CS601 Data Communication Final Term Papers Solved ...
-
Upload
khangminh22 -
Category
Documents
-
view
1 -
download
0
Transcript of CS601 Data Communication Final Term Papers Solved ...
Cs601 Solved Subjective (Mid+ Finals)
CS601 Data Communication Final Term Papers
Solved Subjective with Refrences by
Virtualians Social Network
FINAL TERM EXAMINATION SPRING 2011
What is the difference between guided and unguided media? Answer: Guided Media are those media that provide a conduit from one device to another. Guided Transmission Media uses a "cabling" system that guides the data signals along a specific path while Unguided Transmission Media consists of a means for the data signals to travel but nothing to guide them along a specific path. It passes through a vacuum; it is independent of a physical pathway.
Write Commercial advantage and characteristics of token bus Answer: (Page 232) Other LANs are not suitable for this purpose Token Bus has no commercial application in data communications Token Ring allows each station to send one frame per turn Access method: Token passing
What is the difference between FDM and TDM Answer: 1)FDM-Frequency division multiplexing where as TDM mean Time division Multiplexing. 2)In FDM spectrum is divided into frequency whereas in TDM divided into time slot. 3)FDM is used in 1st generation analog system whereas TDM is used in 2nd generation analog system.
Write the types transmission noise Answer: (Page 143) Thermal Noise: Due to random originally sent by TX Induced Noise: Comes from sources like Motors and Appliances Crosstalk: Effect of one wire on another Impulse Noise: Spike (A signal with high energy in a very short period of timepower lines,
lightening etc.
What is power bandwidth Answer: The power bandwidth of an amplifier is sometimes taken as the frequency range (or, rarely, the upper frequency limit) for which the rated power output of an amplifier can be maintained (without excessive distortion) to at least half of the full rated power. OR
Power Bandwidth Answer: (Page 67) Frequency band in which 99% of the total power resides.
What does the CRC generator append to data unit? [2] Answer: (Page 175) Appending it to the end of the data must make the resulting bit sequence exactly divisible by the divisor
How much bandwidth for modem is required in case of FSK? [2] Answer: BW required for FSK is equal to the Baud rate of the signal plus the frequency shift. Because of the limitations of voice-grade telephone lines, these modems are restricted to a bandwidth of about 3 kHz
What is even parity generator in VRC error detection mechanism? [2] Answer: (Page 172) Even parity generator counts the 1‟s and appends the parity bit (1) to the end.
What is the difference between angle of incident and angle of reflection? [2] Answer: (Page 126) The difference between them is that Angle of refraction passes from less dense to denser medium whereas angle of incidence passes from more dense to less dense medium.
What is daisy chaining in 1Base 5 star Lan? [2] Answer: (Page 229) Slower speed in star lan can be increase by the use of DAISY CHAINING.
What is the responsibility of Application layer? [3] Answer: Page 53
Enables the user either human or software to access the network It provides user interface and support for the services such as Electronic mail, Remote File access and Transfer, Shared Database Management and other services
What is critical angle? Answer: (Page 127) We have a beam of light moving from a more dense to a less dense medium. We gradually increase the angle of incidence measured from vertical axis. As angle of incidence increases, so does the angle of refraction. The angle at which refracted line lies on the horizontal axis is called Critical Angle
Hamming code-Redundancy bit (5 marks Q) Answer: (Page 181) Redundancy Bits (r) r must be able to indicate at least m+r+1 states m+r+1 states must be discoverable by r bits Therefore, 2r ≥ m+r+1
Tree topology advantages (3 or 5 marks) Answer: (Page 31) Because of Secondary Hub, More devices can be attached to a Central Hub and therefore increase the distance a signal can travel Enables Differentiated Services: Allows to prioritize communication, e.g. computers attached to one secondary hub can be given priority over others Therefore, TIME SENSITIVE data will not have to wait for access to the network Rest of the advantages are almost the same as STAR
Q #41: Whether VRC error detection method is used for single bit error or burst error. (2) Answer: (Page 173) VRC can detect all single bit errors Can also detect Burst errors as long as the total number of bits changed is ODD
www.virtualians.pk
Q # 42: Which modem was first developed commercially in 1970? (2) Answer: (Page 114) Bell modems –First commercial modems by Bell Telephone Co. –Developed in early 1970s
Q # 45: Consider a major telecom company using RZ encoding for its signals conversion. What will be the major problem faced by using such type of encoding? (2) Answer: (Page 75) Any time, data contains long strings of 1’s or 0’s, Rx can loose its timing. The only problem with RZ encoding is that it requires two signal changes to encode one bit and therefore occupies more BANDWIDTH
Q # 47: Geosynchronous Satellite? (3) Answer: (Page 139) Line of sight propagation requires the sending and receiving antennas must be locked into each other To ensure continuous communication, satellites must move with the same speed as earth. So that they seem fixes w.r.t earth These satellites are called Geosynchronous Satellites
FINAL TERM EXAMINATION 2011
Question#1 What are the Asynchronous protocols in data communication layer? ………….Marks (10) Answer: (Page 206) Asynchronous protocols Treat each character in a Bit stream independently. Employed mainly in
Modems. Transmission does not require timing coordination; Timing is done by using extra bits
Different Asynchronous Protocols
XMODEM oThe first field is a One Byte start of header (SOH) field oThe second field is a two-byte Header. –The first header byte , the Sequence number carries the Frame number –The second header byte is used to check the validity of the sequence number
o o
The fixed data field holds 128 bytes of data The last field CRC checks for errors in the data field only
YMODEM YMODEM is similar to X-MODEM with only the following major differences: o1024-Byte data unit oTwo CANs to abort Transmission oITU-T CRC-16 for Error Checking oMultiple files can be sent simultaneously
ZMODEM : Newer Protocol Combines features of XMODEM and YMODEM.
BLAST oBlocked Asynchronous Transmission oMore powerful than XMODEM oFull Duplex oSliding Window Flow Control oAllows transfer of Data and Binary Files
KERMIT oDesigned at Columbia University oMost Widely used Asynchronous Protocol oFile Transfer protocol is similar in operation to XMODEM, with sender waiting for an NAK before it starts TX oKermit allows the transmission of control characters as Text
www.virtualians.pk
Question#2 What is Frequency division multiplexing ?.......Marks (5) Answer:(Page 149) Frequency division multiplexing (FDM) oAn analog technique that can be applied when BW of the link is greater than the combined BW of the signals to be TX oSignals generated by each sending device modulate difference carrier frequencies oThese modulated signals are then combined into a single Composite signal that can be transported by the link oCarrier frequencies are separated by enough BW to accommodate the modulated signal oThese BW ranges are the channels through which the various signals travel
Question#4 What is stop and wait ARQ in error control ?....Marks (3) Answer: Page 197 Stop-and-Wait is an extended form of flow control to include retransmission of data in case of Lost or Damaged frames. There are four main features added in it. 1.Sending device keeps a copy of the last frame transmitted until it receives the ACK for that frame. 2.Both data and ACK frames are numbered 0 and 1 alternately. 3.A data 0 frame is acknowledged by a ACK 1 frame indicating that the receiver has received data 0 and is now expecting data 1 . 4. For retransmission to work, 4 features are added to the basic flow control mechanism.
Question#5 What is Interleaving ?........Marks (3) Answer: Page 153 Synchronous TDM is considered as a very fast rotating switch. When this switch opens in front of a device, the device has the opportunity to send a specific amount of data on to the path. The switch moves from device to device at a constant rate and in a fixed order. This process is called INTERLEAVING. Interleaving can be done by BITS, BYTES or by any other DATA UNIT
Question#6 What is DSU in terms of digital services?.........Marks (3) Answer: Page 163 DSU (Digital service unit) changes the rate of digital data created by the subscriber’s device to 56 Kbps
www.virtualians.pk Prepared by: Irfan Khan
and encodes it in the format used by service provider. It used in dialing process and is more expensive than MODEM. But it has better speed, better quality and less susceptibility to noise.
Question#7 Which architecture of Ethernet developed by ITU_T and ANSI?........... Marks (2) Answer: 236 FDDI (Fiber Distributed Data Interface)architecture of Ethernet developed by ITU_T and ANSI.
Question#8 What is a spike in noise term?.........Marks (2) Answer:143 Spike is a signal with high energy in a very short period of time that comes from power lines, lightening etc,
Question#9 Answer: Page 172 What is even parity generator in VRC error detection mechanism?...........Marks (2) Even parity generator counts the 1’s and appends the parity bit (1) to the end.
Question#10 Compare line discipline methods ENQ/ACK and Poll/ Select? Answer: Page 188-189 =>ENQ/ACK coordinates which device may start a transmission and whether or not the intended recipient is ready and enabled. => Using ENQ/ACK, a session can be initiated by either station on a link as long as both are of equal rank. => In both half-duplex and full-duplex transmission, the initiating device establishes the session. => In half duplex, the initiator then sends its data while the responder waits. The responder may take over the link when the initiator is finished or has requested a response. => In full duplex, both devices can transmit simultaneously once the session has been established. POLL/SELECT: => The poll/select method of line discipline works with topologies where one device is designated as a primary station and the other devices are secondary stations. => Multipoint systems must coordinate several nodes, not just two. => The primary device controls the link and the secondary device follow sits instruction It is up to the primary to determine which device is allowed to use the channel data given time
Why addressing is required in Poll / Select method and not required in ENQ/ACK method?3
www.virtualians.pk Prepared by: Irfan Khan
Answer: (Page 190) Addressing is required in Poll / Select method as it is a not point-to-point configuration, For the primary device in a multipoint topology to be able to identify and communicate with a specific secondary device, there must be some addressing, while ENQ/ACK method is a point-to-point method and for point-to-point configuration, there is no need for addressing.
What do you know about ITU-T Modems?3 Answer:(Page 114) ITU-T modem : V-series: Today’s most popular modem standards Bell modem compatible: V.21/22/23/26/27/29
Following abbreviations stands for what?3 Answer: (Page 224) ARP…….…. (Address Resolution Protocol) RARP……... (Reverse Address Resolution Protocol) ICMP ……… (Internet Control Message Protocol)
Write names of Link Access Protocols developed by ITU-T?3 Answer: (Page 211) LAPs: LAPB, LAPD, LAPM, LAPZ etc. all based on HDLC
Write the names of different types of noise in the medium?3 Answer:(Page 144) Thermal Noise Induced Noise Crosstalk Impulse Noise
Write down some disadvantages of star topology.3 Answer: (Page 30) Although Cabling required is far less than Mesh Still each node must be connected to a Hub , so Cabling is still much more
What are the two major classes of synchronous protocols at data link layer?2 Answer: (Page 206) Character – Oriented Protocols Bit – Oriented Protocols
Whether Hamming code is the technique used for error detection or error correction?2 Answer: (Page 181)
www.virtualians.pk Prepared by: Irfan Khan
Hamming code is the technique used for error correction
Define Multiplexing? What is its advantage?2 Answer: (Page 147) Set of techniques that allows the simultaneous transmission of multiple signals across a single data link It allows multiple users to share total capacity of a Transmission Medium.
What is the purpose of dual ring?2 Answer: (Page 34) Unidirectional traffic movement is overcome by dual ring technology.
Which modem was first developed commercially in 1970?2 Answer: (Page 114) Bell modems
Write any two functions of physical layer?2 Answer: (Page 45)
It defines characteristics of Interface between device and transmission Medium It also defines the type of transmission medium Physical Layer is also concerned with Line Configuration
FINAL TERM EXAMINATION 2011
Which one has more overhead, a repeater or a bridge? Explain your answer. [3] Answer: A bridge has more overhead than a repeater. A bridge processes the packet at two layers; a repeater processes a frame at only one layer. A bridge needs to search a table and find the forwarding port as well as to regenerate the signal; a repeater only regenerates the signal. In other words, a bridge is also a repeater (and more); a repeater is not a bridge
Define high frequency [HF] and super high frequency [SHF], which devices uses these frequencies [3] Answer: Page 135 and 136
www.virtualians.pk Prepared by: Irfan Khan
High frequency. HF uses ionospheric propagation. These frequencies move into the ionosphere where the density difference reflects them back on earth. It is used for Citizen’s Band Radio, International Broadcasting, Military Communication, Telephone, Telegraph and Fax
Super high frequency. SHF waves are TX using mostly line-of-sight and some Space propagation. It is used for Terrestrial and Satellite Microwave and Radar Communication devices.
Write all steps of checksum method. [3] Answer: (Page 179) o The sender subdivides data units into equal segments of ‘n’ bits(16 bits) o These segments are added together using one’s complement o The total (sum) is then complemented and appended to the end of the original data unit as redundancy bits called CHECKSUM o The extended data unit is transmitted across the network o The receiver subdivides data unit as above and adds all segments together and complement the result o If the intended data unit is intact, total value found by adding the data segments and the checksum field should be zero o If the result is not zero, the packet contains an error & the receiver rejects it
Differentiate internet and the internet? [3] Answer: (Page 240) INTERNET oAn internet is a generic term used to mean an interconnection of individual networks oTo create an internet, we need networking devices called routers and gateways oAn internet is different from the Internet oInternet is the name of a specific worldwide network
What is the differences in between bit oriented and character oriented protocols [5] Answer: (Page 206) Character – Oriented Protocols oAlso called Byte- Oriented Protocol oThese protocols interpret a transmission frame or packet as a succession of characters, each usually composed of one byte oAll control information is in the form of an existing character encoding system
Bit – Oriented Protocols
www.virtualians.pk Prepared by: Irfan Khan
oCharacter –Oriented Protocols are not as efficient as bit – oriented protocols and are seldom used oThey are easy to comprehend and employ the same logic as bit-oriented protocols oTheir study will provide the basis for studying the other data link layer protocols oIBN’s BSC is the best known character oriented protocol
Question#1
FINAL TERM EXAMINATION 2011
What is the formula to calculate the number of redundancy bits required to correct a bit error in a given number of data bits? [2] Answer: Messages(frames) consist of m data (message) bits, yielding an n=(m+r)-bit codeword.
Question#2 What is R G rating of coaxial cable? Answer:-(Page 126) Different coaxial cable designs are categorized by their Radio government ( RG ) ratings Each cable defined by RG rating is adapted for a specialized function: RG-8 •Used in Thick Ethernet RG-9 •Used in Thick Ethernet RG-11 •Used in Thick Ethernet RG-58 •Used in Thin Ethernet RG-59 •Used for TV
Question#3 What are the advantages of thin Ethernet? Answer:(Page 228) The advantages of thin Ethernet are: 1.reduced cost 2.ease of installation Because the cable is lighter weight and more flexible than that used in Thick net
www.virtualians.pk Prepared by: Irfan Khan
Question#4 What is the difference between a unicast, multicast, and broadcast address? [3] Answer: Broadcast: transmitting a packet that will be received by every device on the network Unicast: the sending of information packets to a single destination Multicast: delivery of information to a group of destinations. Question#5 T lines are designed for Digital data how they can be used for Analog Transmission? Answer:(Page 166) o DS-1 requires 8 Kbps of overhead o To understand this overhead, let’s examine format of a 24-voice channel frame o Frame used on T-1 line is usually 193 bits divided into 24 slots of 8 bits each + 1 bit for synchronization (24*8+1=193) o 24 segments are interleaved in one frame o If a T-1 carries 8000 frames, the data rate is 1.544 Mbps (193 * 8000=1.544 Mbps) which is capacity of the line
Question#6 What are the three types of Guided Media? Answer:(Page 120) 1.Coaxial cable 2.Twisted-pair cable 3.Fiber optic cable.
Question#7 Why do we need Inverse Multiplexing? [5] Answer:(Page 159) •An organization wants to send data, voice and video each of which requires a different data rate •To send voice it needs 64Kbps, •To send data, it needs 128 Kbps link •To send video it may need 1.544 Mbps link •It can lease a 1.544 Mbps line from a common carrier and only use it fully for sometime •Or it can lease several separate channels of lower data rates •Voice can be sent over any of these channels •Data & Video can be broken into smaller portions using Inverse Multiplexing and TX
Question#8 Describe method of checksum briefly? Answer:(Page 180) o The sender subdivides data units into equal segments of ‘n’ bits(16 bits) o These segments are added together using one’s complement o The total (sum) is then complemented and appended to the end of the original data unit as redundancy bits called CHECKSUM o The extended data unit is transmitted across the network
www.virtualians.pk Prepared by: Irfan Khan
o The receiver subdivides data unit as above and adds all segments together and complement the result o If the intended data unit is intact, total value found by adding the data segments and the checksum field should be zero o If the result is not zero, the packet contains an error & the receiver rejects it
Question#9 Explain Asynchronous Time Division Multiplexing in detail? Also discuss its advantages over synchronous TDM? Answer: Asynchronous time-division multiplexing (ATDM) is a method of sending information that resembles normal TDM, except that time slots are allocated as needed dynamically rather than pre-assigned to specific transmitters. ATDM is more intelligent and has better bandwidth efficiency than TDM. asynchronous time-division multiplexing comprising receive circuits (CRl/i) supplying cells received via input links, transmit circuits (CTl/j) transmitting retransmitted cells on output links, a buffer memory (MT) storing the received cells and delivering the cells to be retransmitted and a buffer memory addressing device (SMT) including a write address source (SAE) and a read address source (fsl/j).
Advantages asynchronous TDM: In asynchronous TDM, the timeslots are not fixed. They are assigned dynamically as needed. The objective would be to switch from one user to another user whenever the one user is idle, and to asynchronously time multiplex the data. With such an arrangement, each user would be granted access to the channel only when he has a message to transmit. This is known as an Asynchronous Time Division Multiplexing System (ATDM). A segment of a typical ATDM data stream is shown in Figure 2. The crucial attributes of such a multiplexing technique are: 1.An address is required for each transmitted message, and 2.Buffering is required to handle the random message arrivals.
FINAL TERM EXAMINATION 2011
Question No: 31( Marks: 2 ) What is hybrid topology? Answer: Hybrid topology is a kind of topology, In which Several topologies combined in a larger topology
Question No: 32( Marks: 2 ) What is combined station of HDLC? Answer: (Page 211) A combined station is one of a set of connected peer devices programmed to behave either as a
www.virtualians.pk Prepared by: Irfan Khan
primary or as a secondary depending on the nature and the direction of the transmission.
