SlideShare a Scribd company logo
1 of 4
ASSIGNMENT-01
                    CSE306



SUBMITTED BY:-
SANJAY KUMAR CHAKRAVARTI
ROLL:-A28
REG.:-11006964


                           SUBMITTED TO:-
                                  Miss.VARIGA NAGI
                              DEPT. OF COMPUTER SCIENCE
                                  LPU,PHAGWARA
Q1. What is the Nyquist theorem and Shannon capacity? What purpose do they
have in communications? Explain in details.

Ans:

In data communication how data send is faster in bit per second is very important.there are two basic
theory for calculating data rate of data communication i.e.

1.Nyquist theorm:- Nyquist theorm is for calculating data rate for noiseless channel,according to
formulae

        Bit Rate = 2 *bandwidth * log2 L

Here bandwith is bandwidth of noiseless channel,and L is the length of noiseless channel,and bite rate
measure in bit per second.

2.shannon theorm:-shannon capcity is for calculating data rate for noisy channel,according to formulae

           capacity=bandwidth*log2(1+SNR)

here bandwidth is bandwidth of noisy channel ,SNR is Signal to noise ratio,and capacity is measure in
bit per second.This theorm was proposed in 1944 by claude Shannon.

Purpose:-Both of them are used for data transmission or in other way for sending data in bit per
second.



Q2. What is piggybacking? Explain the sliding window flow control technique
using piggybacking concept.
Ans:

Piggybacking:- In piggybacking when the receiver receives a dat segment,it checks the sequence
number and if sequence number is matches the next segment which receiver does expect,then the data
is received in order.the acknowledgement can be piggy-backed to normal trafific rather than wait for a
response every time. If data is not receive in order then data packet is dropped or send a
acknowledgement of data missing.

Sliding window flow control technique:-

With the use of multiple frames for a single message, the stop-and-wait protocol does not perform
well. Only one frame at a time can be in transit. In stop-and-wait flow control, if frame > 1, serious
inefficiencies result. Efficiency can be greatly improved by allowing multiple frames to be in transit
at the same time. Efficiency can also be improved by making use of the full-duplex line.
Sliding window has two types:-

1.sender sliding window(ssw)

2.receiver sliding window(rsw)

In the second types of sliding window we use the piggybacking concept because in rsw The receiver
always maintains a window of size 1 If it receives any other frame (out of order), it is discarded and
it needs to be resent. However, the receiver window also slides by one as the specific frame is
received and accepted.

Q3. What is data rate and signal rate? An analog signal has a bit rate of 8000 bps
and a baud rate of 1000 baud. How many data elements are carried by each signal
element? How many signal elements do we need?
Ans:-

Data rate:-Data rate is rate of transffering number of data elements from source to destination.it is
measure in bit per second.

Signal rate:Signal rate is rate of transferring number of signal elements from source to destination in
per second.it’s unit is baud.

N=8000bps

S=1000baud

R=N/S

R=8 bit/baud

L=2r=28=256 signal elements are required



Q4. Explain the basis of DSL technology. Which technique of multiplexing is
used in it.
Ans:-

Dsl:-Digital subscriber line technology is a modem technology that uses existing twisted-pair telephone
lines to transport high bandwidth data,such as multimedia and video,to service subscribers. DSL
technology is one of the most promosing for supporting high-speed digital communication over the
existing local loops.

There are various DSL technology available.for example ADSL,VDSL,SDSL,HDSL
1.ADSL:The first technology in the set is asymmetric DSL(ADSL).ADSL,like a 56k modem ,provides higher
speed in downstream direction than in the upstream direction.that is the reason it is called asymmetric.
Time division multiplexing(TDM) is used in ADSL.
2.VDSL:-It provides a range of bit rate25 to 55 mbps for upstream communication at distances of 3000
to 10000ft.frequency division multiplexing(FDM) is used in VDSL.

3.HDSL:-Data rate of 1.544 Mbps sometimes 2Mbps can be achived without repeaters up to a diatance
of 12000 ft.




                                 !!!--THE END--!!!

More Related Content

What's hot

An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communicationsFarzad Nuseeb
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignJim Jenkins
 
Digital communication (DSSS)
Digital communication  (DSSS)Digital communication  (DSSS)
Digital communication (DSSS)SSGMCE SHEGAON
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...ijtsrd
 
communication system lec2
 communication system lec2 communication system lec2
communication system lec2ZareenRauf1
 
Communication system lec 8
Communication system lec 8Communication system lec 8
Communication system lec 8ZareenRauf1
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksGr Patel
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leachcsandit
 
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)Sanjiv Pradhan
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniquesFaisal Ch
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 

What's hot (18)

An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communications
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum Design
 
Chirps
ChirpsChirps
Chirps
 
Digital communication (DSSS)
Digital communication  (DSSS)Digital communication  (DSSS)
Digital communication (DSSS)
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
 
communication system lec2
 communication system lec2 communication system lec2
communication system lec2
 
4rth lec dsss
4rth lec   dsss4rth lec   dsss
4rth lec dsss
 
Communication system lec 8
Communication system lec 8Communication system lec 8
Communication system lec 8
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leach
 
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniques
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
8 spread spectrum
8 spread spectrum8 spread spectrum
8 spread spectrum
 

Similar to Computer Network

Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkBADALKUMAR56
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
 
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor NetworksAchieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor NetworksRutvik Pensionwar
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...eSAT Journals
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos basedeSAT Publishing House
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
Network Components
Network ComponentsNetwork Components
Network Componentszaisahil
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
 
Multi-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfMulti-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfYAAKOVSOLOMON1
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
 
