CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
SMUAPR15
ASSESSMENT_CODE BCA3040_SMUAPR15
QUESTION_TYPE DESCRIPTIVE_QUESTION
QUESTION_ID
QUESTION_TEXT
73512
Explain the Digital Pulse Code and Adaptive Differential Pulse Code
modulation techniques.
(1 mark for each point)
SCHEME OF
EVALUATION

During the PCM process, the difference between successive
input sample signals is minimal. A common technique used
in speech coding is to predict the value of the next sample
from that of the preceding samples.

This is possible because of the correlations in speech
samples due to the effect of vocal tract and the vibrations of
the vocal chords.

DPCM schemes quantize the difference between the original
and the predicted signals. This means a reduction in the
number of bits used per sample over that used for PCM.
Using DPCM can reduce the bit rate of voice transmission
down to 48Kbps. DPCM can be described as predictive
coding scheme.

The first part of DPCM works like PCM in that input signal is
sampled at a constant sampling frequency, and the samples
are modulated using amplitude modulation.

The sampled input signal is then stored in a predictor. The
predictors send the stored sample signal through a
differentiator. The differentiator compares he current
sample signal with the previous sampling signal and sends it
to the quantizing and coding phase of PCM.

After quantizing and coding, the difference signal is
transmitted. At the receiver, the difference signal is dequantized, added to a sample signal stored in a predictor
and sent to a low-pass filter that reconstructs the original
input signal.