Question No: 33( Marks: 2 ) What kind of error is undetectable by the checksum? Answer: (Page 180) Error is invisible if a bit inversion is balanced by an opposite bit inversion in the corresponding digit of another segment
Question No: 34( Marks: 2 ) What's the name of the telephone service in which there is no need of dialing? Answer: (Page 161)
In Analog Leased Service there is no need of dialing
Question No: 35( Marks: 3 ) How Bit Rate & Baud rate are related? Answer: (Page 85) Bit rate equals the baud rate times the no. of bits represented by each signal unit. The baud rate equals the bit rate divided by the no. of bits represented by each signal shift. Bit rate is always greater than or equal to Baud rate
Question No: 36( Marks: 3 ) Following abbreviations stands for what? Answer: (Page244) 1.ARP: Address Resolution Protocol 2.RARP: Reverse Address Resolution Protocol 3.ICMP: Internet Control Message Protocol
Question No: 37( Marks: 3 ) Differentiate between Polling and Selecting. Answer: (Page 189) If the primary wants to receive data, it asks the second-arise if they have anything to send, This is called Polling If the primary wants to send data, it tells the target secondary to get ready to receive, This function is called Selecting.
Question No: 38( Marks: 3 ) T lines are designed for Digital data how they can be used for Analog Transmission? Answer: repeat
Question No: 39( Marks: 5 ) What is the difference between character oriented and bit oriented protocols? Answer: repeat
Question No: 40
www.virtualians.pk
( Marks: 5 )
Prepared by: Irfan Khan
Write down the function of Primary-Secondary communication in line discipline. Answer: (Page 189) 1.Poll method works with topologies where one device is designed as a Primary station and the other devices are Secondary stations 2.The primary device controls the link and the secondary device follow sits instruction 3.It is up to the primary to determine which device is allowed to use the channel at a given time. 4.The primary therefore is always the initiator of the a session 5.Whenever a multipoint link consists of a primary device and multiple secondary devices using a single TX line , all exchanges must be made through the primary device even when the ultimate destination is a secondary device
FINAL TERM EXAMINATION 2010
Question No: 31( Marks: 2 ) What kind of error is undetectable by the checksum? [2] Answer: Page 180 (repeated)
Question No: 32 ( Marks: 2 ) What are properties of signals? Answer: (Page 17) Capable of being propagated over TX. Medium ,Interpretable as data at the Receiver
Question No: 33( Marks: 2 ) Whether in Asynchronous or Synchronous TDM, addressing is used? Answer: (Page 158) Addressing is used only in Asynchronous TDM.
Question No: 34( Marks: 2 ) What is the basic purpose of Router? Answer: Basic purpose of Router: A router is a device that extracts the destination of a packet it receives, selects the best path to that destination, and forwards data packets to the next device along this path. They connect networks together; a LAN to a WAN for example, to access the Internet. Question No: 35( Marks: 3 ) Why we need a Null Modem? Answer: (Page 106) A null modem provide DTA –DTE interface w/o DCEs Question No: 36( Marks: 3 ) Count LRC for the following bits? 10011010 10100101
www.virtualians.pk Prepared by: Irfan Khan
Question No: 37( Marks: 3 ) What are the categories of multiplexing? Answer: Page 148 There are three catogaries of multiplxing FDM TDM Have a two other catagories Synchronous and asyrounce WDM
Question No: 38( Marks: 3 ) What are the three purposes of control frames at data link layer? Answer: (Page 209) Control frames serve 3 purposes:
Establishing Connections Maintaining Flow and Error Control during Data Transmission Terminating Connection
Question No: 39( Marks: 5 ) Compare line discipline methods ENQ/ACK and Poll/ Select? Answer: (Page 188-189) =>ENQ/ACK coordinates which device may start a transmission and whether or not the intended recipient is ready and enabled. => Using ENQ/ACK, a session can be initiated by either station on a link as long as both are of equal rank. => In both half-duplex and full-duplex transmission, the initiating device establishes the session. => In half duplex, the initiator then sends its data while the responder waits. The responder may take over the link when the initiator is finished or has requested a response. => In full duplex, both devices can transmit simultaneously once the session has been established. POLL/SELECT: => The poll/select method of line discipline works with topologies where one device is designated as a primary station and the other devices are secondary stations. => Multipoint systems must coordinate several nodes, not just two. => The primary device controls the link and the secondary device follow sits instruction It is up to the primary to determine which device is allowed to use the channel data given time
Question No: 40( Marks: 5 ) What is the difference between character oriented and bit oriented protocols? Answer: repeat
www.virtualians.pk Prepared by: Irfan Khan
FINAL TERM EXAMINATION 2010
Question No: 31( Marks: 2 ) What are the advantages of a multipoint connection over a point-to-point connection? Answer: Point-to-point connection is limited to two devices, where else more than two devices share a single link in multipoint connection. Multipoint connection can be used for fail-over and reliability.
Question No: 32( Marks: 2 ) What's the name of the telephone service in which there is no need of dialing. Answer:(Page 164) DSS (digital data service) is the telephone service in which there is no need of dialing.
Question No: 33( Marks: 2 ) Which type of frames is present in BSC frames? Answer: (Page 206)
There are two types of frames that are present in BSC. 1.Control Frames and 2.Data Frames
Question No: 34( Marks: 2 ) What methods of line discipline are used for peer to peer and primary secondary communication? Answer: (Page 187) Line discipline is done in two ways: 1.ENQ/ACK(Enquiry Acknowledgement)
This is used for peer to peer communication. 2.Poll/ Select This method is used for primary secondary communication.
Question No: 35( Marks: 3 ) How does the checksum checker know that the received data unit is undamaged? [3] Answer: (Page 179)
www.virtualians.pk Prepared by: Irfan Khan
Checksum Checker or generator: The sender subdivides data units into equal segments of ‘n’ bits(16 bits) 1.These segments are added together using one’s complement. 2.The total (sum) is then complemented and appended to the end of the original data unit as redundancy bits called CHECKSUM. 3.The extended data unit is transmitted across the network. 4.The receiver subdivides data unit and adds all segments together and complement the result. 5.If the intended data unit is intact, total value found by adding the data segments and the checksum field should be zero. 6.If the result is not zero, the packet contains an error & the receiver rejects it.
Question No: 36( Marks: 3 ) Which one has more overhead, a repeater or a bridge? Explain your answer. [3] Answer: A bridge has more overhead than a repeater. A bridge processes the packet at two layers; a repeater processes a frame at only one layer. A bridge needs to search a table and find the forwarding port as well as to regenerate the signal; a repeater only regenerates the signal. In other words, a bridge is also a repeater (and more); a repeater is not a bridge.
Question No: 37( Marks: 3 ) Write down disadvantages of Ring Topology. Answer: (Page 33) Disadvantages of Ring Topology
Unidirectional Traffic
Can be solved by using:
Question No: 38( Marks: 3 ) How parity bits are counted in VRC error detection method technique in case of odd parity generator?
www.virtualians.pk Prepared by: Irfan Khan
Question No: 39( Marks: 5 ) How are lost acknowledgment and a lost frame handled at the sender site? [5] Answer: A lost or damaged frame is handled in the same way by the receiver; when the receiver receives a damaged frame, it discards it, which essentially means the frame is lost. The receiver remains silent about a lost frame and keeps its value of R.
Question No: 40( Marks: 5 ) Explain Protocol Data Unit (PDU)? Answer: (Page 221) Protocol Data Unit (PDU) The data unit in the LLC level is called the Protocol Data unit (PDU) The PDU contains 4 fields familiar from HDLC: –A destination service access point (DSAP) –A source service access point (SSAP) –A control field –An Information field
www.virtualians.pk Prepared by: Irfan Khan
www.virtualians.pk Prepared by: Irfan Khan
CS601 Data Communication Lecture Wise Question and
Answers
For final Term Exam Preparation By
Virtualians Social Network
CS601 Data Communication Lecture no.23
what is ITU-T stand for?
ITU stands for International Telecommunication Union (ITU) and it coordinates the standards for telecommunications (T) .That why it is called ITU-T.
Is PCM is in the modem?
PCM is used to convert analog signal to digital signal. As you know, modem is modulator and demodulator for the analog signal. So, modem uses PCM for analog to digital conversion.
What is ISP and what is ISP stands for?
ISP is short for Internet Service Provider. It refers to a company or a body that provides Internet services, including personal and business access to the Internet. For example, PTCL (Pakistan Telecommunication Company Limited) is serving as an ISP in Pakistan.
What type of signal conversion required when we r talking to overseas friend ?
When two people communicate via a telephone line then this type of communication requires Analog to Analog conversion because human voice comes in Analog category of signals and typical telephone lines carry Analog signals. So, Analog to Analog conversion is required.
What are the essential elements of “Shannon’s formula” ?
www.virtualians.pk Prepared by: Irfan Khan
The essential elements of “Shannon’s formula” are: 1. Proportionality to bandwidth W 2. Signal power S 3. Noise power P 4. A logarithmic function The channel bandwidth sets a limit to how fast symbols can be transmitted over the channel. The signal to noise ratio (P/N) determines how much information each symbol can represent. The signal and noise power levels are, of course, expected to be measured at the receiver end of the channel. Thus, the power level is a function both of transmitted power and the attenuation of the signal over the transmission medium (channel).
CS601 Data Communication Lecture no.24
Is PCM is in the modem ?
PCM is used to convert analog signal to digital signal. As you know, modem is modulator and demodulator for the analog signal. So, modem uses PCM for analog to digital conversion.
Explain why we are using modem if data is to be sent by digitizing it. Let me clear, from PC digital data is converted into analog using modem, then via local loop data is sent to Switching where it is converted into Digital using PCM. Then why did not PCM used directly from PC ????
The local loop is basically provided by any telephone service provider and obviously it is analog. We use same local loop for computers which are digital. So it is necessary to convert our digital data into analog signal for transmitting the data through the local loop. That’s why we use modem in our system to convert data from digital to analog conversion.
What is FDM?
www.virtualians.pk Prepared by: Irfan Khan
FDM stands for Frequency division multiplexing .It is the process by which the total bandwidth available to the system is divided. This division is into a series of non-overlapping frequencies bands that are then assigned to each communicating source and user pair.
Define noise source? and give some example of it because it is outside the wire????
In communication, noise is an error or undesired random disturbance in a useful information signal, introduced before or after the detector. The noise is a sum of unwanted or disturbing energy from natural and sometimes man-made sources.
Noise sources:
Fluctuations of the electric current in an electrical conductor
A signal or process with a frequency spectrum that falls off steadily into the higher frequencies etc
What is male connector and what is female connector?
A male connector is a connector that is attached to a wire, cable, or a piece of hardware, having one or more exposed, unshielded terminal and constructed in such a way that it can be inserted tightly into a holder (female connector) to ensure a reliable physical and electrical connection.
The "female" connector is generally a receptacle that receives and holds the "male" connector.
Can we calculate BW by physical measurement of Cables’ metal wire diameter? 2) What is the Role of X, Gamma, Cosmic Rays in Data Communication?
Bandwidth is actually the capacity of the channel. The amount of data travels through cable in a unit time is referred to as bandwidth. The X-rays and Gamma rays have uncertain photon energy.
Gamma radiation is often used to kill living organisms, in a process called irradiation. Applications of this include sterilizing medical equipment (as an alternative to autoclaves or chemical means), removing decay-causing bacteria from many foods or preventing fruit and vegetables from sprouting to maintain freshness and flavor.
The downloading via cable modem is 36Mbps and uploading is 12Mbps and it uses QAM and QPSK technique for uploading and downloading respectively; my question is same network card is used for uploading and downloading; then why not use the same modulation for upload and download, i mean to say on the network card there will be an electronic component which is
www.virtualians.pk Prepared by: Irfan Khan
responsible to implement QAM for decoding the internet information received from the cable, and there would be another component on the network card which is implementing QPSK for upload information; why not use same technique for both upload and download.??
This term "Cable Modem" refers to a network interface card that communicates with the cable network, sending and receiving data in two slightly different ways. In the downstream direction, the digital data is modulated and then placed on a typical 6 MHz television channel, somewhere between 50 MHz and 750MHz. Currently, 64 QAM (Quadrature Amplitude Modulation) is the preferred downstream modulation technique, offering up to 27 Mbps per 6 MHz channel. This signal can be placed in a 6 MHz channel adjacent to TV signals on either side without disturbing the cable television video signals. In a two-way activated cable network, the upstream (also known as reverse path) is transmitted between 5 and 42 MHz. This tends to be a noisy environment with RF interface and impulse noise. Most cable companies use QPSK (Quadrature Phase Shift Keying) or a similar modulation scheme in the upstream direction, because QPSK is a more robust scheme than higher order modulation techniques in a noisy environment. The drawback is that QPSK is slower than QAM. For downstream and upstream different standars are used I.e Telephone cable and cable Modem that’s why different techniques are used .
DSL technology is using same telephone line which has restricted bandwidth of 4 Khz; then how using DSL modems we can have very good download speed as compared to dial-up internet connection?
DSL, which stands for Digital Subscriber Line, is a broadband communication technology designed for use on regular phone lines. It has the ability to move data over the phone lines at speeds up to 140 times speedier than the fastest analog modems available today.
Traditional phones do not utilize the full amount of the signals that are available and as a result the maximum speeds that you can get using a dial-up connection are only 128 Kbps. A DSL modem takes the analog signals and converts them into digital signals or bits.DSL provides always-on high-speed Internet access over a single dedicated telephone line; cable modems offer always-on high-speed Internet access over a shared cable television line, the bandwidth is shared among all users in a neighborhood, and will therefore vary, perhaps dramatically, as more users in a neighborhood get online at the same time. Cable modem upstream (from the home to the Internet) traffic will in many cases be slower than DSL, either because the particular cable modem is inherently slower, or because too many people in a neighborhood are trying to send or receive data at the same time.
The bandwidth of telephone line is 4 KHz, due to which maximum data rate is restricted. what are those factors which restrict this bandwidth? on the other hand fiber optic has unlimited bandwidth....how?
www.virtualians.pk Prepared by: Irfan Khan
Bandwidth is determined by the medium used and transmission speed of the networking equipment or Internet .bandwidth is used to view web pages and send data out from your computer (upload) or receive data into your computer (download).Bandwidth is therefore also proportional to the complexity of data for a given level of system performance. so the complexity of data for given system restricts the bandwidth. In digital cable and fiber-optic systems, the demand for ever-increasing data speeds outweighs the need for bandwidth conservation. this is the reason for unlimited bandwidth. In the electromagnetic radiation spectrum, there is only so much available bandwidth to go around, but in hard-wired systems, available bandwidth can be constructed without limit simply by installing more and more cables.
There are different types of TV cable available in the market as RG-7, RG-9, RG-11 and so on, is all these cables have same band width that is 750 MHz or each type has different band width?
RG(Register jack) is the standard connector used in Ethernet standard cables, like twisted pair and coaxial cable. The bandwidth they carry is around 10 Mbps to 100 Mbps, regarldless of the RG numbers, such as RG11, RG7 or RG
A LAN cable connecting a computer with HUB is example of UTP (Unshielded twisted Pair) cable or not ?
Yes commonly in network devices are attached to hub with UTP. Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks. The quality of UTP may vary from telephone- grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. Mostly purchased Category 3 or Category 5. Category 5 cable is highly recommended. A disadvantage of UTP is that it may be liable to radio and electrical frequency interference. Shielded twisted pair (STP) is suitable for environments with electrical interference.
What is Data compression?
Data compression or source coding is the process of encoding information using fewer bits (or other information-bearing units) than an unencoded representation would use, through use of specific encoding schemes.
What is Local loop?
Traditionally, the local loop was wireline in nature from customer to central office, specifically in the form of an electrical circuit (i.e., loop) provisioned as a single twisted pair in support of voice communications. Where the number of local loops was restricted, different customers
www.virtualians.pk Prepared by: Irfan Khan
could share the same loop, known as a party line. Modern implementations may include a digital loop carrier system segment or fiber optic transmission system known as fiber-in-the-loop.
that who is the owner of internet? who runs it? how does it work? what are the resources for that?
WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management over long distances.
Plz explain the difference between Hub, Modem, Router, and Switches. Plz tell me the uses of it. How does its work? Where do we use it? Plz explain. If there is possible, i want to see them. You can explain with pictures also so that i can see them.???
A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each device to talk to the others.
A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP?? Network. Routers are located at gateways, the places where two or more networks connect.
A network switch or switching hub is a computer networking device that connects network segments. In networks, a device that filters and forwards packets between LAN segments.
Short for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms.
what are the types of IP. define each.???
IP addresses are basically of two types:
1) Static IP address 2) Shared IP address
An IP Address is a 32-bit number that identifies a computer on the Internet. Every web site on the internet is found not by its domain name but by its IP address.
When someone types the address: www.xyz.com it is translated into an IP address and then the computer is directed to that IP address which is the web site.
www.virtualians.pk Prepared by: Irfan Khan
Now every single website has an IP address specifically allocated to it. If every site assigned a separate IP address then there could be a problem with running out of IP addresses so a lot of the sites on the server use a single IP address for multiple sites. Thus, using more than one site on an IP address is called a Shared IP address. If a site has its own IP address, and shares with no one else, it is called a Static IP address.
You can always access a site which has a static IP address by using its IP address alone, but you cannot access a site using a shared IP address by typing in the IP address alone because when you type in a shared IP address you arrive at the server but the server does not know which site you are looking for as you have not told it which domain name you want.
CS601 Data Communication Lecture no.25
What is thick Ethernet and thin Ethernet ? and where is it use ?
Ethernet is the most widely-installed local area network (LAN) technology / architecture. Thick Ethernet also called 10 BASE 5 and Thin Ethernet also called 10 BASE 2 are the two implementations of Ethernet using Coaxial Cables as transmission medium
What is mean by fragility??
Fragility means lacking physical or emotional strength. It also means easily breakable. It is used for the objects that are not made of strong material and the objects which require great care when handled. Fragility is one of the draw backs of Fiber Optics because Fiber Optics is made of glass which is a very fragile material. So, it cannot be used in extreme conditions where hardware portability is required.
What is HUM?
Hum can come from ground loops (cable won't help you if that's the case, but see our isolation transformer below) or, often, from EMI (electro-magnetic interference). High-energy, low- frequency noise, like the 60-cycle hum from nearby power cords, fluorescent lights, and other miscellaneous sources, is the hardest type of interference to shield against, and the best defense here is a dense and highly-conductive braid shield.
What are T connector and Terminators?
T-connector: A T-shaped splitter (one connector to two connectors). For example the BNCT is a T-shaped splitter with one female BNC to two female BNCs (BNCT-1M is one male BNC to two female BNCs)
www.virtualians.pk Prepared by: Irfan Khan
Terminator: A device attached to the end-points of a bus network or daisy-chain. The purpose of the terminator is to absorb signals so that they do not reflect back down the line. Ethernet networks require a terminator at both ends of the bus, and SCSI chains require a single terminator at the end of the chain.
