Question

PLEASE READ THE CASE BELOW AND ANSWER THE QUESTION Chapter 4 – Data Link Layer Th...

PLEASE READ THE CASE BELOW AND ANSWER THE QUESTION

Chapter 4 – Data Link Layer

Th e NDAS’s board of directors has decided that NDAS will centralize communication along two major data links (Atlanta to Tampa and New Orleans to Tampa), as shown in Case Figure 4-1. You recommended leased T-1 lines from the offices to Atlanta and New Orleans, but the board of directors would not approve further cash outlays at this time. You hear a rumor that President Les Coone suggested to several board members that developments in data communication, such as these additional T-1 lines, might be overkill and that these conservative board members vetoed the funding for the additional leased circuits.

As you continue to work on the network plan, you perceive that you are becoming much more involved with the firm’s strategic planning initiatives for survival. You realize that NDAS will become dependent on its communication facilities for its very existence. In other words, the communication systems at NDAS are the foundation for the firm’s mission-critical applications.

You are burdened with all sorts of thoughts about potential problems and possible errors that can threaten NDAS’s communication capabilities. For example, you worry about recent major circuit and switch outages experienced by some of the leading common carriers. You recognize the fact that even though your operations were affected only slightly by these outages, someday NDAS could undergo a costly disruption of its communication network.

You do not view such a situation as a major competitive threat, because NDAS’s principal competitors have similar networks, and all the parcel delivery services would be paralyzed in the event of a disastrous outage. You do, however, want to examine sources of errors in networks and find reasonable error-control mechanisms that will provide NDAS with a competitive edge. For example, are there specialized techniques that can be used for error detection and correction in NDAS communication networks? You decide to research these possibilities further and add this project to your ever-growing list of things to do.

For now, you have been asked to explore the feasibility of integrating voice, video, and data traffic on to a single transmission circuit. You must determine whether this is a viable option. To make this decision, you want to examine the current transmission circuits and assess their ability to handle the anticipated work load.

Question

1. Prepare a position paper on the types of errors you can expect in the NDAS network and the steps you believe NDAS can take to prevent, detect, and correct these errors.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Data can be corrupted during transmission for reliable communication the error must be detected and corrected. The types of errors which can occur in the NDAS network while integrating voice, video, and data traffic are as follows:

  • The cross talk which occurs when the circuit picks up signal in another circuit.
  • Echoes are because of poor connection where the signal gets reflected back to the transmission equipment.
  • Intermodulation noise is also a type of cross talk when signals from two circuits combine to form a signal which falls into a frequency band saved for another signal.
  • Impulse noise is the primary source of error in data communication caused by lightning, fluorescent lights and poor connections.
  • White Gaussian noise is the background hiss or static on radios and telephones cause by thermal agitation of electrons.
  • Attenuation is the loss of power a signal faces while traveling from transmitted computer to the receiving computer. It makes it hard to interpret if data was 0 or 1.
  • A single bit error is when only one bit in the data unit has changed.
  • A burst bit error means two or more bit in the data unit has changed.

NDAS can detect Error as follows:

  • Parity check: In parity check, a parity bit is added to every data unit so the total number of ones is even. It will be a total number of one’s is odd in odd parity check. Simple parity checks can detect all single bit errors. Burst errors can be detected only if a total number of errors in each data unit is odd.
  • In the case of a two-dimensional parity check a block of bits is divided into rows. Next, a redundant row of bits is added to the whole block.
  • Cyclical redundancy check: Error is detected by using a method of redundancy. It means we must add the extra bits for detecting the errors at the destination.
  • Checksum:

The sender follows the steps as follows:

  • The units are divided into k sections each of n units.
  • All sections are added to use ones complement to arrive at the sum.
  • The sum is complemented and becomes the sum check.
  • The checksum is sent with the data.

The receiver will follow the following steps:

  • The unit is divided into k sections each of n units.
  • All the sections are added using one's complement to get the correct sum
  • If the sum is complemented and the result is zero the data is accepted otherwise its rejected.

