization, flow control, and error checking functions of the data link
layer. Media Access Control (MAC) sublayer provides control for accessing the
transmission medium.
9. Define framing
Framing is a point-to-point connection between two computers or devices
consists of a wire in which data is transmitted as a stream of bits. Frames have
headers that contain information such as error-checking codes
Bit-oriented framing
In bit-oriented framing, data is transmitted as a sequence of bits that can be
interpreted in the upper layers both as text as well as multimedia data.
Byte oriented protocol:
Byte-oriented framing protocol is "a communications protocol in which
full bytes are used as control codes. Also known as character-oriented protocol."
For example UART communication is byte-oriented. The term "character-
oriented" is deprecated, since the notion of character has changed
Hub Switch
They operate in the physical layer of the OSI They operate in the data link layer of the OSI
model. model.
It is a non-intelligent network device that sends It is an intelligent network device that sends
message to all ports. message to selected destination ports.
Collisions may occurs during setup of Collisions do not occur since the
transmission when more than one computers communication is full duplex.
place data simultaneously in the corresponding
ports.
They are passive devices, they don’t have any They are active devices, equipped with
software associated with it. network software.
They generally have fewer ports of 4/12. The number of ports is higher – 24/48.
PART – B
A transceiver a small device directly attached to the tap detects when the line is
idle and drives the signal when the host is transmitting. It also receives incoming
signals. The transceiver is, in turn, connected to an Ethernet adaptor, which is
plugged into the host.
The 64-bit preamble allows the receiver to synchronize with the signal;
it is
a sequence of alternating 0’s and 1’s.
Both the source and destination hosts are identified with a 48-bit
address.
The packet type field serves as the demultiplexing key.
Each frame contains up to 1500 bytes of data(Body).
CRC is used for Error detection
Ethernet Addresses
Every Ethernet host has a unique Ethernet address (48 bits – 6 bytes).
Ethernet address is represented by sequence of six numbers separated
by
colons.
Each number corresponds to 1 byte of the 6 byte address and is given
by
pair of hexadecimal digits.
Eg: 8:0:2b:e4:b1:2 is the representation of
00001000 00000000 00101011 11100100 10110001 00000010
Each frame transmitted on an Ethernet is received by every adaptor
connected to the Ethernet.
In addition to unicast addresses an Ethernet address consisting of all 1s
is
treated as broadcast address.
Similarly the address that has the first bit set to 1 but it is not the
broadcast
address is called multicast address.
2.Construct the comparison between different wireless technologies?
Enumerate 802.11 protocol stacks in detail. (13)
Bluetooth:
Bluetooth is a short-range wireless technology standard that is used for
exchanging data between fixed and mobile devices over short distances using
UHF radio waves in the ISM bands, from 2.402 GHz to 2.48 GHz, and building
personal area networks.
Infrared:
Infrared (IR) is a wireless mobile technology used for device
communication over short ranges. IR communication has major limitations
because it requires line-of-sight, has a short transmission range and is unable to
penetrate walls. ... Thus, data transmitted between IrDA devices is normally
unencrypted.
Near Field Communication (NFC)
Near-Field Communication is a set of communication protocols for
communication between two electronic devices over a distance of 4 cm or less.
NFC offers a low-speed connection with simple setup that can be used to
bootstrap more-capable wireless connections.
Wireless-Fidelity:
IEEE 802.11 is part of the IEEE 802 set of local area network technical
standards, and specifies the set of media access control and physical layer
protocols for implementing wireless local area network computer
communication
In 802.11 the MAC sublayer determines which channel gets to transmit next.
The sublayer above, the LLC (Logical Link Layer), hides the differences
between the varying 802.11 versions for the network layer
All 802.11 transmission methods define multiple rates. Different rates can be
used depending on the current conditions. If the signal is weak, a low rate is
used. If the signal is clear, the highest rate is used. The process of adjustment is
called rate adaption.
IEEE 802.11 supports three basic topologies for WLANs, the independent basic
service set (IBSS), the basic service set, and the extended service set (ESS). The
MAC layer supports implementations of IBSS, basic service set, and ESS
configurations.