CS601 Data Communication Lecture no.26
Why only VLF (3KHz ~ 30Khz) frequency is used for surface propagation; why same frequency cannot be used for e.g. space propagation?
Each frequency range is suited wart to specific layer of atmosphere and is most efficiently transmitted and received by technologies adapted to that layer. Frequency range for surface propagation (3KHz ~ 30Khz) cannot be used for extremely high frequency range of space propagation because radars and satellite communication will not take place with Low frequency band also VLF waves are propagated as surface waves through air so this frequency band is not enough for Extremely High Frequency (EHF)range of space propagation.
The frequency of FM radio is usually 87 ~ 108 MHz, which falls in VHF frequency; and we have studied that in VHF band propagation is either satellite or LOS (line of sight) but FM radio stations are broadcasted; how it is achieved? Sorry sir, i am asking the question of lecture 26 in MDB of 25;
Radio works on VHF (very high frequency) as the channels are operated in MHZ. We receive these channels on the basis of satellite signals with some impact of line of sight in it. It is broadcasted in a sense that all radio devices in the region able to receive it and listen it, as it is simplex mode of communication.
W hat is the meaning of channels in frequency?
Channel represents path of the specific network. Which are allocated different frequencies to represent different ranges of channels?
If i have a high power Radar operating at 4Ghz, and it is facing upward, then does its transmission will pass through ionosphere or not? Will my radar be able to detect satellite in space? Sir one request, first of all i also try to search for answers to my question from Uncle GOOGLE, but once i don't get my precise answer i put it on MDB. I expect specific answers from the instructor in his own words….
As far as your first query is concerned ,for radar operating at a frequency of 4GHZ the transmission is Direct wave line of sight space propagation as this is the super high frequency
www.virtualians.pk Prepared by: Irfan Khan
band. In your second query you have asked about radar detecting satellite in space ,according to IEEE standards range specified for radar detection is 8.0 to 12.0Ghz if your radar is operating at 4Ghz it will not detect satellite in space. Dear student these MDB's are replied with best possible answers that are comprehensive to get understand by students. it is also advised to you that carefully read replies of your queries and ask one query per mdb. so that you can better understand one topic at a time. if still you are not satisfied then you can ask again and we are here to best facilitate you.
Why VLF cannot pass through the ionosphere layer; whereas SHF (Super High Frequency) can pass through ionosphere layer?
The ionosphere plays a very important role in the propagation of radio waves; the E-layer of the ionosphere reflects the radio waves and enables them to travel beyond the visible horizon. The physiochemical model of the ionosphere is very complicated with a multitude of photochemical reactions going on; ions forming and recombining with the availability or scarcity of energetic photons and particles.
This already complicated model of the ionosphere is further complicated during a Sudden Ionosphere Disturbance (SID) which can be caused by a solar flare or a gamma burst. During a solar flare, the sun releases energy on the order of 1027 to 1032 ergs in the form of electro- magnetic waves, energetic particle and mass motions. Although all of this energy obviously does not reach the earth, a fraction of that does reach the earth disrupts the normal balance of ion formation and recombination in the ionosphere.
This disruption disturbs the propagation models of radio waves transmitted through the ionosphere. This disturbance is responsible for distorted waves which can be problematic for the receiver.
During a solar flare, a VLF wave transmitted through the ionosphere shows a sharp rise in intensity. This intensity of the VLF wave rises because the highly ionized D-layer reflects the VLF wave instead of the E-layer. The VLF no longer has to travel through the partially ionized D-layer, while losing its energy, and travel up to the E layer to be reflected.
Hat is the frequency band of mobile phone transmission? Is it a broadcast transmission; if i am in direct LOS(line of Sight) of mobile tower, then i will receive transmission directly; if i am not in LOS then the mobile transmission will be received after reflection from Ionosphere layer? am i correct?
Mobile system which is termed as GSM uses different frequency bands i.e. 900, 1800, 1900. GSM-900 uses 890–915 MHz to send information from the mobile station to the base station (uplink) and 935–960 MHz for the other direction (downlink), providing 124 RF channels
www.virtualians.pk Prepared by: Irfan Khan
(channel numbers 1 to 124) spaced at 200 kHz. Duplex spacing of 45 MHz is used. Guard bands 100 kHz wide are placed at either end of the range of frequencies.GSM-1800 uses 1710–1785 MHz to send information from the mobile station to the base transceiver station (uplink) and 1805–1880 MHz for the other direction (downlink), providing 374 channels (channel numbers 512 to 885). Duplex spacing is 95 MHz GSM-1800 is also called DCS (Digital Cellular Service) in the United Kingdom, while being called PCS in Hong Kong. Line of sight communication is in the VHF and higher frequencies of the RF spectrum where the wavelength is too short to pass over structures and hills, the transmitter and receiver antennas must be in line. In mobile communication there is only one way which is broadcast when messages regarding services from operators to multiple users are broadcasted.
AM radio band is usually in VLF or LF band (in KHz) does that mean if i install my own high- powered radio station at Islamabad which operates in VLF or LF frequency band; then its transmission can be received by a person sitting in JAPAN; am i correct?
Yes, it is receive anywhere around the globe, if frequency is permitted by that region.
Very high frequency (VHF) is the radio frequency range from 30 MHz to 300 MHz Frequencies immediately below VHF are denoted High frequency (HF), and the next higher frequencies are known as Ultra high frequency (UHF). The frequency allocation is done by ITU.
Can you kindly give us some daily life example of ionosphere propagation?
The ionosphere affects modern technologies such as civilian and military communications, navigation systems and surveillance systems, etc. For many communication and navigation systems, this arises because the systems use signals transmitted to and from satellites, which must therefore pass through the ionosphere. For the most reliable communication and navigation it is necessary to correct the signals for effects imposed by the ionosphere.
The frequency of FM radio is usually 87 ~ 108 MHz, which falls in VHF frequency; and we have studied that in VHF band propagation is either satellite or LOS (line of sight) but FM radio stations are broadcasted; how it is achieved? Sorry sir, i am asking the question of lecture 26 in MDB of 25;
Radio works on VHF (very high frequency) as the channels are operated in MHZ. We receive these channels on the basis of satellite signals with some impact of line of sight in it. It is broadcasted in a sense that all radio devices in the region able to receive it and listen it, as it is simplex mode of communication.
www.virtualians.pk Prepared by: Irfan Khan
The capability of modems to support 2 wire or 4 wire is it related to telephone network, does it mean that in case of 4-wires i need to hire 02 telephone lines; one to transmission and another for receiving for full duplex mode?
Yes, In case of four-wire (4W) line , a pair of two-wire (2W) lines will be used, one for transmitting and one for receiving, in which the signals in the two directions are to be kept totally separate.
What is MTSO?
MTSO stands for Mobile Telephone Switching Office. The MTSO is the switching office that connects all of the individual cell towers to the Central Office (CO).
The MTSO is responsible for monitoring the relative signal strength of your cellular phone as reported by each of the cell towers, and switching your conversation to the cell tower which will give you the best possible reception.
What is “BAND”?
A band is a small section of the spectrum of radio communication frequencies, in which channels are usually used or set aside for the same purpose.
CS601 Data Communication Lecture no.27
What is NGN?
Next-generation network (NGN) is a broad term used to describe key architectural evolutions in telecommunication core and access networks.
As it will be more advance network, so it will use the guided and unguided media
www.virtualians.pk Prepared by: Irfan Khan
What is frequency band?
In telecommunication, a band sometimes called a frequency band is a specific range of frequencies in the radio frequency (RF) spectrum, which is divided among ranges from very low frequencies (elf) to extremely high frequencies (elf). Each band has a defined upper and lower frequency limit.
How can calculate Attenuation in fiber optics?
As we know that Attenuation means any reduction in the strength of a signal. So, imagine a signal travels through a transmission medium and its power is reduced to half. Suppose its original strength or power (P1) is 1 which reduces to its half 0.5 , represented by P2. By putting these values in the formula we can calculate or measure Attenuation.
dB= 10 x Log10 (P2/P1)
dB= 10 x Log10 (0.5 / 1)
dB=10 x Log10 (0.5)
What is FOCUS?
Every line parallel to the line of symmetry (line of sight) reflects off the curve at an angle such that they intersect in a common point called FOCUS.
CS601 Data Communication Lecture no.28
What are Transmission impairments?
Analog signal consist of varying a voltage with time to represent an information steam. If the transmission media were perfectly, the receiver could receive exactly the same signal that the transmitter sent. But communication lines are usually not perfect, so they receive signal is not the same as the transmitted signal. For digital data this difference can lead to errors. Transmission lines suffers from three major problems
1. Attenuation 2. Delay distortion 3. Noise
www.virtualians.pk Prepared by: Irfan Khan
What is Los signal?
Line of sight signal (los)los signal is the signal traveling directly following the straight path from transmitting antenna to the receiving antenna without any obstacle in its path. Los signal is also referred to as direct signal or direct wave.
Explain the Concept of line of sight?
Los (line of sight) means something aligned or in the same direction with something. If we talk about microwave's line of sight, it refers to the tower or a repeater which regenerates the signal because microwave needs to have some relay station, in order to avoid signal loss and it must be in line with the one relay station to the other, so to avoid signal loss.
What is Attenuation?
Attenuation is the type of impairment in which signal loses its energy while travelling. It happens when avoiding resistance, the energy of the signal is utilized in breaking the resistance and because of this, attenuation occurs.
What is Distortion?
Distortion is another type of impairment in which signal becomes spitted and lost. It happens in the composite signal, when two or more signals are combined to be sent on the common platform or channel, they combined in such a way that different frequency signals mix up to form distortion.
CS601 Data communication Lecture no 29
What is FDM?
FDM is an analog technique that can be applied when BW of link is greater than the combined bandwidth of the signal to be transmitted.
Difference between MUX and Demur
Multiplexing means combining multiple streams of information for transmission over a shared medium. De-multiplexing performs the reverse function: split a combined stream arriving from a shared medium into the original information streams. As it is clear from definitions they are inverse of each other.
www.virtualians.pk Prepared by: Irfan Khan
What is Demultiplexing?
Demultiplexing is to separate 2 or more channels that have been multiplexed. Signals are typically multiplexed or combined onto one higher speed channel to efficiently use the bandwidth. When different signals are sent from source to destination, all the signals have to be sent on singal channel from multichannel to save the channel resources, for that process signals have to be multiplexed on receiver side with the help of Multiplexer. Multiplexer combine the signals in one composite signal by modulating every signal on different carrier frequency. On reaching destination the receiver Demultiplex the composite signal for every receiver, this is done with the help of De-Multiplexer. De-multiplexer also demodulate the composite signal on different frequencies for each user.
What is TDM?
TDM is abbreviated as Short for time division multiplexing, It is a digital multiplexing technique that combines data streams by assigning each stream a different time slot in a set. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel.
What is TX. System?
Those systems which transmit data to destination are called Tx systems, The Term TX is widely used in Satellite Communication, Telecommunication system & data communication system. " TX " stands for Trans and "Rx" stands for Receive.For any Information or data to be communicated over a network there is a node that Generate or transmit that information , The sender node point which is transferring information is "TX" or Transmitter point & the Destination node point that has to receive that information is " Rx" or receiver point.
What is g’(t) and Tax. Stands for
Those systems which transmits data to destination are called Tax systems, The Term TX is widely used in Satellite Communication, Telecommunication system & data communication system. " TX " stands for Trans and "Rx" stands for Receive. For any Information or data to be communicated over a network there is a node that Generate or transmit that information , The sender node point which is transferring information is "TX" or Transmitter point & the Destination node point that has to receive that information is " Rx" or receiver point.
The term g'(t) used in different places for different purposes, as for as lecture number 29 and previous are concerned, I didn’t find this term, kindly give reference of lecture or from where you have read this. Feel free to ask any question regarding lectures or the subject.
www.virtualians.pk Prepared by: Irfan Khan
CS601 Data Communication Lecture no.30
What is Asynchronous?
In general, asynchronous (pronounced ay-SIHN-kro-nuhs, from Greek asyn-, meaning "not with," and chronos, meaning "time") is an adjective describing objects or events that are not coordinated in time. In information technology, the term has several different usages. In telecommunication signaling within a network or between networks, an asynchronous signal is one that is transmitted at a different clock rate than another signal. (plesiochronous signals are almost but not quite in synchronization - and a method is used to adjust them - and synchronous signals are those that run at the same clock rate. For example, a telephone conversation is asynchronous because both parties can talk whenever they like. If the communication were synchronous, each party would be required to wait a specified interval before speaking.
What is Bit Stuffing?
Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signaling information to a receiver. The receiver knows how to detect and remove or disregard the stuffed bits. Example of bit stuffing, a standard HDLC packet begins and ends with 01111110. To make sure this sequence doesn't appear again before the end of the packet, a 0 is inserted after every five consecutive 1s.
Why do we need Inverse Multiplexing?
•
• • • •
• • •
An organization wants to send data, voice and video each of which requires a different data rate To send voice it needs 64Kbps, To send data, it needs 128 Kbps link To send video it may need 1.544 Mbps link It can lease a 1.544 Mbps line from a common carrier and only use it fully for sometime Or it can lease several separate channels of lower data rates Voice can be sent over any of these channels Data & Video can be broken into smaller portions using Inverse Multiplexing and TX
What is a transceiver?
www.virtualians.pk Prepared by: Irfan Khan
Transceiver is a device comprising both a transmitter and a receiver which are combined and share common circuitry.
CS601 Data Communication Lecture no.31
What is DSU in terms of digital service?
DSU changes rate of digital data created by the subscriber device to 56kbps and encodes it in the format used by service provider. it used in dialing process.DSU is more expensive than modem it has better speed better quality and less susceptibility to noise
What is FTTC?
"Fiber to the curb" (FTTC) refers to the installation and use of optical fiber cable directly to the curbs near homes or any business environment as a replacement for "plain old telephone service" (POTS). Think of removing all the telephone lines you see in your neighborhood and replacing them with optical fiber lines. Such wiring would give us extremely high bandwidth and make possible movies-on-demand and online multimedia presentations arriving without noticeable delay.
What is Bandwidth?
Bandwidth is the width of the range (or band) of frequencies that an electronic signal uses on a given transmission medium. In this usage, bandwidth is expressed in terms of the difference between the highest-frequency signal component and the lowest-frequency signal component.
In computer networks, bandwidth is often used as a synonym for data transfer rate - the amount of data that can be carried from one point to another in a given time period (usually a second). This kind of bandwidth is usually expressed in bits (of data) per second (bps).
What are the telephone services provided?
There are two main telephone services.
1. Analog Service 2. Digital Service
Analog Services further has two important types of services.
1. Switched Analog Service
www.virtualians.pk Prepared by: Irfan Khan
2. Leased Analog Service
CS601 Data communication Lecture no 32
Difference of topology and multiplexing
The physical arrangement of a network; the way in which cables are arranged in order to connect computers in a network is called the topology. In telecommunications and computer networks, multiplexing (also known as muxing) is a process where multiple analog message signals or digital data streams are combined into one signal over a shared medium. The aim is to share an expensive resource. For example, in telecommunications, several phone calls may be transferred using one wire. It originated in telegraphy, and is now widely applied in communications.
What are T Line and E Line?
T line and E line both are digital lines designed to transfer digital data. The concept behind T- line and E-line is same except that Europeans use a version of T-line called E-lines which have different capacity than T-lines
What are the fractional T Lines?
Many subscribers don’t need the entire capacity of the T-line. A small business may need only one-fourth of the capacity of T-line. if four business of same size lie in the same building, they can share T-line.DSU/CSU allow the capacity of T-line to be interleaved in to four channels
CS601 Data Communication Lecture no.33
What are the Types of Errors?
There are two types of errors
1- Single bit error
2- Burst error
Single Bit & Burst
• In a single-bit error, a 0 is changed to a 1 or a 1 to a 0
Prepared by: Irfan Khan www.virtualians.pk
• •
In a burst error multiple bits are changed For Example, a 0.01 second burst of impulse noise on a TX with a data rate of 1200 bps might change all or some of 12 bits of information
Error Detection
• • • •
Even if we know what type of errors can occur, will we recognize one when we see it? If we have a copy of the intended TX for comparison, of course we will But what if we don’t have a copy of the original Then we will have no way of knowing we have received an error until we have decoded the TX and failed to make sense of it
What are the types of redundancy checks?
There are four types of redundancy checks used in data communication;
1. 2. 3. 4.
Vertical Redundancy check (VCR) Longitudinal Redundancy check(LRC) Cyclic Redundancy check(CRC) Checksum
What is CRC?
Short for cyclic redundancy check, a common technique for detecting data transmission errors. Transmitted messages are divided into predetermined lengths that are divided by a fixed divisor. According to the calculation, the remainder number is appended onto and sent with the message. When the message is received, the computer recalculates the remainder and compares it to the transmitted remainder. If the numbers do not match, an error is detected.
What is Checksum?
A simple error detection scheme in which each transmitted message is accompanied by a numerical value based on the number of set bits in the message. The receiving station then applies the same formula to the message and checks to make sure the accompanying numerical value is the same. If not, the receiver can assume that the message has been garbled.
CS601 Data Communication Lecture no.34
What is an Error?
www.virtualians.pk Prepared by: Irfan Khan
An error is the change or the mismatching take place between the data unit sent by transmitter and the data unit received by the receiver e.g. 10101010 sent by sender 10101011 received by receiver. Here is an error of 1 bit.
Define Error Control.
Error control refers to mechanisms to detect and correct errors that occur in the transmission of frames. The most common techniques for error control are based on some or all of the following:
1, Error detection
2. Positive acknowledgement
3. Retransmission after time-out
4. Negative acknowledgement and retransmission.
These mechanisms are also referred as automatic repeat request (ARC)).
Explain about error correction.
Error correction is the mechanism by which we can make changes in the received erroneous data to make it free from error.
The two most common error correction mechanisms are:
(i) Error correction by Retransmission.
(ii) Forward Error Correction.
What are the different types of error? /How a single bit error does differ from a burst error?
A single bit error is an isolated error condition that alters one bit but does not affect nearby bits. On the other hand A burst error is a contiguous sequence of bits in which the first and last bits and any number of intermediate bits are received in error. A single bit can occur in the preserve of while noise, when a slight random deterioration of single-to-noise ratio is sufficient to confuse the receiver’s decision of a single bit. On the other hand burst errors are more common and more difficult to deal with. Burst error can be caused by impulse noise.
www.virtualians.pk Prepared by: Irfan Khan
Discuss the concept of redundancy in error detection.
