You are on page 1of 10
CONFIDENTIAL aS CSIJUN 2016/ITT400 UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION INTRODUCTION TO DATA COMMUNICATION AND NETWORKING ITT400 JUNE 2016 3 HOURS INSTRUCTIONS TO CANDIDATES 1 This question paper consists of three (3) parts: PART A (30 Questions) PART B (6 Questions) PART C (3 Questions) 2 ‘Answer ALL questions from all three (3) parts i) Answer PART A in the Objective Answer Sheet. li) Answer PART B and C in the Answer Booklet. Start each answer on a new page. 3. Do not bring any material into the examination room unless permission is given by the invigilator. 4 Please check to make sure that this examination pack consists of i) the Question Paper il) an Answer Booklet - provided by the Faculty i) an Objective Answer Sheet — provided by the Faculty a graph paper ~ provided by the Faculty 5 ‘Answer ALL questions in English, DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of 10 printed pages (© Hak Cipta Universiti Teknologi MARA. CONFIDENTIAL CONFIDENTIAL, 2 CSIJUN 2016/TT400 PART A (30 MARKS) 1A connection provides a dedicated link between two devices. A. non-point B. point-to-point C. multipoint D. —_extra-point 2. Anunauthorized user is a network issue. A. performance B. reliability Cc. security D. attenuation Steen mode, both stations can transmit and receive simultaneously. A. simplex B. _ half-simplex C. full duplex D. automatic 4, The layer is responsible for moving frames from one node to the next. A. data link B. transport Cc. applice D. physical 5. As the data packet moves from the lower to the upper layers, headers are A A. added B. removed C. rearranged D. modified 6. _ Inthe OS! model, the network layer is responsible for the of a packet. ‘A. node-to-node delivery B. _process-to-process message delivery C. _source-to-destination delivery D. updating and maintenance of routing tables © Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL, 3 CSIJUN 2016/TT400 10. "1. 12. Which of the statements below is the reason ofthe OSI model was developed? ‘A. Standards were needed to allow any two systems to communicate. B. The rate of data transfer was increasing exponentially. C. Manufacturers disliked the TCP/IP protocol suite. D. The amount of computer user increase. The of a signal is the absolute value of its highest intensity. A. peak amplitude B. frequency Cc. wave D. phase When frequency increases, the period will A decreases B. increases C. remain the same D. double Asine wave is ‘A. periodic and continuous B. aperiodic and continuous C. periodic and discrete D. aperiodic and discrete can occur in a composite signal made of different frequencies when it changes its form or shape. A. Attenuation B. Distortion Cc. Noise D. Decibel Pulse Code Modulation (PCM) is an example of conversion. A. analog-to-digital B. — digital-to-digital C. _ analog-to-analog D. — digital-to-analog (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 4 CSIJUN 2016/TT400 13. 14 15. 16. 17. 18. In QAM, of a carrier frequency are varied. A. frequency and amplitude B. phase and frequency C. amplitude and phase D. only frequency If the frequency spectrum of a signal has a bandwidth of 500 Hz with the highest frequency at 600 Hz, what should be the sampling rate, according to the Nyquist theorem? A 400 samples/s. B. 500 samples/s. C. 1000 samplesis. D. 1200 samples/s. ‘What is the number of bits per baud for ASK with four different amplitudes? sheath. pom> 9Op> > DOD> PaO consist of two conductors that are bind together. fiber-optic cable twisted-pair cable coaxial cable gold-plated cable cable consists of an inner copper core and a second conducting outer Twisted-pair Coaxial Fiber optic. Shielded twisted-pair is used for multicasting applications such as AM and FM radio, cordless phones and television. gom> Radio waves Microwaves Infrared waves Bluetooth © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 5 CSIJUN 2016/TT400 19. 20. 24. 22. 23. 