Independent basic service set: The IBSS configuration is referred to as an
independent configuration or an ad-hoc network. An IBSS configuration is
analogous to a peer-to-peer office network in which no single node is required
to act as a server. IBSS WLANs include a number of nodes or wireless stations
that communicate directly with one another on an ad-hoc, peer-to-peer basis.
Generally, IBSS implementations cover a limited area and are not connected to
any large network. An IBSS is typically a short-lived network, with a small
number of stations, that is created for a particular purpose.
Basic service set: The basic service set configuration relies on an AP that acts as
the logical server for a single WLAN cell or channel. Communications between
station 1 and station 4 actually flow from station 1 to AP1 and then from AP1 to
AP2 and then from AP2 to AP4 and finally AP4 to station 4 (refer to Figure 2).
An AP performs a bridging function and connects multiple WLAN cells or
channels, and connects WLAN cells to a wired enterprise LAN.
Extended service set: The ESS configuration consists of multiple basic service
set cells that can be linked by either wired or wireless backbones called a
distributed system. IEEE 802.11 supports ESS configurations in which multiple
cells use the same channel, and configurations in which multiple cells use
different channels to boost aggregate throughput. To network the equipment
outside of the ESS, the ESS and all of its mobile stations appear to be a single
MAC layer network where all stations are physically stationary. Thus, the ESS
hides the mobility of the mobile stations from everything outside the ESS.
5.Explain in detail about the Point to point Protocol (PPP) with neat sketch.
(13)
PPP Frame
PPP is a byte - oriented protocol where each field of the frame is
composed of one
or more bytes.
1. Flag − 1 byte that marks the beginning and the end of the frame. The
bit
pattern of the flag is 01111110.
2. Address − 1 byte which is set to 11111111 in case of broadcast.
3. Control − 1 byte set to a constant value of 11000000.
4. Protocol − 1 or 2 bytes that define the type of data contained in the
payload
field.
5. Payload − This carries the data from the network layer. The maximum
length of the payload field is 1500 bytes.
6. FCS − It is a 2 byte(16-bit) or 4 bytes(32-bit) frame check sequence for
error detection. The standard code used is CRC.
Byte Stuffing in PPP Frame
Byte stuffing is used is PPP payload field whenever the flag sequence
appears in
the message, so that the receiver does not consider it as the end of the frame.
The
escape byte, 01111101, is stuffed before every byte that contains the same byte
as
the flag byte or the escape byte. The receiver on receiving the message removes
the escape byte before passing it onto the network layer.
Dead:
In dead phase the link is not used. There is no active carrier and the
line is quiet.
Establish:
Connection goes into this phase when one of the nodes start
communication. In this phase, two parties negotiate the options. If
negotiation is successful, the system goes into authentication phase or
directly to networking phase.
Authenticate:
This phase is optional. The two nodes may decide whether they
need this phase during the establishment phase. If they decide to proceed
with authentication, they send several authentication packets. If the result
is successful, the connection goes to the networking phase; otherwise, it
goes to the termination phase.
Network:
In network phase, negotiation for the network layer protocols takes
place.PPP specifies that two nodes establish a network layer agreement
before data at the network layer can be exchanged. This is because PPP
supports several protocols at network layer. If a node is running multiple
protocols simultaneously at the network layer, the receiving node needs
to know which protocol will receive the data.
Open:
In this phase, data transfer takes place. The connection remains in
this phase until one of the endpoints wants to end the connection.
Terminate: In this phase connection is terminated.
Components/Protocols of PPP
Three sets of components/protocols are defined to make PPP powerful:
Flow Control
This flow control mechanism forces the sender after transmitting a data
frame to stop and wait until the acknowledgement of the data-frame sent
is received.
Sliding Window
In this flow control mechanism, both sender and receiver agree on the
number of data-frames after which the acknowledgement should be sent.
As we learnt, stop and wait flow control mechanism wastes resources, this
protocol tries to make use of underlying resources as much as possible.
Error Control
Synchronization:
• Receiver must know, when the data begins & when it ends and also
receiver should be able to distinguish between each bit in the frame of data.
Flow Control
• Refers to the mechanisms that make sure that the sending station cannot
overwhelm the receiving station.
• Preventing the buffer overflow.
Eg., Sliding Window. Issues in Data Link Layer
Error Control:
• All transmission media have potential for introduction of errors.