It is a most common and powerful technique for the detection of errors. In this technique extra bits are added. But instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each unit. The technique is called redundancy because the extra bits are redundant to the information. They are discarded as soon as the accuracy of transmission has been determined.
Explain the bases of log base 2 and log base 10 ?
In mathematics, a logarithm of a given number to a given base is the power to which you need to raise the base in order to get the number.
Example for base 10
The logarithm of 1000 to the common base 10 = 3 or log(base 10) of 1000 = 3.
Because 10 raised to a power of 3 is 1000 or 10^3 = 1000
Example for base 2
The Logarithm of 8 to common base 2 = 3 or log(base 2) of 8 = 3 Because 2 raised to a power of 3 is 8 or 2^3 = 8.
CS601 Data Communication Lecture no.35
What is Single bit error?
Single bit error is the error where only one bit of the transmitted data unit is changed from 0 to 1 and 1 to 0. While in burst error two or more bits are changed from 0 to 1 and from 1 to 0. The burst error is un detectable by checksum.
What are timer and sequence number?
www.virtualians.pk Prepared by: Irfan Khan
TIMER, if sender was not able to get acknowledgment in the particular time than, it sends the buffered data once again to receiver. When sender starts to send the data, it starts timer.
SEQUENCE NUMBER, from this the sender sends the data with the specific sequence number so after receiving the data, receiver sends the data with that sequence number, and here at sender side it also expect the acknowledgment of the same sequence number.
What is Hamming Code?
It is a single bit error correction method using redundant bits.
In this method redundant bits are included with the original data those bits are arrange such that different incorrect bits produce different error results, that incorrect bits can be identified. Once the bit is identified, the receiver can reverse its value and correct the error. Hamming code can be applied to any length of data unit and uses the relationships between the data and the redundancy bits.
What is Flow Control?
Flow Control is one important design issue for the Data Link Layer that controls the flow of data between sender and receiver.
How does the CRC Checker work?
A sequence of redundant bits called CRC or CRC remainder is appended to the end of the data unit, so that the resulting data unit becomes exactly divisible by a second predetermined binary number
At its destination, the data unit is divided by the same number
If at this step, there is no remainder, the incoming data unit is assumed to be intact and is therefore accepted
A remainder indicates that a data unit has been damaged and therefore must be rejected
www.virtualians.pk Prepared by: Irfan Khan
CS601 Data Communication Lecture no.36
What are Framing and Flow control?
In computer networking, a frame is a data packet on the Layer 2 of the OSI model. A frame is "the unit of transmission in a link layer protocol, and consists of a link-layer header followed by a packet." Examples are Ethernet frames (maximum 1500 byte plus overhead), PPP frames and V.42 modem frames. In computer networking, flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from outrunning a slow receiver. It provides a mechanism for the receiver to control the transmission speed, so that the receiving node is not overwhelmed with data from transmitting node
Differentiate between Hamming Code and Hamming Distance?
In telecommunication, a Hamming code is a linear error-correcting code named after its inventor, Richard Hamming. Hamming codes can detect up to two simultaneous bit errors, and correct single-bit errors; thus, reliable communication is possible when the Hamming distance between the transmitted and received bit patterns is less than or equal to one. By contrast, the simple parity code cannot correct errors, and can only detect an odd number of errors. The Hamming distance between two strings of equal length is the number of positions at which the corresponding symbols are different. Put another way, it measures the minimum number of substitutions required to change one string into the other, or the number of errors that transformed one string into the other
CS601 Data Communication Lecture no.37
How we calculate the binary division of these no.01001101 divided by 111.
In binary division we will concatenate 0 in quotient left most side until divisor is less than from dividend, if dividend portion is greater than or equal to divisor then we will subtract divisor from dividend portion and will concatenate 1 in quotient left side and so on. For see your required binary example step by step please follows this link
www.virtualians.pk Prepared by: Irfan Khan
Add your divisor and dividend in below filed of link and then click on start next statement for understand step by step.
What is TTP?
TTP stands for Time triggered protocol which is an open and modular control system platform technology that supports the design of upgradeable, reusable and easy-to-integrate systems As a fault-tolerant time-triggered protocol, TTP provides autonomous fault-tolerant message transport at known times and with minimal jitter by employing a TDMA (Time-Division Multiple Access) strategy on replicated communication channels. TTP offers fault-tolerant clock synchronization that establishes the global time base without relying on a central time server. TTP provides a membership service to inform every correct node about the consistency of data transmission. This mechanism can be viewed as a distributed acknowledgment service that informs the application promptly if an error in the communication system has occurred. If state consistency is lost, the application is notified immediately. Additionally, TTP includes the service of clique avoidance to detect faults outside the fault hypothesis, which cannot be tolerated at the protocol level.
CS601 Data Communication Lecture no.38
Explain Sliding Window.
Sliding windows, a technique also known as windowing, is used by the Internet's Transmission Control Protocol (TCP) as a method of controlling the flow of packets between two computers or network hosts method of for transferring data over network.TCP sends data across a network in packets and requires the receiving device to send an acknowledgement, or ACK, when it successfully has received the packet, which signals the sending device that another packet can be sent. Window size is the number of data packets that can be sent without waiting for an ACK. With the sliding window method, the receiving device can send a single acknowledgement message for multiple packets of data sent in one window. Within that acknowledgement message is information about the receiving device, which tells the sending device to increase or decrease the number of packets in the next transmission (this is where the "sliding" in the name comes in).
What is the term STP?
STP is Shielded Twisted Pair. It is the same as UTP but has a shield inside to protect from electrical interference. It should be used in Token Ring networks or in Ethernet networks where electrical interference may be a problem. STP cables have a conducting shield made of metallic foil encasing the twisted wire pairs, which blocks out electromagnetic interference, allowing it to carry data at a faster rate of speed.
www.virtualians.pk Prepared by: Irfan Khan
What is EOT?
EOT stands for end of transmission; this frame is sent to let the transmitter know that the session should be terminated.
Explain Flow control.
Flow control is the process of adjusting the flow of data from one device to another or between nodes on a network to ensure that the receiving device or node can handle all of the incoming data. This is particularly important where the sending device or node is capable of sending data much faster than the receiving device or node can receive it. Too much data arriving before a device or node can handle it causes data overflow, resulting in data loss and possible retransmission.
What is Stop-and-Wait Flow Control?
The simplest form of flow control is stop-and-wait and works as follows. A source entity transmits a frame. After reception, the destination entity indicates its willingness to accept another frame by sending back an acknowledgement to the frame just received. The source must wait until it receives the acknowledgement before sending the next frame. The destination can thus stop flow of data by just withholding the acknowledgement. This method fails if the message transmitted is very large.
CS601 Data Communication Lecture no.39
What is Asynchronous?
Asynchronous is a communications protocol that transmits one byte of information at a time at irregular time intervals. A start bit (one character) precedes the byte (eight characters) of information, and a stop bit (one character) follows the byte. The sending and receiving computers do not have to be synchronized
Explain sliding Window ARQ
A sliding window protocol is a feature of packet-based data transmission protocols. Sliding window protocols are used where reliable in-order delivery of packets is required, such as in the Data Link Layer (OSI model) as well as in the Transmission Control Protocol (TCP). Conceptually, each portion of the transmission (packets in most data link layers, but bytes in
www.virtualians.pk Prepared by: Irfan Khan
CS101 Introduction of computing
www.Virtualins .pk Prepared by Imran Baloch
TCP) is assigned a unique consecutive sequence number, and the receiver uses the numbers to place received packets in the correct order, discarding duplicate packets and identifying missing ones. The problem with this is that there is no limit of the size of the sequence numbers that can be required. By placing limits on the number of packets that can be transmitted or received at any given time, a sliding window protocol allows an unlimited number of packets to be communicated using fixed-size sequence numbers.
Explain XMODEM?
XMODEM like most file transfer protocols, breaks up the original data into a series of Packet that are sent to the receiver, along with additional information allowing the receiver to determine whether that packet was correctly received. Files were transferred one packet at a time. When received, the packet's checksum was calculated by the receiver and compared to the one received from the sender at the end of the packet. If the two matched, the receiver sent an ACK (Acknowledgment) message back to the sender, which then sent the next packet in sequence. If there was a problem with the checksum, the receiver instead sent a NAK (Negative acknowledgment) If a NAK was received, the sender would re-send the packet, and continued to try several times, normally ten, before aborting the transfer.
What is Go-Back-N ARQ?
Retransmission begins with the last unacknowledged frame even if subsequent frames have arrived correctly .duplicate frames are discarded. Go-back-n ARQ -- Receiver must get Frames in correct order
CS601 Data Communication Lecture no.40
How is CRC superior to the two dimensional parity ?
CRC is based on binary division. In CRC, instead of adding bits to achieve a desired parity, a sequence of redundant bits, called the CRC or the CRC remainder, is appended to the end of a data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number. At its destination, the incoming data unit is divided by the same number. If at this step there is no remainder the data unit is assumed to be intact and is therefore accepted. A remainder indicates that the data unit has been damaged in transit and therefore must be rejected.
The redundancy bits used by CRC are derived by dividing the data unit by a predetermined divisor; the remainder is the CRC. To be valid, a CRC must have two qualities: It must have exactly one less bit than the divisor, and appending into the end of the data string must make the resulting bit sequence exactly divisible by the divisor.
www.virtualians.pk Prepared by: Irfan Khan
CS101 Introduction of computing
www.Virtualins .pk Prepared by Imran Baloch
A CRC checker functions exactly as the generator does. After receiving the data appended with the CRC, it does the samemodulo-2 division. If the remainder is all 0’s, the CRC is dropped and the data are accepted: otherwise, the received stream of bits is discarded and data are resent. We assume that there is no error. The remainder is therefore all 0’s, and the data are accepted.
What is Purpose of the hamming code?
Hamming code is a method of error detection and correction in which every string of four bits is replaced with a string of seven bits. The last three added bits are parity checking bits that the receiving device uses to check for and correct any errors. Hamming code will detect any double errors but can only correct a single error. This method of error correction is best suited for situations in which randomly occurring errors are likely, not for errors that come in bursts.
What is the difference between even parity and odd parity?
"Parity" refers to the number of 1s in a given binary number. Odd parity means there are an odd number of 1s and even parity means that there is an even number of 1s.
How can a parity bit detect a damaged data unit?
In order to reduce errors parity bit is introduced (even parity or odd parity) Suppose If we want to transmit 11010101 using even parity at transmitter then there are total five 1's so as we are using even parity to make the total no. of 1's even the Parity bit required is '1' if we are using odd parity bit required is 0.This parity bit appended to the data as 110101011,and this 110101011 is transmitted in place of 11010101(actual data),So as according to the parity used (even r odd) the receiver counts the no. of 1's in the received data. Process follows as at receiver if received data is 110101011 the parity using here is even so on counting no. of 1's by receiver they are even so No error if odd No. of 1's appear then there is an error Using the Even Parity Using even parity, add the parity bit 1 and the set of data becomes: 11010001 (8 bits of data including the parity bit), total number of 1s becomes even. Using the Odd Parity Using odd parity, total number is already odd, parity bit is set to 0 and the set of data becomes: 01010001 (8 bits of data including the parity bit).
www.virtualians.pk Prepared by: Irfan Khan
CS101 Introduction of computing
www.Virtualins .pk Prepared by Imran Baloch
CS601 Data Communication Lecture no.41
What is HDLC?
HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between points (sometimes called nodes). In HDLC, data is organized into a unit (called aflame) and sent across a network to a destination that verifies its successful arrival. The HDLC protocol also manages the flow or pacing at which data is sent. HDLC is one of the most commonly-used protocols in what is layer 2 of the industry communication reference model called Open Systems Interconnection (OSI).
What is difference between L RC and VRC?. VRC:: A redundant bit called parity bit is appended to every data unit so that total number of 1’s in the unit becomes even including the parity bit If 1100001 value is Transmitted, totals number of 1’s is 3 an odd number. Before transmission, this data unit is passed through a parity generator, which counts the 1’s and appends the parity bit (1) to the end ,the total number of 1’s is now 4, an even number, this data is sent across network. When it reaches its destination, Receiver puts all 8 bits through an even parity checking function, if the RX sees 11100001, it counts four ones, an even number and the data unit passes. If the data got corrupted during transit and let say if instead of 11100001, receiver receives 11100101. Then when the parity checker counts the 1’s, it gets 5 an odd number receiver knows that an error has occurred and rejects the whole unit. LRC:: In LRC, a block of bits is organized in a table (rows and columns) For example instead of sending 32 bits, we organize them in a table made of 4 rows and 8 columns We then calculate the Parity bit for each column and create a new row of 8 bits which are the parity bits for the whole block, Keep in mind that the first parity bit in the 5th row is calculated based on all the first bits The second parity bit is calculated based on all the second bits and so on We then attach the 8 parity bits to the original data and send them to the receiver
www.virtualians.pk Prepared by: Irfan Khan
CS101 Introduction of computing
www.Virtualins .pk Prepared by Imran Baloch
What are the advantages of bit oriented protocols?
Bit oriented protocols are more useful than character oriented protocols. The most important data link bit oriented protocol is HDLC protocol. A synchronous communications protocol requiring only a single bit to communicate a command signal to the target station. It transmit information without regard to character boundaries and thus handle all types of information images.
CS601 Data Communication Lecture no.42
What are an AUI cables?
An AUI cable can be used to provide the connection between an external MAU and the Ethernet interface. Each station is linked to its corresponding transceiver by an AUI cable also called the Transceiver cable An AUI is a 15 wire cable with plug that performs the physical layer interface functions b/w the station and the transceiver An AUI has a max. Length of 50 meters and it terminates in a 15-pin DB- 15 connector The AUI cable carries three data signals between the Ethernet interface and MAU: transmit data (from the Ethernet interface to the network), receive data (from the network to the interface), and a collision presence signal (from the network to the interface). Each signal is sent over a pair of wires. Another pair of wires are used to carry 12 volt DC power from the Ethernet interface to the MAU. The standard AUI cable is relatively thick (approx. 1cm or 0.4 inch diameter), and may be up to 50 meters (164 feet) long.
What is Spike?
Spike is a medal conductor, behaves like a connector. Spike is attached to wires inside the transceiver. When the cable is pressed into the well, the spike pierces the jacket and sheathing layer and makes electrical connection between transceiver and cable. This type of connector is often called vampire tab because it bits the cable
What is a Local-Area Network (LAN)?
A local-area network (LAN) is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN).
CS601 Data Communication Lecture no.43
Define BNC T-connectors?
www.virtualians.pk Prepared by: Irfan Khan
CS101 Introduction of computing
www.Virtualins .pk Prepared by Imran Baloch
BNC T-connectors (used with the 10Base-2 system) are female devices for connecting two cables to a Network interface card. A BNC barrel connector allows connecting two cables together. BNC connectors can also be used to connect some Monitors, which increases the accuracy of the signals sent from the Video Adaptor , N is the number of multiple devices attached to 10 Mbps hub .
What is FDDI?
FDDI defines three time registers to control circulation of the token and distribute link –access opportunities among the nodes equitably. Each station has three registers. The registers hold time values that control the operation of the ring. These values are set when the ring is initialized and do not vary in the course of operation. The registers are called synchronous allocation (SA), target token rotation time (TTRT), and absolute maximum time (AMT).
What are the advantages of Ethernet?
• • •
Reduced cost and ease of installation Because the cable is lighter weight and more flexible than that used in Thicket
What are the disadvantaged of Ethernet?
• •
Short Range (185 m as opposed to 500 m) Smaller Capacity (thinner cable accommodates fewer stations)
CS601 Data Communication Lecture no.44
What is the Difference b/w "FDDI" & "Multi Station Access Unit?
MSAU is combination of automatic switches with maximum of 8.While FDDI is new standard with higher data rate than MSAU.
What is Station Procedure?
• • • • • •
THT is set to the difference between TTRT and TRT THT = TTRT - TRT TRT is reset to zero (TRT = 0) The station sends S-frames during the time in SA The station sends A-frames as long as THT ³ 0 Release the token
Prepared by: Irfan Khan www.virtualians.pk
CS101 Introduction of computing
What is MAU?
• Individual automatic switches are combined in to a hub • One MAU can support up to 8 stations • Although it looks like a star, it is in fact a ring
CS601 Data Communication Lecture no.45
What are Repeaters?
Network repeaters regenerate incoming electrical, wireless or optical signals. With physical media like Ethernet or Wi-Fi, data transmissions can only span a limited distance before the quality of the signal degrades. Repeaters attempt to preserve signal integrity and extend the distance over which data can safely travel.
Actual network devices that serve as repeaters usually have some other name. Active hubs, for example, are repeaters. Active hubs are sometimes also called "multiport repeaters," but more commonly they are just "hubs." Other types of "passive hubs" are not repeaters. In Wi-Fi, access points function as repeaters only when operating in so-called "repeater mode."
What are routers?
Routers are small physical devices that join multiple networks together. Technically, a router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model.
Home networks typically use a wireless or wired Internet protocol(IP) router, IP being the most common OSI network layer protocol. An IP router such as a DSL or cable modem broadband routers joins the home's local network area (LAN) to the wide- area network (WAN)of the Internet.
What does TCP/IP do?
Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of standard protocols for connecting computers across networks. TCP/IP enables Windows-based computers to connect and share information with other Microsoft and non-Microsoft systems.
Who does this feature apply to?
All users who use TCP/IP to connect and communicate information over a network should be aware of the changes incorporated in Windows Server 2003 Service Pack 1.
CS101 Introduction of computing
What new functionality is added to this feature in Windows Server 2003 Service Pack 1?
SYN attack protection is enabled by default
When a SYN attack is detected, TCP/IP in Windows Server 2003 and Windows XP lowers the number of retransmissions of the SYN-ACK segment and does not allocate memory or table entry resources for the connection until the TCP three-way handshake has been completed..
What is the Purpose of Encoding Techniques?
Encoding techniques are used to represent these 0s,1,s on some voltages level (into signals).So when you are asked to encode it, represent these 0's,1's on time lines graphs using specific schema (NRZ-I,NRZ-L etc.).
www.virtualians.pk Prepared by: Irfan Khan
CS101 Introduction of computing
www.Virtualins .pk Prepared by Imran Baloch
www.virtualians.pk Prepared by: Irfan Khan
FINALTERM EXAMINATION
Spring 2010
CS601- Data Communication
Question No: 31 ( Marks: 2 )
What are the advantages of a multipoint connection over a point-to-point connection?
Answer:
Point-to-point connection is limited to two devices, where else more than two devices share a
single link in multipoint connection. Multipoint connection can be used for fail-over and
reliability.
