You are on page 1of 10
CONFIDENTIAL CSIDEC 2015/ITT400 UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE : INTRODUCTION TO DATA COMMUNICATION AND | NETWORKING COURSE CODE ITT400 EXAMINATION : DECEMBER 2015 TIME 3 HOURS INSTRUCTIONS TO CANDIDATES 1 This question paper consists of three (3) parts: PART A (30 Questions) PART B (6 Questions) PART C (3 Questions) 2 ‘Answer ALL questions from all three (3) parts: i) Answer PART A in the Objective Answer Sheet ji) Answer PART B and C in the Answer Booklet. Start each answer on a new page. 3. Do not bring any material into the examination room unless permission is given by the invigiator. 4 Please check to make sure that this examination pack consists of i) the Question Paper ii) an Answer Booklet — provided by the Faculty ii) an Objective Answer Sheet — provided by the Faculty 5. ‘Answer ALL questions in English DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of 10 printed pages (© Hak Cipta Universit Teknologi MARA CONFIDENTIAL, CONFIDENTIAL 2 CSIDEC 2015/ITT400 PART A (30 MARKS) Choose ONE (1) suitable answer and mark the answer on the Objective Answer Sheet provided. The is the physical path over which a message travels. A. medium B. sender C. receiver D. signal 2. An unauthorized user is a network issue. ‘A. performance B. reliability C. security D. attenuation 3. Communication between a computer and a keyboard involves transmission. A. simplex B. half-simplex . full duplex D. automatic 4. The process-to-process delivery of the entire message is the responsibility of the layer. A. network B. transport ©. application D. physical 5. As the data packet moves from the upper to the lower layers, headers are A. added. B. removed. C. rearranged. D. modified. 6. In the OS! model, what is the main function of the transport layer? Node-to-node delivery. Process-to-process message delivery. Synchronization, Updating and maintenance of routing tables. pom> (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 3 CSIDEC 2015/ITT400 7. Why was the OS! model developed? ‘A. Manufacturers disliked the TCP/IP protocol suite. B. The rate of data transfer was increasing exponentially. C. Standards were needed to allow any two systems to communicate. D. The increased amount of computer users. 8. Before data can be transmitted, they must be transformed to. : A. periodic signals B. electromagnetic signals C. aperiodic signals D. low-frequency sine waves 9. When frequency increases, the period will_. A. decrease B. increase C. remain the same D. double 10. Asine wave is ‘A. periodic and continuous B. aperiodic and continuous C. periodic and discrete D. aperiodic and discrete 11. is a type of transmission impairment in which the signal loses strength due to the Tesistance of the transmission medium. A. Attenuation B. Distortion C. Noise D. Decibel 12. AM and FM are examples of conversion. A. analog-to-digital B. digitalto-digital C. analog-to-analog D. digita-to-analog 13. In QAM, of a carrier frequency are varied. A. frequency and amplitude B. phase and frequency C. amplitude and phase D. only frequency (© Hak Cipta Universit Teknologi MARA CONFIDENTIAL CONFIDENTIAL 4 CSIDEC 2015/'TT400 14. If the frequency spectrum of a signal has a bandwidth of 500 Hz with the highest frequency at 600 Hz, what should be the sampling rate, according to the Nyquist theorem? ‘A. 400 samples/s. B. 500 samples/s. C. 1000 samples/s. D. 1200 samples/s. 15. What is the number of bits per baud for ASK with four different amplitudes? A B. c. D. SON 16. Transmission media are usually categorized as fixed or unfixed guided or unguided determinate or indeterminate metallic of unmetallic pom> 17. cable consists of an inner copper core and a second conducting outer sheath, A. Twisted-pair B. Coaxial C. Fiber optic D. Shielded twisted-pair 18. is used for cellular phone, satellite, and wireless LAN communication, ‘A. Radio waves B. Microwaves C. Infrared waves D. Bluetooth 19. Which error detection method uses one's complement arithmetic? Simple parity check. Two-dimesional parity check. Cyclic redundancy check. Checksum, pom> ©Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL 5 CSIDEC 2015/ITT400 20. Which of the followings error detecting methods involving polynomials? ‘A. Simple parity check. B. CRC. C. Two-dimensional parity check. D. Checksum. 21. In cyclic redundancy checking, what is the CRC? A. The divisor. B. The quotient. C. The dividend. D. The remainder. 