• Error control mechanisms can detect as well as correct errors.
Link Configuration Control
• Link Topology
Physical arrangement of the connection between the devices.
• Link Duplexity
Simplex – only one device can transmit to other. (ie., one
direction transmit) Issues in Data Link Layer
half duplex – Both device can transmit to each other, but not
simultaneously.
full duplex – Both device can transmit simultaneously. Issues in
Data Link Layer
7. What is the need for error detection? Explain with typical examples.
Explain methods used for error detection and error correction. (13)
Error Detection
When data is transmitted from one device to another device, the system
does not guarantee whether the data received by the device is identical to the data
transmitted by another device. An Error is a situation when the message received
at the receiver end is not identical to the message transmitted.
Types Of Errors
Errors can be classified into two categories:
o Single-Bit Error
o Burst Error
Error Detecting Techniques:
The most popular Error Detecting Techniques are:
o Single parity check
o Two-dimensional parity check
o Checksum
o Cyclic redundancy check
Single Parity Check
o Single Parity checking is the simple mechanism and inexpensive to detect
the errors.
o In this technique, a redundant bit is also known as a parity bit which is
appended at the end of the data unit so that the number of 1s becomes even.
Therefore, the total number of transmitted bits would be 9 bits.
o If the number of 1s bits is odd, then parity bit 1 is appended and if the
number of 1s bits is even, then parity bit 0 is appended at the end of the
data unit.
o At the receiving end, the parity bit is calculated from the received data bits
and compared with the received parity bit.
o This technique generates the total number of 1s even, so it is known as
even-parity checking.
Checksum
A Checksum is an error detection technique based on the concept of redundancy.
It is divided into two parts:
Checksum Generator
A Checksum is generated at the sending side. Checksum generator subdivides the
data into equal segments of n bits each, and all these segments are added together
by using one's complement arithmetic. The sum is complemented and appended
to the original data, known as checksum field. The extended data is transmitted
across the network.
1. The Sender follows the given steps:
2. The block unit is divided into k sections, and each of n bits.
3. All the k sections are added together by using one's complement to get t
he sum.
4. The sum is complemented and it becomes the checksum field.
5. The original data and checksum field are sent across the network.
Checksum Checker
A Checksum is verified at the receiving side. The receiver subdivides the
incoming data into equal segments of n bits each, and all these segments are added
together, and then this sum is complemented. If the complement of the sum is
zero, then the data is accepted otherwise data is rejected.
1. The Receiver follows the given steps:
2. The block unit is divided into k sections and each of n bits.
3. All the k sections are added together by using one's complement algorith
m to get the sum.
4. The sum is complemented.
5. If the result of the sum is zero, then the data is accepted otherwise the da
ta is discarded.
Cyclic Redundancy Check (CRC)
CRC is a redundancy error technique used to determine the error.
Following are the steps used in CRC for error detection:
o In CRC technique, a string of n 0s is appended to the data unit, and this n
number is less than the number of bits in a predetermined number, known
as division which is n+1 bits.
o Secondly, the newly extended data is divided by a divisor using a process
is known as binary division. The remainder generated from this division is
known as CRC remainder.
o Thirdly, the CRC remainder replaces the appended 0s at the end of the
original data. This newly generated unit is sent to the receiver.
o The receiver receives the data followed by the CRC remainder. The
receiver will treat this whole unit as a single unit, and it is divided by the
same divisor that was used to find the CRC remainder.
If the resultant of this division is zero which means that it has no error, and the
data is accepted.
If the resultant of this division is not zero which means that the data consists of
an error. Therefore, the data is discarded.
At data link layer, it extracts message from sender and provide it to receiver by
providing sender’s and receiver’s address. The advantage of using frames is
that data is broken up into recoverable chunks that can easily be checked for
corruption.
Problems in Framing –
Detecting start of the frame: When a frame is transmitted, every
station must be able to detect it. Station detect frames by looking out
for special sequence of bits that marks the beginning of the frame i.e.
SFD (Starting Frame Delimeter).
How do station detect a frame: Every station listen to link for SFD
pattern through a sequential circuit. If SFD is detected, sequential
circuit alerts station. Station checks destination address to accept or
reject frame.
Detecting end of frame: When to stop reading the frame.