Question No: 32 ( Marks: 2 )
What's the name of the telephone service in which there is no need of dialing.
Answer:
DSS (digital data service) is the telephone service in which there is no need of dialing.
Question No: 33 ( Marks: 2 )
Which type of frames are present in BSC frames?
Answer:
There are two types of frames that are present in BSC.
1. 1. Control Frames and
2. 2. Data Frames
Question No: 34 ( Marks: 2 )
What methods of line discipline are used for peer to peer and primary secondary
communication?
Answer:
Line discipline is done in two ways:
1. ENQ/ACK (Enquiry Acknowledgement)
This is used for peer to peer communication.
1. Poll/ Select
This method is used for primary secondary communication.
Question No: 35 ( Marks: 3 )
How does the checksum checker know that the received data unit is undamaged? [3]
Answer:
Checksum Checker or generator:
The sender subdivides data units into equal segments of ‘n’ bits(16 bits)
1. These segments are added together using one’s complement.
2. The total (sum) is then complemented and appended to the end of the original data unit as
redundancy bits called CHECKSUM.
3. The extended data unit is transmitted across the network.
4. The receiver subdivides data unit and adds all segments together and complement the result.
5. If the intended data unit is intact, total value found by adding the data segments and the checksum
field should be zero.
6. 6. If the result is not zero, the packet contains an error & the receiver rejects it.
Question No: 36 ( Marks: 3 )
Which one has more overhead, a repeater or a bridge? Explain your answer. [3]
Answer:
A bridge has more overhead than a repeater. A bridge processes the packet at two
layers ; a repeater processes a frame at only one layer. A bridge needs to search a
table and find the forwarding port as well as to regenerate the signal; a repeater
only regenerates the signal. In other words, a bridge is also a repeater (and more); a
repeater is not a bridge.
Question No: 37 ( Marks: 3 )
Write down disadvantages of Ring Topology.
Answer:
Disadvantages of Ring Topology
Unidirectional Traffic
A break in a ring that is a disabled station can disable the entire network
Can be solved by using:
Dual Ring or
A switch capable of closing off the Break
Question No: 38 ( Marks: 3 )
How parity bits are counted in VRC error detection method technique in case of odd parity
generator?
Answer:
For example:
We want to TX the binary data unit 1100001
Adding together the number of 1’s gives us 3, an odd number
Before TX, we pass the data unit through a parity generator, which counts the 1’s and appends the
parity bit (1) to the end
The total number of 1’s is now 4, an even number
The system now transfers the entire expanded across the network link
When it reaches its destination, the RX puts all 8 bits through an even parity checking function
If the RX sees 11100001, it counts four ones, an even number and the data unit passes
When the parity checker counts the 1’s, it gets 5 an odd number
The receiver knows that an error has occurred somewhere and therefore rejects the whole unit
Some systems may also use ODD parity checking
The principal is the same as even parity
Question No: 39 ( Marks: 5 )
How are lost acknowledgment and a lost frame handled at the sender site? [5]
Answer:
At some error rates (16%-20%) the protocol hung up in an infinite loop, while it worked fine for
other error rates. On examining the code it was determined that this problem resulted from
improper variable initialization. On these certain error rates the pseudo-random number generator
caused the very first frame sent to be lost or damaged. The receiver used a variable to keep track
of the last in sequence frame received. This was erroneously initialized to 0. Therefore if the first
frame got lost (sequence no 0), when the receiver received the second frame (sequence number 1)
it sent an acknowledgment for the last in sequence frame received, which had been initialized to
0. Therefore the sender received an acknowledgement for sequence number 0 and moved its
window up accordingly. It caused everything to get out of synch, and caused the protocol to go
into infinite loop. This was resolved by initializing the variable to remember the last in sequence
frame received to an out of range sequence number.
Question No: 40 ( Marks: 5 )
Explain Protocol Data Unit (PDU)?
Answer:
Protocol data unit (PDU) is an OSI term that refers generically to a group of information added or
removed by a particular layer of the OSI model. In specific terms, an LxPDU implies the data and
headers defined by layer x. Each layer uses the PDU to communicate and exchange information.
The PDU information is only read by the peer layer on the receiving device and then stripped off,
and data is handed over to the next upper layer.
FINALTERM EXAMINATION Spring 2009
CS601- Data Communication
Question No: 41 ( Marks: 2 )
What are the conditions for the polynomial used by the CRC generator?
CRC generator:
CRC generator (the divisor) is most often represented not as a1’s and 0’s but as an algebraic
polynomial.
conditions for the polynomial:
it should have following properties:
It should not be divisible by “x”.
It should not be divisible by “x+1”.
The first condition guarantees that all burst error of a length equal to degree of the polynomial is
detected.
The 2nd condition guarantees that all burst error affecting an odd number of bits are detected.
Question No: 42 ( Marks: 2 )
What are intelligent modems?
Intelligent modems:
A modem that responds to commands and can accept new instructions during online
transmission. It was originally developed by Hayes.
Example:
• Automatic answering,
• Dialing etc.
Question No: 43 ( Marks: 2 )
What is the basic purpose of Router?
Basic purpose of Router:
"A router is a device that extracts the destination of a packet it receives, selects the best path to
that destination, and forwards data packets to the next device along this path. They connect
networks together;
a LAN to a WAN for example, to access the Internet.
"A more precise definition of a router is a computer networking device that interconnects separate
logical subnets."
Question No: 44 ( Marks: 3 )
What are the fractional T Lines?
The fractional T Lines:
Many subscribers don’t need the entire capacity of the T-line.
For example,
A small business may need only one-fourth of the capacity of T-line. if four business of same
size lie in the same building, they can share T-line.DSU/CSU allow the capacity of T-line to be
interleaved in to four channels
Question No: 45 ( Marks: 3 )
What are the light sources used for optic fiber?
• light sources used for optic fiber:
• The light source can weather be an LED or ILD
• LED (Light emitting diode) cheaper but provide unfocused light that strikes the boundaries of
channel at uncontrollable angles.
• Limited to short distance use.
• LASSER
• Can be focused to a narrow range allowing control over angle of incidence.
Question No: 46 ( Marks: 3 )
What is Multi Access Unit (MAU) in Token Ring?
Multi Access Unit (MAU) in Token Ring:
• Individual automatic switches are combined in to a hub
• One MAU can support up to 8 stations.
• Although it looks like a star, it is in fact a ring.
Question No: 47 ( Marks: 5 )
Give characteristics of Dual Ring, if necessary then draw the diagram. [5]
Characteristics of Dual Ring:
A network topology in which two concentric rings connect each node on a network instead of one
network ring that is used in a ring topology. Typically, the secondary ring in a dual-ring topology
is redundant. It is used as a backup in case the primary ring fails. In these configurations, data
moves in opposite directions around the rings. Each ring is independent of the other until the
primary ring fails and the two rings are connected to continue the flow of data traffic.
What the receiver will receive if the checksum method is applied to the following
bit.
10101001 00111001
Ans:
the receiver will receive the checksum method is applied to the following bit.
10101001 00111001
10101001 00111001
Sum of 2 bits are
10101001
00111001
-------------------
11100010
00011101 1's complement
1
--------------
00011110 2's complement
-----------
10101001 00111001 ==> 00011110
So the data transmitted which will receiver get:
10101001 00111001 00011110
Question No: 49 ( Marks: 5 )
What is rafraction in terms of optic fiber? Give one example.
Refraction:
Light travels in a straight line as long as it is moving through a single uniform structure If a ray
of light traveling through one substance enters another (more or less dense) substance, its speed
changes abruptly causing the ray to change direction. This phenomenon is called Refraction.
Refraction in terms of optic fiber:
the propagation of light in an optical fiber which in its simplest form consists of a circular core of
uniform refractive index surrounded by a cladding of slightly lower refractive index. The light is
launched into the entrance face of the fiber.
The light is propagated by the total internal reflection at the interface between core and cladding.
However the rays incident at angles larger than a certain angle, called the cut-off angle, suffer
both refraction and reflection at the interface between the core and the cladding.
They, therefore, are not guided. Due to this the optical fiber has a numerical aperture. The
numerical aperture is given by the square root of (n12-n2
2). Typical values of numerical aperture
lie between 0.1 and 0.3.
The refractive indices of the core and the cladding are n1 and n 2 respectively. The fiber is
normally in air (n0=1) but could also be in a medium of refractive index n0.
Question No: 50 ( Marks: 10 )
What are the asynchronous protocols in data link layer? Discuss in detail with examples. [10
marks]
Asynchronous protocols in data link layer:
Asynchronous communication at the data link layer or higher protocol layers is known as
statistical multiplexing or packet mode communication,
For example :
Asynchronous transfer mode (ATM). In this case the asynchronously transferred blocks are called
data packets,
Async protocols in Data link layer is called statistical multiplexing. for example ATM cells.
The opposite is circuit switched communication, which provides constant bit rate, for example
ISDN and SONET/SDH.
The packets may be encapsulated in a data frame, with a frame synchronization bit sequence
indicating the start of the frame, and sometimes also a bit synchronization bit sequence, typically
01010101, for identification of the bit transition times. Note that at the physical layer, this is
considered as synchronous serial communication.
Examples of packet mode data link protocols that can be/are transferred using synchronous serial
communication are the
• HDLC,
• Ethernet,
• PPP and
• USB protocols.
what are the conditions for the polynomial used by the CRC generator?
Ans:
• The first condition guarantees that all burst errors of a length equal to the degree of the
polynomial are detected
• The 2nd
guarantees that all burst errors affecting an odd number of bits are detected
writes down names of the control frames in XMODEM?
Control frames from the receiver
ACK: Acknowledgement
NAK: Error or start of transmission
CAN: Aborts the transmission
defines frequency Modulation? [3]
Frequency Modulation (FM)
Frequency of carrier signal is changed according to the amplitude of modulating
signal
o Amplitude and Phase of the carrier signal remain constant
Q#4 what is ETX in data frames of data link layer? [3]
Q#5 what are three types of digital service? [3]
ANs: Three types of digital service are:
Switched / 56 Service: It is digital version of Analog switched line Allows data rates of up to 56
Kbps. Both parties must subscribe to the service. Digital Data Service (DDS) : Digital version of analog leased line. Max. data rate of 64Kbps. Like switched/56, DDS requires a DSU (Digital service unit). Digital Signal (DS) Service: Telephone companies saw the need to de velop a hierarchy of
digital services much like those used for Analog services.
Q#6 what is selective Reject ARQ in sliding window? [5]
Q#7 Give methods of Analog to Analog conversion? [2]
Analog To Analog Conversion Methods
Amplitude Modulation (AM)
o Amplitude of carrier signal is changed according to the amplitude of
modulating signal
o Frequency and phase of the carrier remain the same
� Frequency Modulation (FM)
o Frequency of carrier signal is changed according to the amplitude of modulating
signal
o Amplitude and Phase of the carrier signal remain constant
Phase modulation (PM) o Simpler hardware requirements o Phase is modulated with the
amplitude o Amplitude & Frequency of the carrier signal remain constant
Q#8 whether in Asynchronous or Synchronous TDM, addressing in used?
Answer: (Page 158) Addressing is used only in Asynchronous TDM
Q#9 what is the basic purpose of Router?
Basic purpose of Router: A router is a device that extracts the destination of a packet it receives,
selects the best path to that destination, and forwards data packets to the next device along this path.
They connect networks together; a LAN to a WAN for example, to access the Internet
Q#10 what are the possible consequences of replacing a bridge with a routes?
Question No: 31 ( Marks: 2 )
What are the advantages of a multipoint connection over a point-to-point connection?
Answer:
Point-to-point connection is limited to two devices, where else more than two devices share a
single link in multipoint connection. Multipoint connection can be used for fail-over and
reliability.
Question No: 32 ( Marks: 2 )
What's the name of the telephone service in which there is no need of dialing.
Answer:
DSS (digital data service) is the telephone service in which there is no need of dialing.
Question No: 33 ( Marks: 2 )
Which type of frames are present in BSC frames?
Answer:
There are two types of frames that are present in BSC.
1. 1. Control Frames and
2. 2. Data Frames
Question No: 34 ( Marks: 2 )
What methods of line discipline are used for peer to peer and primary secondary
communication?
Answer:
Line discipline is done in two ways:
1. ENQ/ACK (Enquiry Acknowledgement)
This is used for peer to peer communication.
2.Poll/ Select
This method is used for primary secondary communication.
Question No: 35 ( Marks: 3 )
How does the checksum checker know that the received data unit is undamaged? [3]
Answer:
Checksum Checker or generator:
The sender subdivides data units into equal segments of ‘n’ bits(16 bits)
1. These segments are added together using one’s complement.
2. The total (sum) is then complemented and appended to the end of the original data unit as
redundancy bits called CHECKSUM.
3. The extended data unit is transmitted across the network.
4. The receiver subdivides data unit and adds all segments together and complement the result.
5. If the intended data unit is intact, total value found by adding the data segments and the checksum
field should be zero.
6. If the result is not zero, the packet contains an error & the receiver rejects it.
Question No: 36 ( Marks: 3 )
Which one has more overhead, a repeater or a bridge? Explain your answer. [3]
Answer:
A bridge has more overhead than a repeater. A bridge processes the packet at two
layers ; a repeater processes a frame at only one layer. A bridge needs to search a
table and find the forwarding port as well as to regenerate the signal; a repeater
only regenerates the signal. In other words, a bridge is also a repeater (and more); a
repeater is not a bridge.
Question No: 37 ( Marks: 3 )
Write down disadvantages of Ring Topology.
Answer:
Disadvantages of Ring Topology
• Unidirectional Traffic
• A break in a ring that is a disabled station can disable the entire network
• Can be solved by using:
• Dual Ring or
• A switch capable of closing off the Break
Question No: 38 ( Marks: 3 )
How parity bits are counted in VRC error detection method technique in case of odd parity
generator?
Answer:
For example:
We want to TX the binary data unit 1100001
Adding together the number of 1’s gives us 3, an odd number
Before TX, we pass the data unit through a parity generator, which counts the 1’s and appends the
parity bit (1) to the end
The total number of 1’s is now 4, an even number
The system now transfers the entire expanded across the network link
When it reaches its destination, the RX puts all 8 bits through an even parity checking function
If the RX sees 11100001, it counts four ones, an even number and the data unit passes
When the parity checker counts the 1’s, it gets 5 an odd number
The receiver knows that an error has occurred somewhere and therefore rejects the whole unit
Some systems may also use ODD parity checking
The principal is the same as even parity
Question No: 39 ( Marks: 5 )
How are lost acknowledgment and a lost frame handled at the sender site? [5]
Answer:
At some error rates (16%-20%) the protocol hung up in an infinite loop, while it worked fine for
other error rates. On examining the code it was determined that this problem resulted from
improper variable initialization. On these certain error rates the pseudo-random number generator
caused the very first frame sent to be lost or damaged. The receiver used a variable to keep track
of the last in sequence frame received. This was erroneously initialized to 0. Therefore if the first
frame got lost (sequence no 0), when the receiver received the second frame (sequence number 1)
it sent an acknowledgment for the last in sequence frame received, which had been initialized to
0. Therefore the sender received an acknowledgement for sequence number 0 and moved its
window up accordingly. It caused everything to get out of synch, and caused the protocol to go
into infinite loop. This was resolved by initializing the variable to remember the last in sequence
frame received to an out of range sequence number.
Question No: 40 ( Marks: 5 )
Explain Protocol Data Unit (PDU)?
Answer:
Protocol data unit (PDU) is an OSI term that refers generically to a group of information added or
removed by a particular layer of the OSI model. In specific terms, an LxPDU implies the data and
headers defined by layer x. Each layer uses the PDU to communicate and exchange information.
The PDU information is only read by the peer layer on the receiving device and then stripped off,
and data is handed over to the next upper layer.
Question No: 51 ( Marks: 2 )
What is the formula to calculate the number of redundancy bits required to correct a bit error in a
given number of data bits? [2]
Messages(frames) consist of m data (message) bits, yielding an n=(m+r)-bit codeword.
Question No: 52 ( Marks: 2 )
What is R G rating of coaxial cable?
Different coaxial cable designs are categorized by their Radio government (
RG ) ratings
Each cable defined by RG rating is adapted for a specialized function:
RG-8
• Used in Thick Ethernet
RG-9
• Used in Thick Ethernet
RG-11
• Used in Thick Ethernet
RG-58
• Used in Thin Ethernet
RG-59
• Used for TV
Question No: 53 ( Marks: 2 )
What are the advantages of thin ethernet?
The advantages of thin Ethernet are :
• reduced cost and
• ease of installation
Because the cable is lighter weight and more flexible than that used in Thicknet
Question No: 54 ( Marks: 3 )
What is the difference between a unicast, multicast, and broadcast address? [3]
Three methods can be used to transmit packets over a network: unicast, multicast, and broadcast.
Unicast involves communication between a single sender and a single receiver. This is a type of
point-to-point transmission; since the packet is transmitted to one destination at a time.
Multicast is used to send packets to a group of addresses, represented by a "group address." In
this case, packets are transmitted from a single sender to multiple receivers. Since the same data
packet can be sent to multiple nodes by sending just one copy of the data, the load of the sender
and the overall load of the network are both reduced.
Broadcast involves sending packets to all nodes on a network simultaneously. This type of
transmission is used to establish communication with another host, and for DHCP type methods
of assigning IP addresses.
Question No: 55 ( Marks: 3 )
T lines are designed for Digital data how they can be used for Analog Transmission ?
T Lines are digital lines designed for digital data however; they can also be used for analog
transmission (Telephone connections). Analog signals are first sampled and the Time
Multiplexed.
Question No: 56 ( Marks: 3 )
What are the three types of Guided Media?
Guided Media, are those media that provide a conduit from one device to another. Three types are
1. Twisted pair cable
2. Coaxial cable
3. Fiber-optic Cable
Question No: 57 ( Marks: 5 )
Why do we need Inverse Multiplexing? [5]
Data & Video can be broken into smaller portions using Inverse Multiplexing and TX. An inverse
multiplexer (often abbreviated to "inverse mux" or "imux") allows a data stream to be broken into
multiple lower data rate communication links. An inverse multiplexer differs from
a demultiplexer in that each of the low rate links coming from it is related to the others and they
all work together to carry their respective parts of the same higher rate data stream. By contrast,
the output streams from a demultiplexer may be completely independent from each other and the
demultiplexer does not have to understand them in any way.
This is the opposite of a multiplexer which creates one high speed link from multiple low speed
ones.
It can lease a 1.544 Mbps line from a common carrier and only use it fully for
sometime
Or it can lease several separate channels of lower data rates
Voice can be sent over any of these channels
Question No: 58 ( Marks: 5 )
Describe method of checksum briefly?