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...Journal For Research
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...IRJET Journal
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksIRJET Journal
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentIRJET Journal
 
24071 digitalcommunication
24071 digitalcommunication24071 digitalcommunication
24071 digitalcommunicationsharma ellappan
 

Similar to Computer Network (20)

Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor network
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
 
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor NetworksAchieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos based
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Multi-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfMulti-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdf
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
 
24071 digitalcommunication
24071 digitalcommunication24071 digitalcommunication
24071 digitalcommunication
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 

More from Sanjay Kumar Chakravarti

More from Sanjay Kumar Chakravarti (8)

IMPLEMENTATION OF AUTO KEY IN C++
IMPLEMENTATION OF AUTO KEY IN C++IMPLEMENTATION OF AUTO KEY IN C++
IMPLEMENTATION OF AUTO KEY IN C++
 
Design A Screen saver in c on Moving Train with Side view.
Design A Screen saver in c on Moving Train with Side view.Design A Screen saver in c on Moving Train with Side view.
Design A Screen saver in c on Moving Train with Side view.
 
Design A Screen saver in c on Moving Train with Side view.
Design A Screen saver in c on Moving Train with Side view.Design A Screen saver in c on Moving Train with Side view.
Design A Screen saver in c on Moving Train with Side view.
 
Microassembler a10
Microassembler a10Microassembler a10
Microassembler a10
 
Micro Assembler
Micro AssemblerMicro Assembler
Micro Assembler
 
Graphical representation of Stack
Graphical representation of StackGraphical representation of Stack
Graphical representation of Stack
 
Design problem
Design problemDesign problem
Design problem
 
Structured Analysis and Structured Design
Structured Analysis and Structured DesignStructured Analysis and Structured Design
Structured Analysis and Structured Design
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Computer Network

  • 1. ASSIGNMENT-01 CSE306 SUBMITTED BY:- SANJAY KUMAR CHAKRAVARTI ROLL:-A28 REG.:-11006964 SUBMITTED TO:- Miss.VARIGA NAGI DEPT. OF COMPUTER SCIENCE LPU,PHAGWARA
  • 2. Q1. What is the Nyquist theorem and Shannon capacity? What purpose do they have in communications? Explain in details. Ans: In data communication how data send is faster in bit per second is very important.there are two basic theory for calculating data rate of data communication i.e. 1.Nyquist theorm:- Nyquist theorm is for calculating data rate for noiseless channel,according to formulae Bit Rate = 2 *bandwidth * log2 L Here bandwith is bandwidth of noiseless channel,and L is the length of noiseless channel,and bite rate measure in bit per second. 2.shannon theorm:-shannon capcity is for calculating data rate for noisy channel,according to formulae capacity=bandwidth*log2(1+SNR) here bandwidth is bandwidth of noisy channel ,SNR is Signal to noise ratio,and capacity is measure in bit per second.This theorm was proposed in 1944 by claude Shannon. Purpose:-Both of them are used for data transmission or in other way for sending data in bit per second. Q2. What is piggybacking? Explain the sliding window flow control technique using piggybacking concept. Ans: Piggybacking:- In piggybacking when the receiver receives a dat segment,it checks the sequence number and if sequence number is matches the next segment which receiver does expect,then the data is received in order.the acknowledgement can be piggy-backed to normal trafific rather than wait for a response every time. If data is not receive in order then data packet is dropped or send a acknowledgement of data missing. Sliding window flow control technique:- With the use of multiple frames for a single message, the stop-and-wait protocol does not perform well. Only one frame at a time can be in transit. In stop-and-wait flow control, if frame > 1, serious inefficiencies result. Efficiency can be greatly improved by allowing multiple frames to be in transit at the same time. Efficiency can also be improved by making use of the full-duplex line.
  • 3. Sliding window has two types:- 1.sender sliding window(ssw) 2.receiver sliding window(rsw) In the second types of sliding window we use the piggybacking concept because in rsw The receiver always maintains a window of size 1 If it receives any other frame (out of order), it is discarded and it needs to be resent. However, the receiver window also slides by one as the specific frame is received and accepted. Q3. What is data rate and signal rate? An analog signal has a bit rate of 8000 bps and a baud rate of 1000 baud. How many data elements are carried by each signal element? How many signal elements do we need? Ans:- Data rate:-Data rate is rate of transffering number of data elements from source to destination.it is measure in bit per second. Signal rate:Signal rate is rate of transferring number of signal elements from source to destination in per second.it’s unit is baud. N=8000bps S=1000baud R=N/S R=8 bit/baud L=2r=28=256 signal elements are required Q4. Explain the basis of DSL technology. Which technique of multiplexing is used in it. Ans:- Dsl:-Digital subscriber line technology is a modem technology that uses existing twisted-pair telephone lines to transport high bandwidth data,such as multimedia and video,to service subscribers. DSL technology is one of the most promosing for supporting high-speed digital communication over the existing local loops. There are various DSL technology available.for example ADSL,VDSL,SDSL,HDSL
  • 4. 1.ADSL:The first technology in the set is asymmetric DSL(ADSL).ADSL,like a 56k modem ,provides higher speed in downstream direction than in the upstream direction.that is the reason it is called asymmetric. Time division multiplexing(TDM) is used in ADSL. 2.VDSL:-It provides a range of bit rate25 to 55 mbps for upstream communication at distances of 3000 to 10000ft.frequency division multiplexing(FDM) is used in VDSL. 3.HDSL:-Data rate of 1.544 Mbps sometimes 2Mbps can be achived without repeaters up to a diatance of 12000 ft. !!!--THE END--!!!