Types of framing – There are two types of framing:
1. Fixed size – The frame is of fixed size and there is no need to provide
boundaries to the frame, length of the frame itself acts as delimiter.
Drawback: It suffers from internal fragmentation if data size is less
than frame size
Solution: Padding
2. Variable size – In this there is need to define end of frame as well as
beginning of next frame to distinguish. This can be done in two ways:
1. Length field – We can introduce a length field in the frame to
indicate the length of the frame. Used in Ethernet(802.3). The
problem with this is that sometimes the length field might get
corrupted.
2. End Delimeter (ED) – We can introduce an ED(pattern) to indicate
the end of the frame. Used in Token Ring. The problem with this is
that ED can occur in the data. This can be solved by:
(ii) How does a Bridge come to learn on which port the various hosts
reside? Explain with examples. (6)
Bridges operate on Ethernet frames and thus are layer-2 devices. In fact,
bridges are full-fledged packet switches that forward and filter frames using the
LAN destination addresses. When a frame comes into a bridge interface, the
bridge does not just copy the frame onto all of the other interfaces. Instead, the
bridge examines the destination address of the frame and attempts to forward the
frame on the interface that leads to the destination.
Figure 5.6-2 shows how the three academic departments of our previous example
might be interconnected with a bridge. The three numbers next to the bridge are
the interface numbers for the three bridge interfaces. When the departments are
interconnected by a bridge, as in Figure 5.6-2, we again refer to the entire
interconnected network as a LAN, and we again refer to each of the departmental
portions of the network as LAN segments. But in contrast to the multi-tier hub
design in Figure 5.6-1, each LAN segment is now an isolated collision domain.
11. Construct the working principle of Switches, Hub and Routers (13)
Switches:
Switches are networking devices operating at layer 2 or a data link layer of the
OSI model. They connect devices in a network and use packet switching to
send, receive or forward data packets or data frames over the network. A switch
has many ports, to which computers are plugged in
Working principle:
Once a device is connected to a switch, the switch notes its media access control
(MAC) address, a code that’s baked into the device’s network-interface card
(NIC) that attaches to an ethernet cable that attaches to the switch. The switch
uses the MAC address to identify which attached device outgoing packets are
being sent from and where to deliver incoming packet. So the MAC address
identifies the physical device as opposed to the network layer (Layer 3) IP
address, which can be assigned dynamically to a device and change over time.
When a device sends a packet to another device, it enters the switch and the
switch reads its header to determine what to do with it. It matches the
destination address or addresses and sends the packet out through the
appropriate ports that leads to the destination devices.
Routers:
Hub:
Working Principle
When a hub receives a packet of frames at one of its ports from a network
device, it transmits (repeats) the packet to all of its ports to all of the other
network devices. If two network devices on the same network try to send
packets at the same time a collision is said to occur. Hubs operate in such a way
that all data received through one port is sent to all other ports. This type of
operation creates an extremely unsecure environment and anyone can sniff the
network using a sniffer and any unencrypted traffic over the network is not
secure. Hubs are unsecure LAN devices that should be replaced with switches
for security and increased bandwidth
12. Identify the working principle of Bluetooth and develop a neat sketch to
depict its architecture. (13)
Bluetooth works by the simple principle of sending and receiving data in the
form of radio waves. Every Bluetooth enabled device has a card-like attachment
known as the Bluetooth adapter. It is this Bluetooth adapter that sends and
receives data. A Bluetooth adapter has a particular range of connection. One
electronic adaptor can notice another Bluetooth device only if the second device
is present within the range of the first device. When they are within the range,
they can strike up a connection between themselves. Striking up of connection
between two Bluetooth devices are known as paring of devices.
BLUETOOTH ARCHITECTURE
Bluetooth defines two types of networks: Piconet and Scatternet.
PICONET
The basic Bluetooth network configuration is called a Piconet
A Piconet is a collection of eight bluetooth devices which are synchronized.
One device in the piconet can act as Primary (Master), all other devices
connected to the master act as Secondary (Slaves).
All the secondary stations synchronize their clocks and hopping sequence
with the primary.
Any communication is between the primary/master and a secondary/slave.
The communication between the primary and secondary stations can be one-
to-one or one-to-many.