The sender subdivides data units into equal segments of ‘n’ bits(16 bits).These segments are
added together using one’s complement. The total (sum) is then complemented and appended to
the end of the original data unit as redundancy bits called CHECKSUM. The extended data unit is
transmitted across the network. The receiver subdivides data unit as above and adds all segments
together and complement the result. If the intended data unit is intact, total value found by adding
the data segments and the checksum field should be zero. If the result is not zero, the packet
contains an error & the receiver rejects it
Question No: 59 ( Marks: 10 )
Explain Asynchronous Time Division Multiplexing in detail? Also discuss its advantages over
synchronous TDM?
Asynchronous time-division multiplexing (ATDM) is a method of sending information that
resembles normal TDM, except that time slots are allocated as needed dynamically rather than
preassigned to specific transmitters. ATDM is more intelligent and has better bandwidth
efficiency than TDM.
Time-division multiplexing (TDM) is a type of digital or (rarely) analog multiplexing in which
two or more signals or bit streams are transferred apparently simultaneously as sub-channels in
one communication channel, but are physically taking turns on the channel. The time domain is
divided into several recurrent timeslots of fixed length, one for each sub-channel. A sample byte
or data block of sub-channel 1 is transmitted during timeslot 1, sub-channel 2 during timeslot 2,
etc. One TDM frame consists of one timeslot per sub-channel. After the last sub-channel the
cycle starts all over again with a new frame, starting with the second sample, byte or data block
from sub-channel 1, etc.
asynchronous time-division multiplexing comprising receive circuits (CRl/i) supplying cells
received via input links, transmit circuits (CTl/j) transmitting retransmitted cells on output links, a
buffer memory (MT) storing the received cells and delivering the cells to be retransmitted and a
buffer memory addressing device (SMT) including a write address source (SAE) and a read
address source (fsl/j).
The switching unit further comprises a write disabling circuit (pi) conditioned by a signal (adl)
derived from the content of at least one received cell or a signal (tle) derived from the absence of
any received cell and supplying a disabling signal (spi) and the address source includes a
disabling device (pac, pal) influenced by the disabling signal (spi) so that no memory location is
then occupied in the buffer memory (MT).
Advantages asynchronous TDM:
In asynchronous TDM, the timeslots are not fixed. They are assigned dynamically as needed.
In order to reduce the communications costs in time-sharing systems and multicomputer
communication systems, multiplexing techniques have been introduced to increase channel
utilization. A commonly used technique is Synchronous Time Division Multiplexing (STDM). In
Synchronous Time Division Multiplexing, for example, consider the transmission of messages
from terminals to computer, each terminal is assigned a fixed time duration. After one user's time
duration has elapsed, the channel is switched to another user. With synchronous operation,
buffering is limited to one character per user line, and addressing is usually not required. The
STDM technique, however, has certain disadvantages. As shown in Figure 1, it is inefficient in
capacity and cost to permanently assign a segment of bandwidth that is utilized only for a portion
of the time. A more flexible system that efficiently uses the transmission facility on an
"instantaneous time-shared" basis could be used instead. The objective would be to switch from
one user to another user whenever the one user is idle, and to asynchronously time multiplex the
data. With such an arrangement, each user would be granted access to the channel only when he
has a message to transmit. This is known as an Asynchronous Time Division Multiplexing
System (ATDM). A segment of a typical ATDM data stream is shown in Figure 2. The crucial
attributes of such a multiplexing technique are:
1. An address is required for each transmitted message, and
2. Buffering is required to handle the random message arrivals.
Question 1: [5]
Match the following to one of the five layers.
Answer:
a. Route determination--------------------Network Layer
b. Flow control--------------------Data Link Layer & Transport Layer
c. Interface to physical world------------------------ Application Layer
d. Provide access to the network for the end users--------------- Application Layer
e. Packet switching--------------------- Session Layer
Question 2: [5]
If the throughput at the connection between the device and transmission medium is 5 Kbps,
how long does it take to send 400,000 bits out of this device?
Answer:
Time taken= 5*0.38146972
Time taken= 1.9073sec
Question 3: [5]
Give the Signal level for each line encoding from following.
Answer:
a.Unipolar
This encoding is called unipolar because it uses only one polarity
This encoding is simple and uses only one technique and this encoding is almost obsolete today,
however study of this encoding make us familiar with many encoding problems, complexities and
techniques.
b. NRZ-L
Non Return to Zero
level of the signal is represented by the data (Bits) it represents.
c. NRZ-I
1 Bit is represented by the inversion of the level.
0 is represented by no change in level
d. RZ
Some time, data contains long strings of 1’s or 0’s, RZ can loose its timing
Signal changes not between the bits but during each bit
The only problem with RZ encoding is that it requires two signal changes to encode one bit and
therefore occupies more BANDWIDTH
e. AMI
(Alternate Mark Inveraion) it the type of bipolar encoding.
By inverting on each occurrence of 1, AMI accomplishes 2 things i.e ;
1-Long sequence of 1’s stay synchronized & 2-The DC component is zero.
What kind of error is undetectable by the checksum? [2]
Error detection method used by the higher layers like VRC,LRC,CRC,checksum is also based on
the concept of redundancy
what are the categories of multiplexing?
There are three catogaries of multiplxing
FDM
TDM
Have a two other catagories
Synchronous and asyrounce
WDM
Question:Compare line decipline methods ENQ/ACK and Poll/ Select?
=>ENQ/ACK coordinates which device may start a transmission and whether or not the intended
recipient is ready and enabled.
=> Using ENQ/ACK, a session can be initiated by either station on a link as long as both are of
equal rank.
=> In both half-duplex and full-duplex transmission, the initiating device establishes the session.
=> In half duplex, the initiator then sends its data while the responder waits. The responder may
take over the link when the initiator is finished or has requested a response.
=> In full duplex, both devices can transmit simultaneously once the session has been established.
POLL/SELECT:
=> The poll/select method of line discipline works with topologies where one device is
designated as a primary station and the other devices are secondary stations.
=> Multipoint systems must coordinate several nodes, not just two.
=> The question to be determined in these cases, therefore, is more than just, are you ready? It is
also, which of the several nodes has the right to use the channel?
Define high frequency [HF] and super high frequency [SHF], which devices uses these
frequencies [3]
High Frequency (HF) : Use ionospheric propagation
These frequencies move into the ionosphere where the density difference reflects them back on
earth .Used for Citizen’s Band Radio, International Broadcasting, Military Communication,
Telephone, Telegraph and Fax
Super High Frequency (SHF) (Figure)
o SHF waves are TX using mostly line-of-sight and some Space propagation
o Used for Terrestrial and Satellite Microwave and Radar Communication
Question No: 21 ( Marks: 2 )
Define Sampling Rate.
Answer: (page82)
The accuracy of any digital reproduction of an analog signal depends upon the o. of samples taken
Question No: 22 ( Marks: 2 )
Write down the types of digital to analog modulation.
Answer: (PAGE 85)
Types of digital to analog modulation
ASK
FSK
PSK
QAM
Question No: 23 ( Marks: 3 )
What is periodic signal?
Answer: (page58)
A signal is called Periodic if it completes a pattern within a measurable time frame called a Period
and then repeats that pattern over identical subsequent Periods
Question No: 24 ( Marks: 3 )
How bandwidth of a Modem is measured?
Answer: (page111)
Bandwidth of a modem is not measured in bytes, it is measured in bits.
Modem Speed –ASK (full-duplex)
Effective bandwidth of a telephone line is 2400 Hz, the maximum buad rate is
also 2400.
Baud rate and bit rate are equal for ASK, so maximum bit rate is also 2400 bps.
Question No: 25 ( Marks: 5 )
Briefly describe Rerturn to Zero (RZ) encoding scheme?
Anwer: (page75)
§ Any time, data contains long strings of 1’s or 0’s, Rx can loose its timing
§ In unipolar, we have seen a good solution is to send a separate timing signal but this solution is
both expensive and full of error
§ A better solution is to somehow include synch in encoded signal somewhat similar to what we did
in NRZ-I but it should work for both strings of 0 & 1
§ One solution is RZ encoding which uses 3 values : Positive, Negative and Zero
§ Signal changes not b/w bits but during each bit
§ Like NRZ-L , +ve voltage means 1 and a –ve voltage means 0, but unlike NRZ- L, half way through
each bit interval, the signal returns to zero
§ A 1 bit is represented by positive to zero and a 0 is represented by negative to zero transition
§ The only problem with RZ encoding is that it requires two signal changes to encode one bit and
therefore occupies more BANDWIDTH
§ But of the 3 alternatives we have discussed, it is most effective value.
Question No: 26 ( Marks: 5 )
Compare Phase Modulation(PM) with Frequency Modulation(FM)?
Answer: (page 96-97)
Phase modulation (PM)
Ø Simpler hardware requirements
Ø Phase is modulated with the amplitude
Ø Amplitude & Frequency of the carrier signal remain constant
Frequency Modulation (FM)
Ø Frequency of carrier signal is changed according to the amplitude of modulating signal
Ø Amplitude and Phase of the carrier signal remain constant
FM Bandwidth
Bandwidth of FM signal (modulated signal) = 10 * bandwidth of modulating signal Significant
spectrum of FM audio = 15 KHz
Minimum 150 KHz bandwidth
Write all steps of checksum method. [3]
o The sender subdivides data units into equal segments of ‘n’ bits(16 bits)
o These segments are added together using one’s complement
o The total (sum) is then complemented and appended to the end of the original data unit as
redundancy bits called CHECKSUM
o The extended data unit is transmitted across the network
o The receiver subdivides data unit as above and adds all segments together and complement the
result o If the intended data unit is intact, total value found by adding the data segments and the
checksum field should be zero o If the result is not zero, the packet contains an error & the
receiver rejects it.
Question No: 52 ( Marks: 2 )
What are Guard Bands in Multiplexing?
Ans: Channels must be separated by strips of unused BW (guard bands) to prevent signals from
Overlapping
Question No: 54 ( Marks: 3 )
What are the fractional T Lines?
Many subscribers do not need the entire capacity of the T line.
For example, a small business may need only one-fourth of the capacity of a T-1 line. If four business of same size lie in same building, they can shae a T-1 line. DSU/CSU allow the
capacity of T-1 line to be interleaved into 4 channels.
Question No: ( Marks: 10 )
In how many ways TDM can be implemented? Describe any one with example.
Implementation of TDM TDM can be implemented in two ways:
–Synchronous TDM
–Asynchronous TDM
Synchronous TDM
o The term synchronous has a different from that used in other areas of
telecommunication
o Here synchronous means that MUX allocates exactly the same time slot to each device
at all device whether or not the device has any thing to transmit
� Synchronous TDM Example
o Time slot A for example is assigned to device A alone and cannot be used by any other
device
o Each time its allocated time slot comes up a device has the opportunity to send a
portion of its data
o If a device is unable to transmit or does not have data to send time slot remains empty
. What is coaxial cable?
Instead of having two wires, coaxial cable has a central core conductor of solid or stranded
wire (usually copper) enclosed in an insulating sheath
o This is in turn encased in an outer conductor of metal foil, braid or a combination of the
two
o The outer metallic wrapping serves both as a shield against Noise and as the second
conductor which completes the circuit
o This outer conductor is also enclosed in an insulating sheath and the whole cable is
protected by a plastic cover
Question No: 51 ( Marks: 2 )
What is the formula to calculate the number of redundancy bits required to correct a bit error
in a given number of data bits? [2]
Messages(frames) consist of m data (message) bits, yielding an n=(m+r)-bit codeword.
Question No: 52 ( Marks: 2 )
What is R G rating of coaxial cable? http://www.vustudents.net
Different coaxial cable designs are categorized by their Radio government (
RG ) ratings
Each cable defined by RG rating is adapted for a specialized function:
RG-8
• Used in Thick Ethernet
RG-9
• Used in Thick Ethernet
RG-11
• Used in Thick Ethernet
RG-58
• Used in Thin Ethernet
RG-59
• Used for TV
Question No: 53 ( Marks: 2 )
What are the advantages of thin ethernet?
The advantages of thin Ethernet are :
• reduced cost and
• ease of installation
Because the cable is lighter weight and more flexible than that used in Thicknet
Question No: 54 ( Marks: 3 )
What is the difference between a unicast, multicast, and broadcast address? [3]
Three methods can be used to transmit packets over a network: unicast,
multicast, and broadcast.
Unicast involves communication between a single sender and a single receiver.
This is a type of point-to-point transmission; since the packet is transmitted to
one destination at a time.
Multicast is used to send packets to a group of addresses, represented by a
"group address." In this case, packets are transmitted from a single sender to
multiple receivers. Since the same data packet can be sent to multiple nodes by
sending just one copy of the data, the load of the sender and the overall load of
the network are both reduced.
Broadcast involves sending packets to all nodes on a network simultaneously.
This type of transmission is used to establish communication with another host,
and for DHCP type methods of assigning IP addresses.
Question No: 55 ( Marks: 3 )
T lines are designed for Digital data how they can be used for Analog Transmission ?
T Lines are digital lines designed for digital data however; they can also be used for analog
transmission (Telephone connections). Analog signals are first sampled and the Time
Multiplexed.
Question No: 56 ( Marks: 3 )
What are the three types of Guided Media?
Guided Media, are those media that provide a conduit from one device to another. Three
types are
1. Twisted pair cable
2. Coaxial cable
3. Fiber-optic Cable
Question No: 57 ( Marks: 5 )
Why do we need Inverse Multiplexing? [5]
Data & Video can be broken into smaller portions using Inverse Multiplexing and TX. An
inverse multiplexer (often abbreviated to "inverse mux" or "imux") allows a data stream to be
broken into multiple lower data rate communication links. An inverse multiplexer differs
from a demultiplexer in that each of the low rate links coming from it is related to the others
and they all work together to carry their respective parts of the same higher rate data stream.
By contrast, the output streams from a demultiplexer may be completely independent from
each other and the demultiplexer does not have to understand them in any way.
This is the opposite of a multiplexer which creates one high speed link from multiple low
speed ones.
It can lease a 1.544 Mbps line from a common carrier and only use it fully for
sometime
Or it can lease several separate channels of lower data rates
Voice can be sent over any of these channels
Question No: 58 ( Marks: 5 )
Describe method of checksum briefly?
The sender subdivides data units into equal segments of ‘n’ bits(16 bits).These segments are
added together using one’s complement. The total (sum) is then complemented and appended
to the end of the original data unit as redundancy bits called CHECKSUM. The extended data
unit is transmitted across the network. The receiver subdivides data unit as above and adds all
segments together and complement the result. If the intended data unit is intact, total value
found by adding the data segments and the checksum field should be zero. If the result is not
zero, the packet contains an error & the receiver rejects it
Question No: 59 ( Marks: 10 )
Explain Asynchronous Time Division Multiplexing in detail? Also discuss its advantages
over synchronous TDM?
Asynchronous time-division multiplexing (ATDM) is a method of sending information that
resembles normal TDM, except that time slots are allocated as needed dynamically rather
than preassigned to specific transmitters. ATDM is more intelligent and has better bandwidth
efficiency than TDM.
Time-division multiplexing (TDM) is a type of digital or (rarely) analog multiplexing in
which two or more signals or bit streams are transferred apparently simultaneously as sub-
channels in one communication channel, but are physically taking turns on the channel. The
time domain is divided into several recurrent timeslots of fixed length, one for each sub-
channel. A sample byte or data block of sub-channel 1 is transmitted during timeslot 1, sub-
channel 2 during timeslot 2, etc. One TDM frame consists of one timeslot per sub-channel.
After the last sub-channel the cycle starts all over again with a new frame, starting with the
second sample, byte or data block from sub-channel 1, etc.
asynchronous time-division multiplexing comprising receive circuits (CRl/i) supplying cells
received via input links, transmit circuits (CTl/j) transmitting retransmitted cells on output
links, a buffer memory (MT) storing the received cells and delivering the cells to be
retransmitted and a buffer memory addressing device (SMT) including a write address source
(SAE) and a read address source (fsl/j).
The switching unit further comprises a write disabling circuit (pi) conditioned by a signal
(adl) derived from the content of at least one received cell or a signal (tle) derived from the
absence of any received cell and supplying a disabling signal (spi) and the address source
includes a disabling device (pac, pal) influenced by the disabling signal (spi) so that no
memory location is then occupied in the buffer memory (MT).
Advantages asynchronous TDM:
In asynchronous TDM, the timeslots are not fixed. They are assigned dynamically as needed.
In order to reduce the communications costs in time-sharing systems and multicomputer
communication systems, multiplexing techniques have been introduced to increase channel
utilization. A commonly used technique is Synchronous Time Division Multiplexing
(STDM). In Synchronous Time Division Multiplexing, for example, consider the
transmission of messages from terminals to computer, each terminal is assigned a fixed time
duration. After one user's time duration has elapsed, the channel is switched to another user.
With synchronous operation, buffering is limited to one character per user line, and
addressing is usually not required. The STDM technique, however, has certain disadvantages.
As shown in Figure 1, it is inefficient in capacity and cost to permanently assign a segment of
bandwidth that is utilized only for a portion of the time. A more flexible system that
efficiently uses the transmission facility on an "instantaneous time-shared" basis could be
used instead. The objective would be to switch from one user to another user whenever the
one user is idle, and to asynchronously time multiplex the data. With such an arrangement,
each user would be granted access to the channel only when he has a message to transmit.
This is known as an Asynchronous Time Division Multiplexing System (ATDM). A segment
of a typical ATDM data stream is shown in Figure 2. The crucial attributes of such a
multiplexing technique are:
1. An address is required for each transmitted message, and
2. Buffering is required to handle the random message arrivals.
What is the critical angle, explain?
We have a beam of light moving from a more dense to a less dense medium
o We gradually increase the angle of incidence measured from vertical axis
o As angle of incidence increases, so does the angle of refraction
o The angle at which refracted line lies on the horizontal axis is called
o Critical Angle
How can we use Hamming Code to Correct Burst Errors?
Hamming code (the bits that are power of 2 are check bits, others are message bits, each check
bit forces the parity of some collection of bits, including itself)
Can only correct single bit error. Uses kr check bits to make blocks of km data bits immune to a
single burst error of length k or less (called interleaving).
How many types of Redundancy Checks exist, Write Names and describe any one of
them?
