BCA3040A06

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
OCTOBER15
ASSESSMENT_CODE BCA3040_OCTOBER15
QUESTION_TYPE DESCRIPTIVE_QUESTION
QUESTION_ID
73511
Explain the following error correcting methods.
QUESTION_TEXT a. Automatic Repeat Request(ARQ)
b. Hamming Code
a.
Automatic Repeat Request (ARQ):

Protocols in which the sender waits for a positive
acknowledgement before advancing to the next data item are
called ARQ. ARQ also transmit data only in one direction.
Although, it can handle lost frames by timing out, it requires the
timeout interval to be long enough to prevent premature time
outs.
2M

If the sender times out too early, while the acknowledgement is
still on the way, it will send duplicates. When the previous
acknowledgment finally arrives the sender will mistakenly think
that the just sent frame is the one being acknowledged and will
not realize that there is acknowledgment frame somewhere in
the pipe.
2M

If the next frame sent is lost completely but the extra
acknowledgment arrives correctly, the sender will not attempt to
retransmit the lost frame and the protocol will fail. 1M
SCHEME OF
EVALUATION
b.
Hamming Code:
o
The error-detecting and error-correcting properties of a
code depend on its hamming distance. The number of bit
positions in which two code words differ is called
hamming distance. An n-bit unit containing data and
check-bits is often referred to as n-bit code
word.
2M
o
To detect errors, we need a distance d+1 code because
with such a code there is no way that d-single bit error can
change a valid code word into another valid code word.
When the receiver sees an invalid code-word, it can tell
that a transmission error has
occurred.
2M
o
Similarly, to correct errors, we need a distance 2d+1 code
because that way the legal code words are so far apart
that even with d change, the original code word is still
closer than an any other code word. So it can be uniquely
determined.
1M
QUESTION_TYPE DESCRIPTIVE_QUESTION
QUESTION_ID
QUESTION_TEXT
SCHEME OF
EVALUATION
73513
Explain the following digital signal encoding formats.
a. Bipolar-AMI
b. Pseudoternary
c. Manchester code
d. Differential Manchester and biphase technique
a. Bipolar-AMI: In this case, a binary 0 is represented by no line
signal, and binary 1 is represented by a positive or negative pulse. The
binary 1 pulse must alternate in polarity. The advantages of this scheme
are no loss of synchronization. If a long string of 1s occurs, no net dc
component and the less bandwidth for resulting signal. Also, the pulse
alternation property provides a simple means of error
detection.
2M
b. Pseudo ternary: In this case, binary 1 is represented by the
absence of line signal, and the binary 0 is represented by alternating
positive and negative pulses. There is no particular advantage of one
technique versus the other, and each is the basic of some applications.
This code provides synchronization. But, a long string of 0s is the case of
AMI or 1s in the case of pseudoternary still presents a
problem
2M
c. Manchester Code: In Manchester coding states there will always be
a transition at the middle of each bit period. This provides means of
adding the data rate clock to the message to be used on the receiving
end.
1M
d. Differential Manchester: In this case the mid bit transition is used
only to provide clocking. The encoding of a 0 is represented by the
presence of a transition at the beginning of the bit period. All of the
biphase techniques require at least one transition per bit time and may
have as many as two transitions. Thus, the maximum modulation rate is
twice that for NRZ. 2M
Advantages of biphase schemes are:
(1x3)M

Synchronization: Because there is a predictable transition during
each bit time, the receiver can synchronize on that transition.

No dc component: Biphase codes have no dc component.

Error detection: The absence of an expected transition can be
used to detect errors. Noise on the line would have to invert
both the signal before and after the expected transition to cause
an undetected error.
QUESTION_TYPE DESCRIPTIVE_QUESTION
QUESTION_ID
73515
QUESTION_TEXT Explain the various types of communications.
The various types of communication are:
SCHEME OF
EVALUATION

Point to point communication: In this type, communication
takes place between two end points. For instance, in the case of
voice communication using telephones, there is one calling party
and one called party. Hence the communication is called point to
point.
2M

Point to multipoint communication: In this type of
communication, there is one sender and multiple recipients. For
example, in voice conferencing, one person will be talking but
many others can listen. The message from the sender has to be
multicast to many others.
2M

Broadcasting: In this, there is a central location from which
information is sent to many recipients, as in case of audio or video
broadcasting. In a broadcasting system, the listeners are passive,
and there is no reverse communication path.
1M

Simplex communication: In simplex communication,
communication is possible only in one direction. There is one
sender and one receiver, the sender and the receiver cannot
change roles.
1M

Half Duplex communication: In this, communication is
possible in both directions between two entities, but one at a
time. A walkie talkie uses this approach. The person who wants to
talk presses a talk button on his handset to start talking, and the
other persons handset will be in the receive mode. When the
sender finishes, he terminates it with an over message. These types
of systems require limited channel bandwidth, so they are low cost
systems.
2M
Full Duplex communication: IN a full duplex communication
system, the two parties, the caller and the called can
communicate simultaneously, as in a telephone system. The
ability of the communication system to transport data in both
directions defines the system as full
duplex.
2M
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73516
QUESTION_TEXT
What is congestion control? Explain one congestion control technique.
SCHEME OF
EVALUATION
Congestion control is concerned with controlling traffic entry into a
network so as to avoid congestive collapse by attempting to avoid
oversubscription of any of the processing or link capabilities of the
intermediate nodes and networks and taking resource reducing steps,
such as reducing the rate of sending packets. (2 marks)
Explain any one of the following techniques:
Backpressure
Choke packet
Implicit congestion signalling
Explicit congestion signaling
(8 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73517
Write a note on bridges.
QUESTION_TEXT
SCHEME OF
EVALUATION
The bridge provides a means of interconnecting similar LANs. The
bridge is designed for use between local area networks that use identical
protocols for the physical and link layers and the amount of processing
required at the bridge is minimal.
(4 marks)
The functions of bridge are few:
Read all frames transmitted on A and accept those addressed to any
station on B
Using the medium access control protocol for B
Do the same for B-to-A traffic.
Several design aspects are:
The bridge makes no modifications to the content of the frames it
receives.
The bridge should contain enough buffer space to meet peak demands
The bridge must contain addressing and routing intelligence.
A bridge may connect more than two LANs
(6 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125761
QUESTION_TEXT
What are advantages and disadvantages of digital communication
over analog communication?
Advantages
SCHEME OF
EVALUATION
1.
Immunity to noise is relatively high.
2.
Efficient use of communication bandwidth
3.
Data encryption
4.
The ability to detect errors and correct them.
5.
Designing and manufacturing is cheaper.
6.
Much data communication is computer to computer.
Disadvantages
1.
Requires more bandwidth
2.
Additional encoding and decoding circuitry required.
Download