The slaves do not communicate directly with each other.
The devices in a piconet can be in any one of the three types/states.
They are
Active Device / State:
1. Connected to the piconet and participates in the communication.
2. Can be a Master or a Slave device.
3. All active devices are assigned a 3-bit address (AMA).
Parked Device / State
1. Connected to the piconet, but does not actively articipate in the
communication.
2. More than 200 devices can be parked.
3. All parked devices use an 8-bit parked member address (PMA).
Stand-by Device / State
1. Not connected to the piconet.
2. They do not participate in the piconet currently but may take part at a
later time.
3. Devices in stand-by do not need an address.
If a parked device wants to communicate and there are already seven active
slaves, one slave has to switch to park state to allow the parked device to switch
to active state.
SCATTERNET
Piconets can be combined to form what is called a scatternet.
Many piconets with overlapping coverage can exist simultaneously,called
Scatternet.
A secondary station in one piconet can be the primary in another piconet.
This station can receive messages from the primary in the first piconet (as a
secondary) and, acting as a primary, deliver them to secondaries in the second
piconet.
A station can be a member of two piconets.
In the example given below, there are two piconets, in which one slave
participates in two different piconets.
Master of one piconet cannot act as the master of another piconet.
But the Master of one piconet can act as a Slave in another piconet.
13. Classify in detail about High-level Data Link Control and the types of
frames. (13)
HDLC FRAMES
HDLC defines three types of frames:
1. Information frames (I-frames) - used to carry user data
2. Supervisory frames (S-frames) - used to carry control information
3. Unnumbered frames (U-frames) – reserved for system management
Each type of frame serves as an envelope for the transmission of a different type
of
message.
Each frame in HDLC may contain up to six fields:
1. Beginning flag field
2. Address field
3. Control field
4. Information field (User Information/ Management Information)
5. Frame check sequence (FCS) field
6. Ending flag field
In multiple-frame transmissions, the ending flag of one frame can serve as the
beginning flag of the next frame.
o The first bit defines the type. If the first bit of the control field is 0, this
means the frame is an I-frame.
o The next 3 bits, called N(S), define the sequence number of the frame.
o The last 3 bits, called N(R), correspond to the acknowledgment number
when piggybacking is used.
o The single bit between N(S) and N(R) is called the P/F bit. If this bit is 1 it
means poll (the frame is sent by a primary station to a secondary).
o If this bit is 0 it means final(the frame is sent by a secondary to a Primary).
Control Field for S-Frames
o Supervisory frames are used for flow and error control whenever
piggybacking is either impossible or inappropriate.
o S-frames do not have information fields
o If the first 2 bits of the control field are 10, this means the frame is an Sframe.
o The last 3 bits, called N(R),correspond to the acknowledgment number
(ACK) or negative acknowledgment number (NAK), depending on the type
of S-frame.
o The 2 bits called code are used to define the type of S-frame itself.
o With 2 bits, we can have four types of S-frames –
Receive ready (RR), Receive not ready (RNR), Reject (REJ) and
Selective reject (SREJ).
Control Field for U-Frames
o Unnumbered frames are used to exchange session management and control
information between connected devices.
o U-frames contain an information field, but used only for system
management information and not user data.
o If the first 2 bits of the control field are 11, this means the frame is an Uframe.
o U-frame codes are divided into two sections: a 2-bit prefix before the P/F
bit and a 3-bit suffix after the P/F bit.
o Together, these two segments (5 bits) can be used to create up to 32
different types of U-frames.
PART-C
1.Analyze the various types of error .Discuss the various types of detection
and correction (15)
Data can be corrupted during transmission. For reliable communication,
errors
must be detected and corrected. Error Control is a technique of error detection
and
retransmission.
TYPES OF ERRORS
SINGLE-BIT ERROR
The term Single-bit error means that only one bit of a given data unit (such as
byte,
character, data unit or packet) is changed from 1 to 0 or from 0 to 1.
BURST ERROR
The term Burst Error means that two or more bits in the data unit have changed
from 1 to 0 or from 0 to 1.
Checksum
Checksum Generator
Suppose L is the total sum of the data segments, then the checksum would be ?L
If the resultant of this division is zero which means that it has no error, and the
data is accepted.