Types of Redundancy Checks
o There are 4 types of redundancy checks used in data communication
Vertical Redundancy Check (VRC)
Longitudinal Redundancy Check (LRC)
–Cyclic Redundancy Check (CRC)
–Checksum
Vertical Redundancy Check (VRC)
o Most common and least expensive
o Also called Parity Check
o A redundant bit called parity bit is appended to every data unit so that total number of
1’s in the unit becomes even including the parity bit
Question No: 51 ( Marks: 2 )
What is the formula to calculate the number of redundancy bits required to correct a bit error
in a given number of data bits? [2]
Messages(frames) consist of m data (message) bits, yielding an n=(m+r)-bit codeword.
Question No: 52 ( Marks: 2 )
What is R G rating of coaxial cable?
Different coaxial cable designs are categorized by their Radio government (
RG ) ratings
Each cable defined by RG rating is adapted for a specialized function:
RG-8
• Used in Thick Ethernet
RG-9
• Used in Thick Ethernet
RG-11
• Used in Thick Ethernet
RG-58
• Used in Thin Ethernet
RG-59
• Used for TV
Question No: 53 ( Marks: 2 )
What are the advantages of thin ethernet?
The advantages of thin Ethernet are :
• reduced cost and
• ease of installation
Because the cable is lighter weight and more flexible than that used in Thicknet
Question No: 54 ( Marks: 3 )
What is the difference between a unicast, multicast, and broadcast address? [3]
Three methods can be used to transmit packets over a network: unicast,
multicast, and broadcast.
Unicast involves communication between a single sender and a single receiver.
This is a type of point-to-point transmission; since the packet is transmitted to
one destination at a time.
Multicast is used to send packets to a group of addresses, represented by a
"group address." In this case, packets are transmitted from a single sender to
multiple receivers. Since the same data packet can be sent to multiple nodes by
sending just one copy of the data, the load of the sender and the overall load of
the network are both reduced.
Broadcast involves sending packets to all nodes on a network simultaneously.
This type of transmission is used to establish communication with another host,
and for DHCP type methods of assigning IP addresses.
Question No: 55 ( Marks: 3 )
T lines are designed for Digital data how they can be used for Analog Transmission ?
T Lines are digital lines designed for digital data however; they can also be used for analog
transmission (Telephone connections). Analog signals are first sampled and the Time
Multiplexed.
Question No: 56 ( Marks: 3 )
What are the three types of Guided Media?
Guided Media, are those media that provide a conduit from one device to another. Three
types are
4. Twisted pair cable
5. Coaxial cable
6. Fiber-optic Cable
Question No: 57 ( Marks: 5 )
Why do we need Inverse Multiplexing? [5]
Data & Video can be broken into smaller portions using Inverse Multiplexing and TX. An
inverse multiplexer (often abbreviated to "inverse mux" or "imux") allows a data stream to be
broken into multiple lower data rate communication links. An inverse multiplexer differs
from a demultiplexer in that each of the low rate links coming from it is related to the others
and they all work together to carry their respective parts of the same higher rate data stream.
By contrast, the output streams from a demultiplexer may be completely independent from
each other and the demultiplexer does not have to understand them in any way.
This is the opposite of a multiplexer which creates one high speed link from multiple low
speed ones.
It can lease a 1.544 Mbps line from a common carrier and only use it fully for
sometime
Or it can lease several separate channels of lower data rates
Voice can be sent over any of these channels
Question No: 58 ( Marks: 5 )
Describe method of checksum briefly?
The sender subdivides data units into equal segments of ‘n’ bits(16 bits).These segments are
added together using one’s complement. The total (sum) is then complemented and appended
to the end of the original data unit as redundancy bits called CHECKSUM. The extended data
unit is transmitted across the network. The receiver subdivides data unit as above and adds all
segments together and complement the result. If the intended data unit is intact, total value
found by adding the data segments and the checksum field should be zero. If the result is not
zero, the packet contains an error & the receiver rejects it
Question No: 59 ( Marks: 10 )
Explain Asynchronous Time Division Multiplexing in detail? Also discuss its advantages
over synchronous TDM?
Asynchronous time-division multiplexing (ATDM) is a method of sending information that
resembles normal TDM, except that time slots are allocated as needed dynamically rather
than preassigned to specific transmitters. ATDM is more intelligent and has better bandwidth
efficiency than TDM.
Time-division multiplexing (TDM) is a type of digital or (rarely) analog multiplexing in
which two or more signals or bit streams are transferred apparently simultaneously as sub-
channels in one communication channel, but are physically taking turns on the channel. The
time domain is divided into several recurrent timeslots of fixed length, one for each sub-
channel. A sample byte or data block of sub-channel 1 is transmitted during timeslot 1, sub-
channel 2 during timeslot 2, etc. One TDM frame consists of one timeslot per sub-channel.
After the last sub-channel the cycle starts all over again with a new frame, starting with the
second sample, byte or data block from sub-channel 1, etc.
asynchronous time-division multiplexing comprising receive circuits (CRl/i) supplying cells
received via input links, transmit circuits (CTl/j) transmitting retransmitted cells on output
links, a buffer memory (MT) storing the received cells and delivering the cells to be
retransmitted and a buffer memory addressing device (SMT) including a write address source
(SAE) and a read address source (fsl/j).
The switching unit further comprises a write disabling circuit (pi) conditioned by a signal
(adl) derived from the content of at least one received cell or a signal (tle) derived from the
absence of any received cell and supplying a disabling signal (spi) and the address source
includes a disabling device (pac, pal) influenced by the disabling signal (spi) so that no
memory location is then occupied in the buffer memory (MT).
Advantages asynchronous TDM:
In asynchronous TDM, the timeslots are not fixed. They are assigned dynamically as needed.
In order to reduce the communications costs in time-sharing systems and multicomputer
communication systems, multiplexing techniques have been introduced to increase channel
utilization. A commonly used technique is Synchronous Time Division Multiplexing
(STDM). In Synchronous Time Division Multiplexing, for example, consider the
transmission of messages from terminals to computer, each terminal is assigned a fixed time
duration. After one user's time duration has elapsed, the channel is switched to another user.
With synchronous operation, buffering is limited to one character per user line, and
addressing is usually not required. The STDM technique, however, has certain disadvantages.
As shown in Figure 1, it is inefficient in capacity and cost to permanently assign a segment of
bandwidth that is utilized only for a portion of the time. A more flexible system that
efficiently uses the transmission facility on an "instantaneous time-shared" basis could be
used instead. The objective would be to switch from one user to another user whenever the
one user is idle, and to asynchronously time multiplex the data. With such an arrangement,
each user would be granted access to the channel only when he has a message to transmit.
This is known as an Asynchronous Time Division Multiplexing System (ATDM). A segment
of a typical ATDM data stream is shown in Figure 2. The crucial attributes of such a
multiplexing technique are:
1. An address is required for each transmitted message, and
2. Buffering is required to handle the random message arrivals
Question No: 21 ( Marks: 2 )
Write down three characteristics of Sine Wave.
Solution: p_61
Amplitude
Period / Frequency
Phase
Question No: 22 ( Marks: 2 )
A Sine wave has a frequency of 6 Hz. What is its period?
Solution: p_63
T = 1/ f
T = 1/6
=0.17
Period: Amount of time (in seconds) a signal need to complete one cycle
Frequency: Number of cycles completed in one second
Question No: 23 ( Marks: 3 )
Give similarities between 4 QAM & 8 QAM.
Solution: p_96
In both case no. of amplitude shifts is more than the no. of phase shifts
Because amplitude changes are susceptible to Noise, number of phase
shifts used by QAM is always larger that the amplitude shifts
Question No: 24 ( Marks: 3 )
CS601_MIDTERM_SOLVE_PAPER ( COMPOSED BY SADIA ALI SADII
What is digital signal? Give an example
Solution: p_58-59
A digital signal is discrete. It can have only a limited number of defined
values, often as simple as 1s and 0s
The transition of a digital signal from value to value is instantaneous like a
light being switched ON and OFF
Example:
Data stored in the memory of a computer in the form of 1s and 0s. it is
usually converted to a digital signal when it is transferred from one
position to the other inside or outside the computer.
Question No: 25 ( Marks: 5 )
Difference between Phase Modulation(PM) with Frequency Modulation(FM)?
Solution:
Lecture # 19, p_99
Question No: 26 ( Marks: 5 )
Write down the criteria or technique that we follow for assigning integral values to
sampled signals and also its conversion into binary format. Explain it?
Solution: p_83-84
Lecture # 16 Quantization
Explain redundancy in terms of error detection mechanism.
Ans :handouts pg no 170
. What is differential Manchester encoding scheme?
Differential Manchester
o Inversion at the middle of the bit interval is used for Synchronization but presence or
absence of an additional transition at the beginning of bit interval is used to identify a
bit
o A transition means binary 0 & no transition means binary 1
o Requires 2 signal changes to represent binary 0 but only one to represent binary 1
Write down the four architectures of LAN?
Architectures for LANS
Dominated by 4 architectures:
o Ethernet, Token Bus, Token Ring � Standards of IEEE and a part of its Project 802
o Fiber Distributed Data Interface (FDDI) � ANSI Standard
What is Network Virtual Terminal (NVT)?
NVT is a software version of a physical terminal and allows a user to log on to plication created
emulation of terminal at the remote host. To do so the application created emulation of terminal at
the remote host. (hand outs pg no 53)
. What are the basic types of Telephone Network?
A telephone network is a telecommunications network used for telephone calls between two or more
parties.
There are a number of different types of telephone network:
• A fixed line network where the telephones must be directly wired into a single telephone
exchange. This is known as the public switched telephone network or PSTN.
• A wireless network where the telephones are mobile and can move around anywhere within
the coverage area.
• A private network where a closed group of telephones are connected primarily to each other and
use a gateway to reach the outside world. This is usually used inside companies and call
centres and is called a private branch exchange (PBX)
What are the uses of Extremely High Frequency?
• • Use space propagation
• o Used for Radar , Satellite and Experimental Communication
What is meant by Transmission Impairments?
Ans: Transmission media are not perfect .What is sent is not what is received.
There are three types of transmission impairments
1) Attenuation 2) Distortion
3) Noise
Question No: 47 ( Marks: 5 )
Name and discuss briefly the bits in the HDLC control field. [5]
Control field in the I-Frame and S-Frame is two bytes long to allow seven bits of sending and
receiving sequence
However the control field in the U-Frame is still one byte.
Information field contains the user’s data in an I-Frame and Network Management
information in a U-Frame
o An S-Frame has no information field
o Its length can vary from one network to another but remains fixed within each network
o It is possible to send Control information in the information field of the I-Frame along
with data.
o This process is called Piggybacking
Question No: 49 ( Marks: 5 )
What is satellite communication?
Satellite Communication o Satellite TX is much like line-of-sight transmission in which one of the stations is the satellite
orbiting around the earth
o The principle is similar to the terrestrial microwave with a satellite acting as a Super tall
antenna and Repeater
o Although in satellite TX, signals must still travel in straight line, the limitations imposed on
distance by curvature of earth are reduced
o In this way satellites can span Continents and oceans with one bounce off the satellite
o Satellite can provide TX capability to and from any location on earth no matter how remote
o This advantage makes high quality communication available to underdeveloped parts of the
worked at almost no cost
o Satellites themselves are very expensive but leasing a freq or time on one can be cheap
FAQs
Question: What do we mean by the term session?
Answer: Session is the period of time a user interfaces with an application. The user session
begins when the user accesses the application and ends when the user quits the
application.
Question: How can I define Data communication?
Answer: Data Communication is the exchange of data (in the form of 0’s and 1’s) between
two devices (computers) via some form of the transmission medium. Data
communication is communication between computers. Data communication
concerns the exchange of digital data between computers. Nowadays, data
communication between computers also supports digital speech telephone and
videophone, thus supporting direct communication between people.
Question: How could it be more secure using distributed processing?
Answer: In this case security is achieved by providing the user with limited access. It means
that user can only perform those tasks which are allowed by system designer. Its'
simple example is bank's ATM. Where user can't perform operations on database
other than provided.
Question: What does the terms transit and response time mean? Also tell me about the topic peak load
periods.
Answer: Transit time is the time taken by the message to travel from source to destination.
Response time is the time of response (acknowledgement) from destination to
source. Peak load periods are those periods of time in which number of users on a
network are more than normal time.
Question: What are the advantages of networking?
Answer: • Files can be stored on a central computer (the file server) allowing data to be
shared throughout an organization. • Files can be backed up more easily when they
are all on a central fileserver rather than when they are scattered across a number of
independent workstations. • Networks also allow security to be established, ensuring
that the network users may only have access to certain files and applications. •
Software and resources can be centrally managed. • Network versions of software
often allow for their speedy installation on workstations from the file server. •
Expensive devices such as laser printers or scanners can be shared. • Users can
access their files from any workstation
Question: What are different factors to choose a network topology?
Answer: Working conditions of network, working scenarios, arrangement of links and
devices. Depending upon our network what actually we are dealing with and in
which geographical area our devices are present, small area available or have large
area. All these factors are considered when choosing a Topology.
Question: What is the relative status of the devices to be linked?
Answer: The geographical area in which our devices are present is the relative status of
devices.
Question: What is the definition of Hub?
Answer: Hub is a common connection point for devices in a network. Hubs are commonly
used to connect segments of a LAN. A hub contains multiple ports. When a packet
arrives at one port, it is copied to the other ports so that all segments of the LAN can
see all packets. A passive hub serves simply as a conduit for the data, enabling it to
go from one device (or segment) to another. So-called intelligent hubs include
additional features that enable an administrator to monitor the traffic passing
through the hub and to configure each port in the hub. Intelligent hubs are also
called manageable hubs. A third type of hub, called a switching hub, actually reads
the destination address of each packet and then forwards the packet to the correct
port.
Question: What do we mean by "TAP"?
Answer: A tap is a connection to a coaxial cable in which a hole is drilled through the outer
shield of the cable so that a clamp can be connected to the inner conductor of the
cable. Instead of cutting the cable and attaching connectors to both ends of the
severed coaxial cable,
Question: Give some detail about "fault tolerance".
Answer: Fault tolerance means the system will not fail because any one component fails. The
system also should provide recovery from multiple failures. Components are often
over engineered or purposely underutilized to ensure that while performance may be
affected during an outage the system will perform within predictable, acceptable
bounds
Question: What is PDU in OSI Model?
Answer: Normally a communication request originates at the highest layer (Application
Layer). The request is passed down through the lower layers in the form of a packet
called a protocol data unit (PDU). Layers in the protocol stack communicate with
their adjacent layers via one or more Service Access Points (SAP). Each succeeding
layer in the stack adds its own information to the PDU that will be read by its
counterpart (peer) layer on the receiving system. Once the data arrives at the lower
layers, the PDU is encoded into data frames and placed onto the cable for
transmission. The data frames make their way to the receiving system and the entire
process is reversed as the PDU makes its way up the protocol stack. As it moves up
the stack, each layer "unwrap" the PDU and receives the information from its peer
layer on the sending system.
Question: What is the difference between radio and microwave?
Answer: Although there is no clear-cut demarcation between radio and microwave,
electromagnetic waves ranging in frequencies between 3 KHz and 1 GHz are
normally called radio waves; waves ranging in frequencies between 1 GHz and 300
GHz are called microwaves. Radio waves are used for multicast communications,
such as radio and television systems.
Question: What is the difference between internet and intranet?
Answer: Internet The Internet is a system of linked networks that are worldwide in scope and
facilitate data communication services such as remote login, file transfer, electronic
mail, the World Wide Web and newsgroups. With the meteoric rise in demand for
connectivity, the Internet has become a communications highway for millions of
users. The Internet was initially restricted to military and academic institutions, but
now it is a full-fledged conduit for any and all forms of information and commerce.
Internet websites now provide personal, educational, political and economic
resources to every corner of the planet. Intranet A network based on TCP/IP
protocols (an internet) belonging to an organization, usually a corporation,
accessible only by the organization's members, employees, or others with
authorization. An intranet's Web sites look and act just like any other Web sites, but
the firewall surrounding an intranet fends off unauthorized access. Like the Internet
itself, intranets are used to share information. Secure intranets are now the fastestgrowing
segment of the Internet because they are much less expensive to build and
manage than private networks based on proprietary protocols.
Question: What is the difference between hub and switch?
Answer: On the outside, hubs and switches appear very similar in that they both have a
number of RJ-45 jacks for connecting devices. Inside, however, they work very
differently. To understand why switches provide so much more functionality than
hubs, you must understand a fundamental limitation of (non-switched) Ethernet:
there can only be one device transmitting on a segment at any given time. If two or
more devices attempt to transmit at the same time, a collision occurs. (In fact, an
Ethernet segment where only one conversation can occur is called a collision
domain.) After a collision, all devices must retransmit. As you can imagine, as the
number of devices on an Ethernet segment increases, the probability for collisions
increase. Because devices must spend more time retransmitting data, the network is
perceived to be slow. Before the advent of switches, a network could be divided into
segments with a device called a bridge. Bridges have two Ethernet ports. As traffic
flows through a network, a bridge learns which devices (identified by the MAC or
"hardware" address) are on each side. The bridge then makes decisions to forward or
not forward each packet to the other side based on where the destination device is
located. A bridge thus divides a network into two collision domains, allowing two
independent "conversations" to occur. If a bridge is placed intelligently (e.g.,
separating two departments and their respective file servers), they can improve
network efficiency. Hubs do no processing on network traffic--they simply repeat
the incoming signal to all available ports. On a switch, every port acts as a bridge. If
each switch port is connected to a single device, each device can, in principle, act
independently of every other device. For example, consider a switch with the
following devices attached: computer 1 computer 2 computer 3 printer file server
uplink to the Internet In this case, computer 1 could be printing a document, while
computer 2 connects to a files server, while computer 3 accesses the Internet.
Because the switch intelligently forwards traffic only to the devices involved, there
can be multiple independent simultaneous conversations.
Question: How different layers of OSI model are implemented?
Answer: The OSI 7 layers model has clear characteristics. Layers 7 through 4 deal with end
to end communications between data source and destinations. Layers 3 to 1 deal
with communications between network devices. On the other hand, the seven layers
of the OSI model can be divided into two groups: upper layers (layers 7, 6 & 5) and
lower layers (layers 4, 3, 2, 1). The upper layers of the OSI model deal with
application issues and generally are implemented only in software. The highest
layer, the application layer, is closest to the end user. The lower layers of the OSI
model handle data transport issues. The physical layer and the data link layer are
implemented in hardware and software. The lowest layer, the physical layer, is
closest to the physical network medium (the wires, for example) and is responsible
for placing data on the medium.
Question: What is the difference between WAP and GPRS?
Answer: Wireless Application Protocol, a secure specification that allows users to access
information instantly via handheld wireless devices such as mobile phones. Wireless
Application Protocol (or WAP) is envisioned as a comprehensive and scalable
protocol designed to use with mobile phones using Short Message Services (SMS),
General Packet Radio Services (GPRS), CDMA and GSM.
