Question 1 (30 Marks) (1a) The Following Are Three Terms Use

Question 1 (30 marks) (1a) The following are three terms used in data communication. For each term,

(1) explain its meaning or functionality; (2) state the name of the OSI reference layer it belongs to; and (3) appraise the function of its OSI reference layer. (i) Amplitude modulation (ii) Subnet (iii) Media access control (1b) The following are three pairs of concepts used in data communication. For each pair of concepts, apply these concepts in real-time video streaming in Internet (such as Youtube) and appraise their differences. (i) “Error concealment” and “Error resilient” (ii) “Network delay” and “Network jitter” (iii) “Shortest path routing” and “Flooding”

Paper For Above instruction

Data communication is a fundamental aspect of modern digital interaction, and understanding key terms such as amplitude modulation, subnetting, and media access control, alongside concepts like error resilience and routing strategies, is essential for efficient network design and management. This paper explores these terms and concepts, elucidating their meanings, the OSI layers they belong to, and their roles within the network stack. Additionally, it applies pairs of concepts to real-time video streaming scenarios, comparing their functions and implications.

Terminology in Data Communication

Amplitude Modulation (AM)

Amplitude modulation is a method of encoding information onto a carrier wave by varying its amplitude in proportion to the signal's instantaneous value. It is primarily used in radio broadcasting to transmit audio signals over long distances. The function of amplitude modulation involves modulating the amplitude of a high-frequency carrier wave to carry information. Within the OSI model, amplitude modulation pertains to physical layer functions, specifically at the actual transmission of radio frequency signals. Its primary role is to facilitate the transmission of analog signals over radio channels, enabling wireless communication.

Subnet

A subnet, or subnetwork, is a segmented piece of a larger network, created by dividing an IP network into smaller, manageable parts. It allows improved routing efficiency and security by isolating sections of a network. Subnetting involves partitioning the IP address space to allocate specific ranges to different network segments. The concept of subnets is associated with the network layer of the OSI model, where IP addressing and routing converge. The function of the network layer includes determining optimal paths for data transmission between different networks and segments, with subnetting enhancing routing simplicity and network organization.

Media Access Control (MAC)

Media Access Control is a sublayer of the data link layer (Layer 2) responsible for controlling how devices on a network segment access the physical transmission medium to transmit data without collisions. MAC manages protocol operations such as addressing, channel access mechanisms, and frame delimiting. Its role within the OSI model is to coordinate hardware access and ensure reliable data transfer across shared media like Ethernet, Wi-Fi, or Bluetooth. MAC's primary function is to prevent collisions and manage device arbitration over the physical medium, ensuring efficient and orderly communication in local area networks.

Concept Pairs in Video Streaming

Error Concealment vs Error Resilient

In internet video streaming platforms like YouTube, error concealment refers to mechanisms integrated into video codecs that mask or hide errors caused by packet loss or data corruption. Techniques such as frame repetition, spatial or temporal interpolation, allow the viewer to perceive a continuous, coherent video despite errors. Error resilience, on the other hand, pertains to the design of coding systems that can withstand data loss during transmission, ensuring the video can recover gracefully without significant quality degradation. Error concealment is reactive, addressing errors after they occur, whereas error resilience is proactive, incorporating robustness into the encoding process. Both improve user experience in unreliable network conditions but differ in their implementation focus.

Network Delay vs Network Jitter

Network delay is the total time taken for data packets to travel from the source to the destination, encompassing processing, queuing, transmission, and propagation delays. In video streaming, high delay can cause buffering and synchronization issues. Network jitter refers to variations in packet delay over time, resulting in packets arriving at inconsistent intervals. Jitter can cause frames to arrive out of order or at uneven rates, negatively affecting stream quality. While delay is a static measure, jitter reflects the variability in delay, and both need to be managed—through buffering or Quality of Service (QoS) techniques—to ensure smooth playback of real-time video.

Shortest Path Routing vs Flooding

Shortest path routing involves algorithms such as Dijkstra’s or Bellman-Ford to determine the most efficient path with the least cost (e.g., time, hops, or bandwidth) from source to destination in a network graph. It optimizes resource usage and reduces latency, vital for streaming applications requiring quick, reliable delivery. Flooding, in contrast, involves broadcasting packets to all network nodes, where each node forwards the packet to all neighbors. While flooding ensures high delivery probability and robustness in dynamic or unknown topologies, it is inefficient and can cause network congestion. In streaming, shortest path routing is preferable for minimal latency, whereas flooding might be used in network discovery or redundancy scenarios.

Conclusion

Understanding the distinctions between these terms and concepts enhances the efficiency of network design, troubleshooting, and application deployment. Amplitude modulation, subnetting, and media access control represent foundational elements governing physical transmission, logical network segmentation, and shared media protocols respectively. Meanwhile, the comparison of error concealment versus error resilience, delay versus jitter, and routing strategies informs better quality control in real-time streaming. Together, these concepts enable the development of robust, high-performing networks capable of supporting seamless multimedia experiences.

References

  1. Stallings, W. (2017). Data and Computer Communications (10th ed.). Pearson.
  2. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson.
  3. Tanenbaum, A. S., & Wetherall, D. J. (2010). Computer Networks (5th ed.). Pearson.
  4. Proakis, J. G., & Salehi, M. (2008). Digital Communications (5th ed.). McGraw-Hill.
  5. Peterson, L. L., & Davie, B. S. (2011). Computer Networks: A Systems Approach. Morgan Kaufmann.
  6. Rappaport, T. S. (2020). 5G Wireless: A Comprehensive Introduction. Prentice Hall.
  7. Holma, H., & Toskala, A. (2011). LTE for UMTS: Evolution to LTE-Advanced. Wiley.
  8. IEEE Standards Association. (2020). IEEE 802.11-2020: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
  9. Carlson, J., & Crump, S. (2015). Protocols for High-Quality Video Streaming over Wireless Networks. IEEE Communications Magazine.
  10. Marsh, J., & Sloan, M. (2019). Improving Real-time Video Streaming with Quality of Service Techniques. Journal of Network and Computer Applications.