24, To detect or correct errors, it requires sending with data. A zero bit B. redundant bits C. single bit D. blank bit ‘Which of the followings error detecting methods can only detect single bit error? ‘A. Simple parity check. B. CRC. C. Two-dimensional parity check, D. Checksum. In cyclic redundancy checking, what is the CRC? A. The divisor. B. The quotient. C. The dividend. D. The remainder. Ethernet address in hexadecimal notation consists of A 8 hex digits B. 12 hex digits ©. 4hex digits D. 6 hex digits The sublayer is responsible for the operation of the CSMA/CD access method and framing. A LC B. MAC Cc. Mil D. SFD A Virtual Local Area Network (VLAN) is configured by A. software B. physical writing Cc. hardware D. physical device (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 6 CSIJUN 2016/TT400 25. 26. 27. 28. 29. 30. In Bluetooth, multiple form a network called a___. A. scatternet; piconets B. _ piconets; scattermet C. piconets; bluenet D. _bluenet; scatternet What is the default mask for class A in CIDR notation? A 19, Baars) cla /ie' D. 124. ‘The number of addresses in a class C block is, A 65534 B. 16777216 Cc. 256 D512 The following device can regenerates a signal, connects segments of a LAN, and has no filtering capability. A Abub, B. Arepeater. Cc. Abridge. D. — Atwo-layer switch. Abridge can use the algorithm to create a loopless topology. binary tree spanning tree multtiway tree big tree LAN allows several LANs to be connected. backbone wireless wired backdoor pom> > DOm> (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL, 7 CSIJUN 2016/ITT400 PART B (40 MARKS) QUESTION 1 a) List THREE (3) modes of data flow transmission between two devices. (3 marks) b) Discuss TWO (2) key elements of computer network communication protocol. (4 marks) QUESTION 2 ) Distinguish between baseband-transmission and broadband-transmission. (4 marks) b) Define Nyquist theorem used in data communications. (2 marks) QUESTION 3 Draw the digital signal for data stream 11001010 by using the followings digital encoding techniques: a) Manchester. (2 marks) b) Differential Manchester. (2 marks) ©) RZ. (2 marks) QUESTION 4 2) Define Amplitude Shift Keying (ASK) in Digital-to-Analog modulation. (2 marks) b) State the drawback of using Amplitude Shift Keying (ASK) modulation. (2 marks) ¢) Calculate the bandwidth required if 10000bps is needed to be sent by using ASK. Let d=1 andr=1, (2 marks) (© Hak Cipta Universit! Teknologi MARA CONFIDENTIAL CONFIDENTIAL, 8 CSIJUN 2016/TTT400 QUESTION 5 a) Explain the advantages of bridges on an Ethernet LAN. (4 marks) b) Differentiate between an amplifier and a repeater. (2 marks) ©) State the hexadecimal equivalent of the following Ethernet address: 01011010 00010001 01010101 00011000 10101010 00001111 (2 marks) QUESTION 6 a) Define Virtual Local Area Network (VLAN). (2 marks) b) Give ONE (1) advantage when virtual local area network (vlan) is implemented. (2 marks) ¢) Draw a topology of a star backbone that will connect three local area networks. (3 marks) (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 9 CSIJUN 2016/TT400 PART C (30 MARKS) QUESTION 4 a) State TWO (2) major categories of transmission media. (2 marks) b) Distinguish between omnidirectional waves and unidirectional waves. (2 marks) ©) Briefly explain about ground propagation, sky propagation, and line-of-sight propagation. (6 marks) QUESTION 2 Syarikat Aman Sdn. Bhd. was given an address block of 172.16.0.0/23 to set up the company’s computer network. a) Identify the class for the given network address. (2 marks) b) Give the CIDR of the given address block in dotted decimal form, (2 marks) ©) Calculate the total number of subnets for the address block. (2 marks) d) Identify the number of usable host for each subnet. (2 marks) €) Determine the broadcast address for the first subnet. (2 marks) (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 10 CSIJUN 2016/TT400 QUESTION 3 a) Explain single bit error in network communication. (2 marks) b) Explain the concept of redundancy in error detection and correction. (2marks) ©) Given a dataword 1001 and a divisor of 1011. By using CRC, show the process at the sender in generating the codeword and at receiver to identify the syndrome. (6 marks) END OF QUESTION PAPER (@ Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL

You might also like