22. The layer of Ethernet consists of the LLC sublayer and MAC sublayer. ‘A. physical B. data link C. network D. application 23. The IEEE 802.3 Standard defines CSMAICD as the access method for first- generation 10-Mbps Ethernet. ‘persistent nor-persistent P-persistent m-persistent pop 24. is a virtual-circuit wide area network that was designed in response to the demands of a new type of WAN in the late 1080s and early 1990s. A. X25 B. Frame Relay c. ATM D. MUX 25. In Bluetooth, multiple form a network called a scatternet; piconets piconets; scatternet piconets; bluenet bluenet; scatternet pop> (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 6 CSIDEC 2015/ITT400 26. In IPv4, class has the greatest number of addresses in each block. A. B. c. D. cvom> 27. The number of addresses in a class C block is A. 65534 B. 16777216 C. 256 D. 512 28. The following device can have a buffer to hold the frames for processing, A. Abub. B. Arepeater. C. A bridge. D. A two-layer switch. 29. A bridge can use the algorithm to create a loopless topology. A. binary tree B. spanning tree C. muttiway tree D. big tree 30. Ina backbone, the backbone is just one switch. bus star ring hybrid pom> (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 7 CSIDEC 2015/TT400 PART B (40 MARKS) ‘Answer ALL questions. QUESTION 1 Draw a complete diagram of the FIVE (8) components in data communications system. (7 marks) QUESTION 2 Draw the bandwidth of a signal in frequency domain that can be decomposed into four sine waves with frequencies at 0, 25, 75 and 100Hz. Assuming all the components have the maximum amplitude of 15V. (6 marks) QUESTION 3 Draw the digital signal for data stream 10101110 by using the following digital encoding techniques: a) RZ. (2 marks) b) NRZ-L. (2 marks) ©) AMI. (2 marks) QUESTION 4 a) Define digital-to-analog conversion. (2 marks) b) An analog signal carries 8 bit per signal element. If 3000 signal elements are sent in one second, find the bit rate. (2marks) ©) Determine the bandwidth required if 4000bps is needed to be sent by using ASK. Let d=1 andr=1. (2marks) (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL, CONFIDENTIAL, 8 CSIDEC 2015/ITT400 QUESTION 5 a) Differentiate between an amplifier and a repeater. (2 marks) b) Define a transparent bridge. (2 marks) ©) Table 1 maps the connecting devices operated in the TCP/IP Protocol Suite. Tick (v) the correct blanks to show the correct mapping of the appropriate layers where the connecting devices actually operate. Table 1: Mapping of connecting devices in TCP/IP Protocol Suite Layers repeater ‘Switch router Application Transport Network Data Link - i Physical (4 marks) QUESTION 6 a) Give TWO (2) advantages of applying a bridge in an Ethernet network. (2 marks) b) State TWO (2) reasons of using switch instead of hub. (2 marks) ©) Briefly define the following terms: i) Access point (AP). il) Basic Service Set (BSS), ili) Extended Service Set (ESS). (3 marks) © Hak Cipta Universiti Toknologi MARA CONFIDENTIAL, CONFIDENTIAL 9 CSIDEC 2015/ITT400 PART C (30 MARKS) ‘Answer ALL questions. QUESTION 1 a) Illustrate the light propagation process in fiber optic cable. (3 marks) b) Briefly explain the Single-Mode propagation method in fiber optic. (4 marks) ©) Describe THREE (3) advantages of fiber optic cable. (3 marks) QUESTION 2 a) Explain burst error in network communication. (2 marks) b) Describe the concept of redundancy in error detection and correction. (2 marks) ©) One host intended to send a list of five sets of four bit numbers to a receiver. The set of numbers is (10, 3, 8, 11, and §). Find the checksum at the sender and receiver with the details of wrapping (if any) and complementing process. (6 marks) QUESTION 3 Critoxium Resources Sdn. Bhd. was given an address block of 172.16.0.0 /19 to set up the company’s computer network. a) Identify the class for the given network address. (2 marks) b) Give the CIDR address of the given address block in dotted decimal form. (2 marks) ©) Calculate the available subnets for the address block. (2 marks) (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL, CONFIDENTIAL 10 CSIDEC 2015/TT400 d) Identify the total available host for each subnet, (2 marks) @) Determine the broadcast address for the first subnet, (2 marks) END OF QUESTION PAPER (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL,

You might also like