If the resultant of this division is not zero which means that the data consists of
an error. Therefore, the data is discarded.
ERROR CORRECTION:
Error Correction codes are used to detect and correct the errors when data is
transmitted from the sender to the receiver.
HDLC Frame
HDLC is a bit - oriented protocol where each frame contains up to six fields. The
structure varies according to the type of frame. The fields of a HDLC frame are
−
Flag − It is an 8-bit sequence that marks the beginning and the end of the
frame. The bit pattern of the flag is 01111110.
Address − It contains the address of the receiver. If the frame is sent by the
primary station, it contains the address(es) of the secondary station(s). If it
is sent by the secondary station, it contains the address of the primary
station. The address field may be from 1 byte to several bytes.
Control − It is 1 or 2 bytes containing flow and error control information.
Payload − This carries the data from the network layer. Its length may vary
from one network to another.
FCS − It is a 2 byte or 4 bytes frame check sequence for error detection.
The standard code used is CRC (cyclic redundancy code)
It is a carrier sense multiple access based on media access protocol to sense the
traffic on a channel (idle or busy) before transmitting the data. It means that if the
channel is idle, the station can send data to the channel. Otherwise, it must wait
until the channel becomes idle. Hence, it reduces the chances of a collision on a
transmission medium.
1-Persistent: In the 1-Persistent mode of CSMA that defines each node, first sense
the shared channel and if the channel is idle, it immediately sends the data. Else
it must wait and keep track of the status of the channel to be idle and broadcast
the frame unconditionally as soon as the channel is idle.
Non-Persistent: It is the access mode of CSMA that defines before transmitting
the data, each node must sense the channel, and if the channel is inactive, it
immediately sends the data. Otherwise, the station must wait for a random time
(not continuously), and when the channel is found to be idle, it transmits the
frames.
3.Use IEEE 802.3 and IEEE 802.11 to build three differences between
wired and wireless LANS. (15)
The two dominant 802 working groups are 802.3 Ethernet and 802.11 wireless
LAN. However, there are important differences between the two.
WLANs use radio frequencies (RF) instead of cables at the Physical layer and
MAC sub-layer of the Data Link layer. In comparison to cable, RF has the
following characteristics:
i. RF does not have boundaries, such as the limits of a wire in a sheath.
The lack of such a boundary allows data frames traveling over the RF media to
be available to anyone that can receive the RF signal.
ii. RF is unprotected from outside signals, whereas cable is in an
insulating sheath. Radios operating independently in the same geographic area
but using the same or a similar RF can interfere with each other.
iii. RF transmission is subject to the same challenges inherent in any
wave-based technology, such as consumer radio. For example, as you get
further away from the source, you may hear stations playing over each other or
hear static in the transmission. Eventually you may lose the signal all together.
Wired LANs have cables that are of an appropriate length to maintain signal
strength.
iv. RF bands are regulated differently in various countries. The use of
WLANs is subject to additional regulations and sets of standards that are not
applied to wired LANs.
WLANs connect clients to the network through a wireless access point (AP)
instead of an Ethernet switch. WLANs connect mobile devices that are often
battery powered, as opposed to plugged-in LAN devices. Wireless network
interface cards (NICs) tend to reduce the battery life of a mobile device.
WLANs support hosts that contend for access on the RF media (frequency
bands). 802.11 prescribe collision-avoidance instead of collision-detection for
media access to proactively avoid collisions within the media. WLANs use a
different frame format than wired Ethernet LANs. WLANs require additional
information in the Layer 2 header of the frame. WLANs raise more privacy
issues because radio frequencies can reach outside the facility. 802.11 wireless
LANs extend the 802.3 Ethernet LAN infrastructures to provide additional
connectivity options. However, additional components and protocols are used to
complete wireless connections. In an 802.3 Ethernet LAN, each client has a
cable that connects the client NIC to a switch. The switch is the point where the
client gains access to the network. In a wireless LAN, each client uses a
wireless adapter to gain access to the network through a wireless device such as
a wireless router or access point.
4.Explain Cyclic Redundancy Check? Suppose we want to transmit the
message 11001001 and protect it from errors using the CRC polynomial x3
+ 1. Use polynomial long division to determine the message that should be
transmitted. (15)