Professional Documents
Culture Documents
Latest Paper of cs601 2018
Latest Paper of cs601 2018
Fall 2018
CS601 - Data Communication
A simple communication model consist of five components i.e. Source, transmitter, Receiver and
destination. __________ is missing component.
► Transceiver system
► Information system
► TCP system
Selected answer Transmission Medium
When a message is sent from source to destination between two users it is being encrypted. This
encrypted message is called ___________
► Protocol
Selected answer Message
► Plaintext
► Cipher text
Removing header and trailer at received side in TCP/IP model is known as ____________
In ____________________, a special byte is added to the data section of the frame when there is
a character with the same pattern as the flag.
► Bit stuffing
Selected answer Error detection
► Error correction
► Character stuffing
Question No: 10 ( Marks: 1 ) - Please choose one
At the data-link layer, _____________ means creating a balance between the frames sent by a
node and the frames that can be handled by the next node.
► Error control
► Framing
Selected answer Modulation
► Flow control
Burst error normally occurs when the duration of noise signal is _________________ than the
bit duration.
► Shorter
Selected answer Equal to or longer
► Equal to or shorter
► Longer
To detect errors, the receiver checks the relationships between the two sets of bits:
_________________.
Selected answer Transmitted bits and received bits
► Transmitted bits and transmitted redundant bits
► None of the given
► Received data bits and received redundant bits
The Hamming distance between two pair of words (101101, 001011) is ________.
►1
►3
For FEC using XOR operation, we divide a packet into N chunks, and need to send ________
chunks to the receiver side.
Selected answer N
► 2N
► (N+1)/2
► N+1
The data-link layer of the source host needs only to encapsulate data, but each intermediate node
_________________ data.
Selected answer Also needs to encapsulate
► Only needs to decapsulate
► Needs either to encapsulate or decapsulate
► Needs to both encapsulate and decapsulate
► -1
► +1
►2
Selected answer 0
We divide time into slots of Tfr (frame transmission time) and force the station to send only at
the __________of the slot.
Selected answer End
► Middle
► Anywhere
► Beginning NOT SURE
The original Ethernet technology with the data rate of 10 Mbps is called ________ Ethernet.
The original Ethernet technology with the data rate of 100 Mbps is called ________ Ethernet.
Selected answer Standard
► Gigabit
► 10 Gigabit
► Fast
► Fast
► Gigabit
► 10 Gigabit
Question No: 32 ( Marks: 1 ) - Please choose one
Unipolar encoding scheme is not supported over the medium having ______________.
► The capability of handling DC component
► High speed
In context of control signaling network, what does STP stand for ______
► Signaling transmission point
► Signal transportation procedure
► Signal transfer point
A property of a signal where it is being received by receiver after reflection from different
intermediate objects (Building, iron polls, walls) is called ____________
Selected answer Attenuation
► Interference
► Error
► Multipath Propagation
In IEEE 802.11, communication between two stations in two different BSSs usually occurs via
two _______.
► BSSs
Selected answer ESSs
► None of the given
► APs
In IEEE 802.11, a station with ________mobility can move from one BSS to another, but the
movement is confined inside one ESS.
► None of the choices are correct
► No-transition
► ESS-transition
Selected answer BSS-transition
Question No: 40 ( Marks: 1 ) - Please choose one
The Address Resolution Protocol (ARP) is one of the auxiliary protocols, which maps
_________ address to ____________ address.
► A logical-link, an IP
► A physical, a MAC
► An IP, a logical-link
Coaxial cable designs are categorized by their Radio government (RG) ratings; you are required
to match the following RG ratings with their respective uses.
Category Use
RG-11 Used for TV
RG-59 Thin Ethernet
RG-58 Thick Ethernet
Answer
Category Use
RG-11 Thick Ethernet
RG-59 Used for TV
RG-58 Thin Ethernet
he three most commonly used coaxial cable types for video applications are RG59/U,
RG6/U and RG11/U. RG59/U is available with either solid copper or copper-clad-steel
centre conductor. It's suitable for basic analog TV antenna feeds in residential
applications and for basic CCTV systems over short cable runs.
•Security
Answer
Benefits of a layer 3 switch
1. Support routing between virtual LANs.
2. Improve fault isolation.
3. Simplify security management.
4. Reduce broadcast traffic volumes.
5. Ease the configuration process for VLANs, as a separate router isn't required between
each VLAN.
6. Separate routing tables, and as a result, segregate traffic better.
Blank Data
Question No: 43 ( Marks: 3 )
In a communication system, a codeword is generated by adding two redundant bits to each 8-bit
dataword. Find the following:
Answer
Q10-4. In a codeword, we add two redundant bits to each 8-bit data word. Find the number of
a.valid: 2^8 vaild codes b.invalid: 2^10 – 2^8 invalid code
The Data Link Control (DLC) layer is one of the sub-layers of Data-link layer. List the names of
services provided by the DLC layer.
Answer
Normally a telephone network is divided into several levels of switching offices, mention their
names.
Answer
An analog signal carries 6 bits in each signal element. If 1500 signal elements are sent per
second, find the Baud Rate and Bit Rate ?
An analog signal carries 4 bits per signal element. If 1000 signal elements are sent per second,
find the bit rate.
Solution In this case, r = 4, S = 1000, and N is unknown. We can find the value of
Answer
Baud rate is the number of signal elements per second. In the analog transmission
of digital data, the baud rate is less than or equal to the bit rate. Note Page 6 5.6 An
analog signal carries 4 bits per signal element.
Blank Data
Question No: 47 ( Marks: 5 )
Answer
The three popular controlled-access methods are as follows.
Reservation: In the reservation method, a station needs to make a reservation before
sending data. ...
Polling: Polling works with topologies in which one device is designated as a primary
station and the other devices are secondary stations. ...
Token Passing:
Not Attempted
Question No: 48 ( Marks: 5 )
Show how the address 47:20:1B:2E:08:EE is sent out online by filling the spaces in figure given
blow.
Hexadecimal ____ ____ ___ ___ ___ ___
Answer
A communication system is encoding 2-bit datawords into 3-bit codewords for error detection
using even-parity encoding.
b) If communication system suffers a 3-bit burst error and all the bits are damaged; what
will be the codeword received at the other end?
c) With the effect of burst error; will this codeword be accepted or rejected by the
receiver? Mention the reason.
Answer
Consider a scenario where five computers are connected to each other in a wired LAN through switch.
How can this wired LAN be converted to a wireless LAN architecture?
Answer
Accordimg to given scenario if five computers are connected to each other in a wired LAN
through switch .Wired LAN can be connected through a router and all computers are connected
trough it because LAN is a local area network.