Although DPCM reduce the bits rate for voice transmission,
the uniform quantization used means that large sample
signals have higher signal-to-noise ratio than small sample
signals, so voice quality is better at higher signals.
Adaptive Differential Pulse Code
modulation:
(2+1)marks
o
In ADPCM the predictor and quantizer are adaptive.
It adapts the quantization levels of different signals
that are generated during the DPCM process. If the
difference signal is low, ADPCM reduces the size of
the quantization levels. If the difference signal is high
ADPCM increases the size of quantization levels.
o
The quantization level is adapted to the size of the
input difference signal, generating a uniform signalto-noise ratio throughout the dynamic range of the
difference signal.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73514
Discuss the important requirements for wireless LAN.
QUESTION_TEXT
SCHEME OF
EVALUATION
The important requirements of wireless LAN
are:
(1x10)M
Throughput: The medium access control protocol should make
efficient use of wireless medium to maximize capacity.
Number of nodes: Wireless LANs may need to support hundreds of
nodes across multiple cells.
Connection to backbone LAN: IN most cases, interconnection with
stations on a wired backbone LAN is required. There may also need
to be accommodation for mobile users and ad hoc wireless network.
Service area: A typical coverage area for a wireless LAN has a
diameter of 100m to 300m.
Battery power consumption: Mobile workers use battery-powered
workstations that need to have a long battery life when used with
wireless adapters.
Transmission robustness and security: Wireless LAN must permit
reliable transmission even in a noisy environment and should provide
some level of security from eavesdropping.
Collocated network operation: Interference between the LANs is
possible when two or more wireless LANs operate in the same area
or in some area. Such interference may thwart the normal operation
of a MAC algorithm and may allow unauthorized access to a
particular LAN.
License Free operation: Users would prefer to buy and operate
wireless LAN products without having to secure a license for the
frequency band used by the LAN.
Handoff/roaming: The MAC protocol used in the wireless LAN
should enable mobile stations to move from one cell to another
without any problems.
Dynamic configuration: The MAC addressing and network
management aspects of the LAN should permit dynamic and
automated addition, deletion, and relocation of end systems without
disruption to other users.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73516
QUESTION_TEXT What is congestion control? Explain one congestion control technique.
SCHEME OF
EVALUATION
Congestion control is concerned with controlling traffic entry into a
network so as to avoid congestive collapse by attempting to avoid
oversubscription of any of the processing or link capabilities of the
intermediate nodes and networks and taking resource reducing steps,
such as reducing the rate of sending packets. (2 marks)
Explain any one of the following techniques:
Backpressure
Choke packet
Implicit congestion signalling
Explicit congestion signaling
(8 marks)
QUESTION_TYPE DESCRIPTIVE_QUESTION
QUESTION_ID
QUESTION_TEXT
125759
Explain the different types of errors and the error detecting methods.
Different types of errors are:
Single bit error: It means only 1 bit of a given data unit is changed from 1 to
0 or from 0 to 1. Single bit errors are the least likely type of error in serial
data transmission. For example of 00000010 was sent, but 00001010 was
received, meaning single bit error resulted 2M
Burst Error: Means 2 or more bits in the data unit have changed from 1 to 0
or from 0 to 1. Suppose that the data 0100010001000011 was sent, but
0101110101100011 was received. Note that the burst error results. More
bits in the data unit have changed. Error does not mean that the errors
occur in consecutive bits. The length of the burst is measured from the first
corrupted bit to the last corrupted bit. Some bits in between may not have
been corrupted. A burst error is more likely to occur than the single-bit
errors.
3M
Error Detection methods:
The different error detection methods are:
SCHEME OF
EVALUATION
1. Parity checking method
2. Cyclic Redundancy Check (CRC)
Parity Checking is a simple error detection method used with character
oriented protocols. One bit in every character bit sequence is reserved for
parity. This bit is set by the transmitter to 0 or 1 so that the total number of
one bit in the character is always even or always odd. The receiver checks
for parity bit of each character to see if it as expected. Parity checking is
effective in detecting an odd number of bit errors in an character. If even
numbers of bits in a character are corrupted then this will go
unnoticed.
2.5M
CRC: The CRC is a technique for detecting errors in digital data, but not for
making correction when errors are detected, It is used in data transmission.
In the CRC, a certain number of check bits, often called a checksum, are
appended to the message being transmitted. The receiver can determine
whether or not to check bits agree with the data, to as certain with a
certain degree of probability whether or not an error occurred in
transmission. If an error occurred, the receiver sends a “negative
acknowledgement” back to the sender, requesting that the message be
retransmitted.
2.5M
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125760
QUESTION_TEXT Explain the following:
a. Pure ALOHA
b. Slotted ALOHA
c. CSMA
d. CSMA/CD
a.
Pure ALOHA: The original ALOHA protocol is called pure
ALOHA. This is a simple, but elegant protocol. The basic idea is that
each station sends a frame whenever it has a frame to send. since
there is only one channel to share, there is the possibility of collision
between frames from different stations.
b.
Slotted ALOHA: Slotted ALOHA was invented to improve the
efficiency of pure ALOHA. In slotted ALOHA the time is divided
into slots of the average time required to send out a frame, and force
the station to send only at the beginning of the time slot.
SCHEME OF
EVALUATION
c.
Carrier Sense Multiple Access (CSMA): If a station senses the
medium before trying to use it. then collision can be reduced. Carrier
sense multiple access requires that each station first listen to the
medium before sending. When a station sends a frame, and any other
station tries to send a frame during this time, a collision will result.
But if the first bit of the frame reaches the end of the medium, every
station will already have heard the bit and will not send its own
frame.
d.
Carrier Sense Multiple Access with Collision Detection
(CSMA/CD): The CSMA method does not specify the procedure
following a collision. But the carrier sense multiple access with
collision detection (CSMA/CD) method, a station monitors the
medium after it sends a frame to see if the transmission was
successful. If, so the station is finished. If there is any collision, the
frame is sent again.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125761
QUESTION_TEXT
What are advantages and disadvantages of digital communication
over analog communication?
Advantages
SCHEME OF
EVALUATION
1.
Immunity to noise is relatively high.
2.
Efficient use of communication bandwidth
3.
Data encryption
4.
The ability to detect errors and correct them.
5.
Designing and manufacturing is cheaper.
6.
Much data communication is computer to computer.
Disadvantages
1.
Requires more bandwidth
2.
Additional encoding and decoding circuitry required.
Download