Question: What are routers, repeaters and bridges?
Answer: Router: Routers relay packets among multiple interconnection networks. Router is
device that determines the next network point to which a data packet should be
forwarded enroute toward its destination. Routers create or maintain a table of the
available routes and use this information to determine the best route for a given data
packet.
Question: What do we mean by capacity of the channel?
Answer: Channel capacity: The maximum possible information transfer rate through a
channel, subject to specified constraints.
Question: What is remote data communication?
Answer: Data Communication is considered remote, if the devices are farther apart.
Question: Explain VPN (Virtual Private Network
Answer: A virtual private network (VPN) is a way to use a public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users with
secure access to their organization's network. A virtual private network can be
contrasted with an expensive system of owned or leased lines that can only be used
by one organization. The goal of a VPN is to provide the organization with the same
capabilities, but at a much lower cost.
Question: Define encryption of data.
Answer: Encryption of data: The translation of data into a secret code. Encryption is the most
effective way to achieve data security. To read an encrypted file, you must have
access to a secret key or password that enables you to decrypt it. Unencrypted data is
called plain text; encrypted data is referred to as cipher text.
Question: Can we implement OSI in wireless networks?
Answer: Wireless Application Protocol (WAP), a secure specification that allows users to
access information via handheld wireless devices, specifies architecture based on
layers that follow the OSI model fairly closely. WAP defines network architecture
for content delivery over wireless networks. Central to the design of WAP is a
network stack based on the OSI model. WAP implements several new networking
protocols that perform functions similar to the well-known Web protocols HTTP,
TCP, and SSL.
Question: What is distributed processing?
Answer: It refers to any of a variety of computer systems that use more than one computer,
or
processor, to run an application. This includes parallel processing, in which a single
computer uses more than one CPU to execute programs. More often, however,
distributed processing refers to local-area networks (LANs) designed so that a single
program can run simultaneously at various sites. Most distributed processing
systems contain sophisticated software that detects idle CPUs on the network and
parcels out programs to utilize them. Another form of distributed processing
involves distributed databases, databases in which the data is stored across two or
more computer systems. The database system keeps track of where the data is so
that the distributed nature of the database is not apparent to users. CS601 Subjecive
What is zero frequency & how it effect on signal? Done with cs601
If a frequency does not change at all and maintain constant level of voltage the entire time, it is
called zero frequency. This is also called DC Component I.e. a component with zero frequency. When
a signal contains a DC Component, it cannot travel through a Tx. Medium that cannot handle DC
components.
If a signal does not change, it will never complete any cycles, and frequency is no. of cycles in 1
second so Freq = 0
OR
zero frequency means a signal has no change in one second. When a signal contains zero frequency,
it cannot travel through a Tx. Medium that cannot handle it.
Consider a dialup modem for modulating digital data to analog signals suggest the most efficient
technique used for modulation?
Quadratue Amplitude Modulation(QAM) is the most efficient of these options and is the
mechanism used in all modern modems
Despite of having digital signals why we need to have digital to analog conversion of signal?
Explain with example.
We might want to send a digital signal coming out of computer through a medium designed for
analog signals
Example: When you Tx data from one computer to the other using a public telephone line. Original
data is digital but because telephone wires carry analog signal, original data must be converted.
Sketch the Manchester’s encoding for the stream “01100”.
011 0 0
Amplitude
Manchester
Time
Consider a carrier signal whose phase & frequency remain constant varying amplitude, which kind
of modulation will take place?
ASK (Amplitude Shift Keying) will take place when the peak amplitude of a signal remains constant
during each bit duration. Its value depends on bits (0 or 1).
Calculate bit rate & bund rate for an analog signal transmitting 500 signals per sec, where each
signal element carries 5 bit.
Baud rate = Number of Signal elements
Baud rate = 500 bauds/sec
Bit rate = Baud rate * number of bits per Signal element
Bit rate = 500 * 5 = 2500 bps
Frequency is constant what effect on signal?
It is one of the two extreme frequencies, if a signal does not change atll and maintain a constant
voltage level all the time. In such cases, frequency is going to be zero. If a signal does not change, it
will never complete any cycles, and frequency is no. of cycles in 1 second so Freq = 0
Types of transmission medium
1. Twisted wire 300 bps – 10 Mbps low
2. Microwave 256kbps – 100 Mbps low
3. Coaxial cable 56 kbps – 200 Mbps low
4. Fiber optic cable 500 kbps – 10 Gbps High
Why RZ requires more bandwidth than NRZ?
beacuse it requires two signal changes to encode one bit and therefore occupies more
BANDWIDTH.
In mobile communication which kind of Signal conversion mechanism is used and why?
In which scheme the bandwidth seems to be higher?
RZ scheme.
A company uses NRZ scheme what problems it will face?
Calculate bandwidth in KHz if signal per cycle = 6sec.
Which system you will prefer in the polar type, if there is a large no. of computers in a network.
calculate bandwidth for AM in MHz if frequency and baud rate are equal in this case what will be
frequency starting from 8
-Bandwidth= 2*8 =0.016 Mhz (not confirm)
Different Types of Polar and Bipolar
Polar:
1. NRZ
• NRZ-I
• NRZ-L
2. RZ
3. Biphase
• Manchester
• Differential Manchester
Bipolar
1. AMI
2. B8ZS
3. HDB3
Draw binary values 0001110101 in NRZ-I
Amplitude
Time
0 0 0 1 1 1 0 1 0 1
NRZ-I
Calculate the maximum baud rate for FSK Bandwidh is 12,000Hz; the carrier must be saperated by
2000 Hz (f1-f0). Tx is in full duplex mode.
For FSK, if fc1 and fc2 are the carrier frequencies, then:
BW=Baud Rate + (fc1 – fc0)
Baud rate is the same as bit rate
By putting value
12000=Baud rate +(2000) = 12000 - 2000 = 1000 Hz
Define Bandwith and its formula
Bandwidth refers to the range of the component frequencies and Frequency Spectrum refers to
the elements within that range. Bandwidth: of a signal is the width of the frequency spectrum
To calculate Bandwidth, subtract the lowest frequency from the highest frequency
BW= FH-FL
Which is more subject to noise FSK or PSK and write their limitations "2 marks"
The limiting factors of FSK are the physical capabilities of the carrier. Although FSK shifts between two carrier frequencies, it is easier to analyze as two co-existing
frequencies. PSK is not susceptible to the noise degradation that affects ASK, nor to the bandwidth limitations
of FSK. Limitations of PSK:
–PSK is limited by the ability of the equipment to distinguish small differences in phase
–This factor limits its potential bit rate
find the bit rate Bit Rate=Baud Rate * Number of bits per signal element
Five common units of frequency corresponding to time ? "5 marks
Frequency is measured in hertz, There are 5 units used in Hertz
Seconds____Hertz Milliseconds____Kilohertz
Microseconds____Megahertz
Nanoseconds____Gigahertz
Picoseconds____Terahertz
Mc100401285 [email protected]
CS601-Data Communication
Latest Solved subjective from Midterm Papers
May 08,2011
Lectures 1-22 Mc100401285 [email protected] Moaaz Siddiq Latest subjectives
MIDTERM EXAMINATION
Spring 2010
Question No: 21 ( Marks: 2 )
How many types of Bipolar encoding scheme exist?
Answer: (PAGE NO.76)
Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is
________ that of A.There are three types of bipolar encoding:
1. AMI (Alternate Mark Inversion)
2. B8ZS
3. HDB3
Question No: 22 ( Marks: 2 )
Give methods of Analog to Analog conversion.
Answer: (PAGE 95)
Analog Conversion:
Representation of analog information by an analog signal is Analog –to- analog conversion.
Question No: 23 ( Marks: 3 )
What is frequency spectrum?
Answer: (PAGE 66)
Frequency spectrum is the collection of a l l the components frequencies it contains.
Question No: 24 ( Marks: 3 )
How bandwidth of a Modem is measured?
Answer: (PAGE 112)
Bandwidth of a modem is not measured in bytes, it is measured in bits. Modem Speed –ASK
(full-duplex)
Effective bandwidth of a telephone line is 2400 Hz, the maximum baud rate is also 2400.
Baud rate and bit rate are equal for ASK, so maximum bit rate is also 2400 bps.
Mc100401285 [email protected]
Question No: 25 ( Marks: 5 )
What do you understand by the term DCE? Explain DCE. [5]
Answer: (PAGE 101)
Any device that transmits or receives signal through network is DCE.
It is any functional unit that transmits or receives data in the form of an analog or digital
signal
through a network.
At the physical layer DCE takes data generated by DTE, converts it to the signal.
Question No: 26 ( Marks: 5 )
Describe different types of NRZ encoding scheme?
Answer:
In NRZ encoding the level of signal is either positive or negative. NRZ is
classified into 2 types:
NRZ-L NRZ-I
NRZ-L:
Level of the signal depends on the type of bit it represents.
Positive voltage usually means the bit is a 1 and a negative voltage usually means the bit
is a 0.
NRZ-I:
The inversion of the level represents a 1 bit. A bit 0 is
represented by no change.
NRZ-I is superior to NRZ-L.(PAGE 73)
Mc100401285 [email protected]
MIDTERM EXAMINATION
Spring 2010
Question No: 21 ( Marks: 2 )
Define Sampling Rate.
Answer: (page82)
The accuracy of any digital reproduction of an analog signal depends upon the o. of
samples taken
Question No: 22 ( Marks: 2 )
Write down the types of digital to analog modulation.
Answer: (PAGE 85)
Types of digital to analog modulation
ASK
FSK
PSK
QAM
Question No: 23 ( Marks: 3 )
What is periodic signal?
Answer: (page58)
A signal is called Periodic if it completes a pattern within a measurable time frame called
a Period and then
repeats that pattern over identical subsequent Periods
Question No: 24 ( Marks: 3 )
How bandwidth of a Modem is measured?
Answer: (page111)
Bandwidth of a modem is not measured in bytes, it is measured in bits.
Modem Speed –ASK (full-duplex)
Effective bandwidth of a telephone line is 2400 Hz, the maximum buad rate is
also 2400.
Baud rate and bit rate are equal for ASK, so maximum bit rate is also 2400 bps.
Mc100401285 [email protected]
Question No: 25 ( Marks: 5 )
Briefly describe Return to Zero (RZ) encoding scheme?
Answer: (page75)
§ Any time, data contains long strings of 1’s or 0’s, Rx can loose its timing
§ In unipolar, we have seen a good solution is to send a separate timing signal but this
solution is both
expensive and full of error
§ A better solution is to somehow include synch in encoded signal somewhat similar to
what we did in
NRZ-I but it should work for both strings of 0 & 1
§ One solution is RZ encoding which uses 3 values : Positive, Negative and Zero
§ Signal changes not b/w bits but during each bit
§ Like NRZ-L , +ve voltage means 1 and a –ve voltage means 0, but unlike NRZ- L, half
way through
each bit interval, the signal returns to zero
§ A 1 bit is represented by positive to zero and a 0 is represented by negative to zero
transition
§ The only problem with RZ encoding is that it requires two signal changes to encode
one bit and therefore
occupies more BANDWIDTH
§ But of the 3 alternatives we have discussed, it is most effective value.
Question No: 26 ( Marks: 5 )
Compare Phase Modulation (PM) with Frequency Modulation (FM)?
Answer: (page 96-97)
Phase modulation (PM)
Ø Simpler hardware requirements
Ø Phase is modulated with the amplitude
Ø Amplitude & Frequency of the carrier signal remain constant
Frequency Modulation (FM)
Ø Frequency of carrier signal is changed according to the amplitude of modulating signal
Ø Amplitude and Phase of the carrier signal remain constant
FM Bandwidth
Bandwidth of FM signal (modulated signal) = 10 * bandwidth of modulating signal
Significant spectrum of FM
audio = 15 KHz
Minimum 150 KHz bandwidth
Mc100401285 [email protected]
MIDTERM EXAMINATION
Spring 2010
Question No: 21 ( Marks: 2 )
Write down three characteristics of Sine Wave.
Answer : (page no.59)
v Amplitude
v Period/Frequency
v Phase
Question No: 22 ( Marks: 2 )
A Sine wave has a frequency of 6 Hz. What is its period?
Answer: (page 61)
F= 6 , t= ?
T = 1/f = 1/6 = 0.17 sec
Question No: 23 ( Marks: 3 )
Give similarities between 4 QAM & 8 QAM.
Answer: (page 92)
In both case no. of amplitude shifts is more than the no. of phase shifts
Because amplitude changes are susceptible to Noise , number of phase shifts used by
QAM is always larger than
the amplitude shifts
Question No: 24 ( Marks: 3 )
What is digital signal? Give an example
Answer: (page 57)
A digital signal is discrete. It can have only a limited number of defined values, often as
simple as 1s and 0s
The transition of a digital signal from value to value is instantaneous like a light being
switched ON and OFF.
Mc100401285 [email protected]
Question No: 25 ( Marks: 5 )
Difference between Phase Modulation(PM) with Frequency Modulation(FM)?
Answer: (page 96-97)
Phase modulation (PM)
Ø Simpler hardware requirements
Ø Phase is modulated with the amplitude
Ø Amplitude & Frequency of the carrier signal remain constant
Frequency Modulation (FM)
Ø Frequency of carrier signal is changed according to the amplitude of modulating signal
Ø Amplitude and Phase of the carrier signal remain constant
FM Bandwidth
Bandwidth of FM signal (modulated signal) = 10 * bandwidth of modulating signal
Significant spectrum of FM
audio = 15 KHz
Minimum 150 KHz bandwidth
Question No: 26 ( Marks: 5 )
Write down the criteria or technique that we follow for assigning integral values to
sampled signals
and also its conversion into binary format. Explain it?
MIDTERM EXAMINATION
Spring 2010
Question No: 21 ( Marks: 2 )
How does noise affect FSK?
Answer: (P170)
The duration of the noise is normally longer than the duration of a bit which means that when
noise affects data, it affects a set of bits.
Question No: 22 ( Marks: 3 )
Define Bit interval and Bit rate.
Mc100401285 [email protected]
Answer: (P68)
Bit Interval and Bit Rate
Most digital signals are aperiodic and thus Period and Frequency are not the appropriate
terms to describe them
Bit Interval (seconds)
Time required to send one single bit
Bit Rate (bps)
Number of bits sent per second
Question No: 23 ( Marks: 5 )
Write down the names of layers present in TCP/IP Protocol Suite?
Answer: (P54)
Physical (physical standards)
Data Link (N/w Interface)
Network (Interconnectivity)
Transport (Transport Functions)
Application (Session, Pres, app of OSI)
Question No: 24 ( Marks: 10 )
The data points of a constellation are at (4,0) and (6,0). Draw the constellation.
Show the amplitude and phase for each point. Is the modulation ASK, PSK, or
QAM? How many bits per baud can one send with this constellation? [10]
Answer:
Hint: 2 amplitudes (4,6) , ASK , bit/baud
MIDTERM EXAMINATION
Spring 2009
Question No: 21 (Marks: 2)
What is simplex mode of transmission?
Answer:
Communication is Unidirectional
Only one of the two stations can transmit
Other can only receive (P34)
Question No: 22 (Marks: 3)
What is HDB3.
Answer:
Alteration of AMI adopted in Europe and Japan
Introduces changes into AMI, every time four consecutive zeros are encountered instead
of waiting for eight
zeros as in the case of B8ZS. (P78)
Mc100401285 [email protected]
Question No: 23 (Marks: 5)
Write a note on Full duplex mode of transmission.
Answer:
Both stations can transmit and receive simultaneously
Two way street with traffic flowing in both directions at the same time
Signals traveling in either direction share the capacity of the link
The sharing can take place in two ways:
Either the link must contain two physically separate transmission paths:
v One for sending and
v One for receiving
Question No: 24 (Marks: 10)
In your view which one is best either B8ZS or HDB3 and why? Write down salient
features of both? What is meant by polarity of 1 since the last substitution?
MIDTERM EXAMINATION
Spring 2009
Question No: 21 ( Marks: 2 )
What is purpose of distributed processing?
Answer:
Multiple computers working on a problem can solve a problem faster than a computer
working alone.
(P13)
Question No: 22 ( Marks: 3 )
What is HDB3?
Answer:
Alteration of AMI adopted in Europe and Japan
Introduces changes into AMI, every time four consecutive zeros are encountered instead
of waiting for eight
zeros as in the case of B8ZS. (P78)
Question No: 23 ( Marks: 5 )
Differentiate between the following terms. [10 marks]
(a) Syntax and Semantics of protocol.
Mc100401285 [email protected]
Answer:
Syntax:
Communication between peer entities (P21)
Semantics:
Client/server (P21)
(b) Network management and exchange management.
Answer:
Exchange Management
Error Detection and Correction (P17)
Network management (P17)
Security
(c) Monolithic and structured.
Answer: (P21)
Monolithic
Communications is a complex task
To complex for single unit
Structured
Structured design breaks down problem into smaller units
Layered structure
Question No: 24 ( Marks: 10 )
Differentiate between the following terms. a)
Frequency spectrum and bandwidth.
Answer: (P66)
Frequency Spectrum / Bandwidth
Frequency Spectrum: of a signal is the collection of all the component frequencies it
contains
It is shown using a Frequency domain graph
Bandwidth: of a signal is the width of the frequency spectrum
In other words, Bandwidth refers to the range of the component frequencies and
Frequency Spectrum refers to
the elements within that range
(b) Bandwidth and throughput.
Answer: (P144)
Measurement of how fast data can pass through a point o In other words, if we consider any
point in the TX Medium as a wall through which bits pass, then throughput is the number of
bits
that can pass this wall in second
Mc100401285 [email protected]
(c) Bit interval and bit rate.
Answer: (P68)
Bit Interval and Bit Rate
Most digital signals are aperiodic and thus Period and Frequency are not the appropriate
terms to describe them
Bit Interval (seconds)
Time required sending one single bit
Bit Rate (bps)
Number of bits sent per second Frequency is constant what effect on signal (2marks)
Frequency of signal is varied to represent binary 1 or 0
o The frequency of the signal during each bit duration is constant and depends on the bit
(0 or 1)
Type of Transmission Medium � Medium defines speed at which data can travel
� Fiber Optic Cable
� 100Mbps and 10 Mbps
� Hardware
� Software
We might want to send a digital signal coming out of computer through a medium
designed for analog signals
o For example, To send data from one place to the other using a Telephone line
o This is called “Digital-to-Analog Conversion” or “Modulating a digital Signal”