Professional Documents
Culture Documents
Latest Paper of cs601 2018
Latest Paper of cs601 2018
Fall 2018
CS601 - Data Communication
Center: VFSD01
Q No. 9 10 11 12 13 14 15 16
Q No. 17 18 19 20 21 22 23 24
Q No. 25 26 27 28 29 30 31 32
Q No. 33 34 35 36 37 38 39 40
Q No. 41 42 43 44 45 46 47 48
Q No. 49 50
A simple communication model consist of five components i.e. Source, transmitter, Receiver and
destination. __________ is missing component.
Selected answer Transceiver system
► Information system
► TCP system
► Transmission Medium
Television broadcast where user can only view the information sent in form of video is example
of____________ communication.
► Full duplex
► Half duplex
► None of given
Selected answer Simplex
► 1.544 Mbps
► Line
► Scrambling
► Line and Scrambling
Selected answer Block
► Analog to digital
► Digital to digital
Selected answer Digital to analog
► Analog to analog
In Bit-oriented framing, ____________ bit pattern is used as a flag to define beginning and end
of a frame.
► (11111111)2
► (10000001)2
Selected answer Single
► (01111110)2
At the data-link layer, ___________ protocol is designed to control neither flow nor error.
Selected answer Stop-and-Wait
► Go-Back-N
► Selective-Repeat
► Simple
The PAP is a simple authentication procedure with a two step process, which uses _______
type(s) of packet(s) for authentication.
► Only one
Selected answer Two
► Four
► Three
ALOHA was designed for __________but is also applicable for shared medium.
The Hamming distance between two pair of words (101101, 001011) is ________.
►1
►4
►6
Selected answer 3
_________codes are special linear block codes in which, rotation of a codeword results in
another codeword.
► Checksum
► Parity-check
► Syndrome
Selected answer Cyclic
In ___________ error detection, all the datawords are added using 1's complement to calculate a
sum, which is then complemented and transmitted with the datawords.
► Chunk Interleaving
► Parity-check
► Checksum
The ___________ layer is responsible for the creation and delivery of a frame to another node,
along the link.
► Application
Selected answer Network
► Physical
► Data-link
The data link control sublayer deals with all issues common to ______________.
Selected answer Point-to-point links only
► Broadcast links only
► MAC sublayer
► Both point-to-point and broadcast links
The original Ethernet technology with the data rate of 100 Mbps is called ________ Ethernet.
► Standard
The Ethernet LAN was developed in the 1970s, since then, it has gone through___________
generations.
► Five
► Six
► Four
Unipolar encoding scheme is not supported over the medium having ______________.
► The capability of handling DC component
► High speed
A property of a signal where it is being received by receiver after reflection from different
intermediate objects (Building, iron polls, walls) is called ____________
► Attenuation
Selected answer Interference
► Error
► Multipath Propagation
In IEEE 802.11, communication between two stations in two different BSSs usually occurs via
two _______.
► BSSs
Selected answer ESSs
► None of the given
► APs
Question No: 40 ( Marks: 1 ) - Please choose one
Name the three wave propagation methods for communication through unguided media.
Answer
The three wave propagation methods for communication through unguided media.
1 cell phone
2 mail
3 internet
Answer
If we want to be able to detect 4-bit errors, what should be the minimum Hamming distance?
Answer with the help of formula.
Answer
Give the names for the following two carrier in telephone system under LATA;
What is the name of carrier that handles Intra-LATA?
What is the name of carrier that handles Inter-LATA?
Answer
the names for the following two carrier in telephone system under LATA;
LOCAL ACESS TRANSPORT AREA
the name of carrier that handles Intra-LATA is the external acess transport area
the name of carrier that handles Inter-LATA internel acess transport area
Give the name of the characteristic in which signal gets degraded during its propagation and full strength
of signal is not received at receiver.
Answer
The name of the characteristic in which signal gets degraded during its propagation and full strength of
signal is not received at receiver. is a signal where it is being received by receiver after reflection
from different intermediate objects (Building, iron polls, walls) is called Interference
Two stations (M and N) are connected through a circuit switched network. If station M wants to
transfer some data to station N; a dedicated link is used to transmit data. Write the names of five
stages involved in this process for successful communication.
Answer
Two stations (M and N) are connected through a circuit switched network.The station M wants
to transfer some data to station N and dedicated link is used to transmit data to five stages
involved in this process for successful communication.
Radio
mobile LAN
WAN
INTERNET
FAX
MASSAGE
Answer
LAN
WAN
WAN, we search all the data into the wan when we use the browser and we find some data into
the internet world we fined easily everything just open and serch the problem that is why we
used the WAN
LAN in the lan when the router conntect with the wie into the lan then the system is start to
working and we use the LAN
A communication system is encoding 2-bit datawords into 3-bit codewords for error detection
using even-parity encoding.
2- If communication system suffers a 3-bit burst error and all the bits are damaged; what
will be the codeword received at the other end?
3- With the effect of burst error; will this codeword be accepted or rejected by the
receiver? Mention the reason.
Answer
A communication system is encoding 2-bit datawords into 3-bit codewords for error detection
using even-parity encoding.
If dataword is ‘01’, what will be the codeword for transmission?
The codeword for transmission is 0
If communication system suffers a 3-bit burst error and all the bits are damaged; what will be the
codeword received at the other end
the codeword received at the other end is error
With the effect of burst error; will this codeword be accepted or rejected by the receiver
teh codeword is rejected by the receiver because the codeword is effect of burst error thats why
Telephone system works in multiple small metropolitan area which are called LATA, answer the
questions given below;
4- Which name is given to services that are offered by telephone companies inside a LATA?
5- And, What name shall be given to the services that are offered between LATAs?
Answer
Telephone system works in multiple small metropolitan area which are called LATA, answer the
questions given below;
Which name is given to services that are offered by telephone companies inside a LATA
The name of the giving the companies is telecom local acess transpot area
And, the name shall be given to the services that are offered between LATAs is the Aloha,
CSMA/CD and CSMA/CA
Reservation, Polling and Token
FDMA, TDMA, and CDMA
How does CSMA/CD technique get impacted in wireless LAN by the following factors?
6- Power at a host
7- Hidden station
Answer
How does CSMA/CD technique get impacted in wireless LAN by the following factors?
Power at a host
The power at the host is the router openly in the room and the area coverd the signel in the area
and the user use easily some of the person us the wire to the router The PAP is a simple
authentication procedure with a two step process, which uses Two type(s) of packet(s) for
authentication.
Cyclic codes are special linear block codes in which, rotation of a codeword results in another
codeword.
Hidden station
The hiden station are useing the LAN it is dificult to use the LAN becaus ethe power of the
station is hidden and the propber workig but if the problem create then it was a dificult to use In
CRC error detection, all the datawords are added using 1's complement to calculate a sum, which
is then complemented and transmitted with the datawords.
The Network layer is responsible for the creation and delivery of a frame to another node, along
the link.