The methods to correct the errors in data transmission at NDAS are as follows:

  1. Flow control is implemented to set the procedure to restrict the amount of data sender can send before waiting for an acknowledgment.
  2. The error control in the data link layer is defined by the automatic repeat requests, which means the need for retransmission of data.
  3. Then they could introduce controlled access because many computers try to transmit data at the same time. This will help to avoid collision of data and the need to retransmit the data.
  4. Installing shielded wires, moving cables from sources of noise and changing multiplexing frequency and guard bands will address issues related to cross talk, intermodulation and impulse noise.
Add a comment
Know the answer?
Add Answer to:
PLEASE READ THE CASE BELOW AND ANSWER THE QUESTION Chapter 4 – Data Link Layer Th...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Read the Janes' Electronics, Inc. case at the end of the exam and answer the following...

    Read the Janes' Electronics, Inc. case at the end of the exam and answer the following questions. Assume that you are preparing to bid on the audit and are working on your client acceptance issues. Develop a checklist of five areas or issues that you would want to research before you accepted this firm as an audit client. For each area or issue, explain why you would want to research it and give an example of where you might go...

  • ** Please read the case study below to answer question 1, 2 and 3 Starbuck Community....

    ** Please read the case study below to answer question 1, 2 and 3 Starbuck Community. Connection. Caring. Committed. Coffee. Five Cs that describe the essence of Starbucks Corporation, what it stands for and what it wants to be as a business. With more than 19,000 stores in 62 countries, Starbucks is the world's number one specialty coffee retailer. The company also owns Seattle's Best Coffee, Tsavana. Taze, Starbucks VIA, Starbucks Refreshers, Evolution Fresh, LaBoulange, and Verismo brands. It's a...

  • Please read the case provided below and answer the following question: In 2007, JetBlue was a...

    Please read the case provided below and answer the following question: In 2007, JetBlue was a booming young airline with a strong reputation for outstanding service. In fact, the low-fare airline referred to itself as a customer service company that just happened to fly planes. But on Valentine's Day 2007, JetBlue was hit by the perfect storm-literally-of events that led to an operational meltdown. One of the most severe storms of the decade covered JetBlue's main hub at New York's...

  • Dell Computer Please answer the question based on the below Dell case: Q- Conduct Value Chain...

    Dell Computer Please answer the question based on the below Dell case: Q- Conduct Value Chain "Primary activities and Support activities" analysis of Dell ? Dell Computer is one of the most extraordinary success stories in business history. Started in 1984 by Michael Dell in his dorm room when he was an undergraduate student at the University of Texas in Austin, Dell has become the world’s largest producer of computer systems. The company sells notebooks and desktop computers, network servers,...

  • Read the Article posted below, then answer the following questions: 1. As a junior member of...

    Read the Article posted below, then answer the following questions: 1. As a junior member of your company’s committee to explore new markets, you have received a memo from the chairperson telling you to be prepared at the next meeting to discuss key questions that need to be addressed if the company decides to look further into the possibility of marketing to the BOP segment. The ultimate goal of this meeting will be to establish a set of general guidelines...

  • please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software,...

    please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software, Inc. communication in a highly secure and efficient process. The Market Security Software, Inc. (SSI) was a major provider of application software. The firm was proud to be the number two company in the enterprise firewall market. Firewalls ensure network Security for businesses by determining whether to approve or deny access to corporate networks and applications. They have security software that inspects com- munication...

  • Read the Article posted below, then answer the following questions: Mergers & acquisitions are a major...

    Read the Article posted below, then answer the following questions: Mergers & acquisitions are a major form of corporate diversification strategy, identify and discuss the top three reasons why most (50-60%) of acquisitions fail to create shareholder value. What are the five major components of “CEMEX Way” and why has this approach been so successful in post-acquisition integration? In your opinion, what can other companies learn from the “CEMEX Way” as a benchmark for acquisition management? Article: CEMEX: Globalization "The...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241...

    Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241 through 246). Question 2 Prepare a plan for the remainder of the project in response to Adams’ memo (lines 241 through 246). Your answers to the above will be assessed in terms of the level of communication displayed, the insights and inferences drawn, and your ability to...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT