Question: 8. Consider a data-link layer protocol that uses byte-stuffing. This protocol consists of a single, variable length, payload field. Assume that this protocol is used

 8. Consider a data-link layer protocol that uses byte-stuffing. This protocol

8. Consider a data-link layer protocol that uses byte-stuffing. This protocol consists of a single, variable length, payload field. Assume that this protocol is used over an unreliable channel that occasionally changes bytes into flag bytes. Which of the approaches below cannot be used by the sender to let the receiver detect (most of) these errors? A. Adding a checksum to the end of every message. B. Adding a Cyclic Redundancy Check (CRC) to the end of every message. C. Adding escape bytes within every message. D. Adding the frame-length to the start of every message

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!