Flow control: Flow control is meant only for the transmission of data from sender to receiver. For Flow control there are two approaches : Feedback-based Flow Control and Rate-based Flow Control. It prevents the loss of data and avoid over running of receive buffers. Example of Flow Control techniquRead more
Flow control:
Flow control is meant only for the transmission of data from sender to receiver.
For Flow control there are two approaches : Feedback-based Flow Control and Rate-based Flow Control.
It prevents the loss of data and avoid over running of receive buffers.
Example of Flow Control techniques are : Stop&Wait Protocol and Sliding Window Protocol.
Error control:
Error control is meant for the transmission of error free data from sender to receiver.
To detect error in data, the approaches are : Checksum, Cyclic Redundancy Check and Parity Checking.
To correct error in data, the approaches are : Hamming code, Binary Convolution codes, Reed-Solomon code, Low-Density Parity Check codes.
It is used to detect and correct the error occurred in the code.
Example of Error Control techniques are : Stop&Wait ARQ and Sliding Window ARQ.
Using AI to detect fraud has aided businesses in improving internal security and simplifying corporate operations. Artificial Intelligence has therefore emerged as a significant tool for avoiding financial crimes due to its increased efficiency. AI can be used to analyze huge numbers of transactionsRead more
Using AI to detect fraud has aided businesses in improving internal security and simplifying corporate operations. Artificial Intelligence has therefore emerged as a significant tool for avoiding financial crimes due to its increased efficiency.
AI can be used to analyze huge numbers of transactions in order to uncover fraud trends, which can subsequently be used to detect fraud in real-time.
When fraud is suspected, AI models may be used to reject transactions altogether or flag them for further investigation, as well as rate the likelihood of fraud, allowing investigators to focus their efforts on the most promising instances.
The AI model can also offer cause codes for the transaction being flagged. These reason codes direct the investigator as to where they should seek to find the faults and aid to speed up the investigation.
AI may also learn from investigators when they evaluate and clear questionable transactions, reinforcing the AI model’s knowledge and avoiding trends that don’t lead to fraud.
Machine learning is a term that describes analytic approaches that “learn” patterns in datasets without the assistance of a human analyst.
AI is a wide term that refers to the use of particular types of analytics to complete tasks ranging from driving a car to, yep, detecting a fraudulent transaction.
Consider machine learning to be a method of creating analytic models, and AI to be the application of those models.
Because the approaches enable the automatic finding of patterns across huge quantities of streaming transactions, they are very successful in fraud prevention and detection
Go through below link and check Q4: https://sikshapath.in/question/if-the-original-data-to-send-is-10011001-11100010-00100100-10000100-how-would-it-be-possible-to-detect-error-using-3/
Q1//Differentiate between Error control and flow control mechanism. Answer: Flow control: Flow control is meant only for the transmission of data from sender to receiver. For Flow control there are two approaches : Feedback-based Flow Control and Rate-based Flow Control. It prevents the loss of dataRead more
Q1//Differentiate between Error control and flow control mechanism.
Answer:
Flow control:
Flow control is meant only for the transmission of data from sender to receiver.
For Flow control there are two approaches : Feedback-based Flow Control and Rate-based Flow Control.
It prevents the loss of data and avoid over running of receive buffers.
Example of Flow Control techniques are : Stop&Wait Protocol and Sliding Window Protocol.
Error control:
Error control is meant for the transmission of error free data from sender to receiver.
To detect error in data, the approaches are : Checksum, Cyclic Redundancy Check and Parity Checking.
To correct error in data, the approaches are : Hamming code, Binary Convolution codes, Reed-Solomon code, Low-Density Parity Check codes.
It is used to detect and correct the error occurred in the code.
Example of Error Control techniques are : Stop&Wait ARQ and Sliding Window ARQ.
Q2//Elaborate sliding window flow control mechanism with example. Also differentiate it with stop and wait method.
Answer: Sliding window protocols are data link layer protocols for reliable and sequential delivery of data frames. The sliding window is also used in Transmission Control Protocol.
In these protocols, the sender has a buffer called the sending window and the receiver has buffer called the receiving window. The size of the sending window determines the sequence number of the outbound frames. If the sequence number of the frames is an n-bit field, then the range of sequence numbers that can be assigned is 0 to 2𝑛−1. Consequently, the size of the sending window is 2𝑛−1. Thus in order to accommodate a sending window size of 2𝑛−1, a n-bit sequence number is chosen.
Suppose that we have sender window and receiver window each of size 4. So the sequence numbering of both the windows will be 0,1,2,3,0,1,2 and so on. The following diagram shows the positions of the windows after sending the frames and receiving acknowledgments.
#Note: Download the above pic by clicking on attachment button below.
Q//Construct an example to explain the parity check method used for error detection. Answer: Go through below link for answer. https://sikshapath.in/question/construct-an-example-to-explain-the-parity-check-method-used-for-error-detection-2/
Q//Construct an example to explain the parity check method used for error detection.
AIM: a)Shift left 8-bit number by 1 bit. b) Program to Shift Left 8-bit Number by 2 Bit
DOWNLOAD BELOW ATTACHMENT FOR ANSWER:
DOWNLOAD BELOW ATTACHMENT FOR ANSWER:
See lessDifferentiate between Error control and flow control mechanism.
Flow control: Flow control is meant only for the transmission of data from sender to receiver. For Flow control there are two approaches : Feedback-based Flow Control and Rate-based Flow Control. It prevents the loss of data and avoid over running of receive buffers. Example of Flow Control techniquRead more
Flow control:
Error control:
Using real life examples, discuss how AI can be used in detecting fraud
Using AI to detect fraud has aided businesses in improving internal security and simplifying corporate operations. Artificial Intelligence has therefore emerged as a significant tool for avoiding financial crimes due to its increased efficiency. AI can be used to analyze huge numbers of transactionsRead more
Using AI to detect fraud has aided businesses in improving internal security and simplifying corporate operations. Artificial Intelligence has therefore emerged as a significant tool for avoiding financial crimes due to its increased efficiency.
AI can be used to analyze huge numbers of transactions in order to uncover fraud trends, which can subsequently be used to detect fraud in real-time.
When fraud is suspected, AI models may be used to reject transactions altogether or flag them for further investigation, as well as rate the likelihood of fraud, allowing investigators to focus their efforts on the most promising instances.
The AI model can also offer cause codes for the transaction being flagged. These reason codes direct the investigator as to where they should seek to find the faults and aid to speed up the investigation.
AI may also learn from investigators when they evaluate and clear questionable transactions, reinforcing the AI model’s knowledge and avoiding trends that don’t lead to fraud.
Machine learning is a term that describes analytic approaches that “learn” patterns in datasets without the assistance of a human analyst.
AI is a wide term that refers to the use of particular types of analytics to complete tasks ranging from driving a car to, yep, detecting a fraudulent transaction.
Consider machine learning to be a method of creating analytic models, and AI to be the application of those models.
Because the approaches enable the automatic finding of patterns across huge quantities of streaming transactions, they are very successful in fraud prevention and detection
See lessElaborate sliding window flow control mechanism with example. Also differentiate it with stop and wait method.
Go through below link and check Q4: https://sikshapath.in/question/if-the-original-data-to-send-is-10011001-11100010-00100100-10000100-how-would-it-be-possible-to-detect-error-using-3/
Go through below link and check Q4:
See lessElaborate sliding window flow control mechanism with example. Also differentiate it with stop and wait method.
Q1//Differentiate between Error control and flow control mechanism. Answer: Flow control: Flow control is meant only for the transmission of data from sender to receiver. For Flow control there are two approaches : Feedback-based Flow Control and Rate-based Flow Control. It prevents the loss of dataRead more
Q1//Differentiate between Error control and flow control mechanism.
Answer:
Flow control:
Error control:
Q2//Elaborate sliding window flow control mechanism with example. Also differentiate it with stop and wait method.
Answer: Sliding window protocols are data link layer protocols for reliable and sequential delivery of data frames. The sliding window is also used in Transmission Control Protocol.
In these protocols, the sender has a buffer called the sending window and the receiver has buffer called the receiving window. The size of the sending window determines the sequence number of the outbound frames. If the sequence number of the frames is an n-bit field, then the range of sequence numbers that can be assigned is 0 to 2𝑛−1. Consequently, the size of the sending window is 2𝑛−1. Thus in order to accommodate a sending window size of 2𝑛−1, a n-bit sequence number is chosen.
Suppose that we have sender window and receiver window each of size 4. So the sequence numbering of both the windows will be 0,1,2,3,0,1,2 and so on. The following diagram shows the positions of the windows after sending the frames and receiving acknowledgments.
#Note: Download the above pic by clicking on attachment button below.
See lessElaborate sliding window flow control mechanism with example. Also differentiate it with stop and wait method.
Q//Construct an example to explain the parity check method used for error detection. Answer: Go through below link for answer. https://sikshapath.in/question/construct-an-example-to-explain-the-parity-check-method-used-for-error-detection-2/
Q//Construct an example to explain the parity check method used for error detection.
Answer: Go through below link for answer.
See less