Professional Documents
Culture Documents
Awai ML PDF
Awai ML PDF
ml)
1. Which layer is immediately below the data link layer?
a. Physical
b. Network
c. Transport
d. Application
3. Converting data into signals by transforming and encoding the information to produce electromagnetic
signals is the functionality of a ___________.
a. source
b. transmitter
c. receiver
d. destination
a. It is simple
b. It is complex
c. It is best with small frames
d. It is best over long distances
5. What must a sender do before a receiver’s sliding windows buffer can expand?
a. Send an acknowledgment
b. Receive an acknowledgment
c. Either a or b
d. Neither a nor b
a. Point-to-point
b. Multipoint
c. Either a or b
d. Neither a nor b
a. Parity
b. Longitudinal redundancy checking
c. Checksum checking
d. Cyclic redundancy checking
a. Parity
b. Longitudinal redundancy checking
c. Checksum checking
d. Cyclic redundancy checking
1
9. Which of the following is also called forward error correction?
a. Simplex
b. Retransmission
c. Detection-error coding
d. Error-correction coding
10. The solution to the problem of scalability of the Internet is to break the network down into manageable
parts, or domains each called ____________.
a. router
b. autonomous system
c. interface
d. bridge
11. For a CSMA/CD network, twice the propagation time between the two most distant stations is called
_________________.
a. slot time
b. transfer time
c. round trip delay time
d. both a and c
12. When a network interface has a failure in its circuitry, it sends a continuous stream of frames causing
the Ethernet LAN to enter a Collapse state. This condition is known as __________.
a. scattering
b. blocking
c. jabbering
d. refreshing
13. The IEEE 802.3 specification divides the data link layer into two sub-layers: the Logical link control sub-
layer and the medium access control sub-layer. An example of one implementation of medium access
control is _______________.
a. TCP protocol
b. CSMA/CD protocol
c. IP protocol
d. UDP protocol
14. In an object-oriented model, when different classes have operations with the same name but different
implementation, they are having the property of ___________.
a. inheritance
b. association
c. polymorphism
d. aggregation
15. Telnet, FTP, SMTP, DNS, HTTP are examples of protocols that are used in ____________________.
2
16. Session control, file and printer are three categories of messages which pass requests and
acknowledgements in a client-server platform. They are used by __________________.
a. TCP/IP protocol
b. Ethernet protocol
c. CSMA/CD protocol
d. SMB protocol
17. ____________________ is a technique which transforms an analogue telephone circuit into a digital
signal, and involves three consecutive processes: sampling, quantization and encoding.
18. The frame alignment word is a sequence of bits that allows the start of each STM-1 frame to be clearly
identified within SDH network. It is contained within _________________.
19. The Star arrangement in the figure below shows how it is used to distribute the timing source within a
telecommunication station in SDH network. This is an example of ___________________.
a. Intra-station synchronization
b. Inter-station synchronization
c. Ultra-station synchronization
d. Multi-station synchronization
20. ____________ is the standard defined by the American National Standard Authority, ANSI T1 for
synchronous operation used in North America.
a. DXC
b. STM-1
c. ADM
3
d. SONET
21. The failure density function, f(t) is used to give the probability of failure during an interval of time. It is
known as ______________.
22. _______________ is one of the Telecommunication management network (TMN) functional blocks that
will convert TMN information into a format that can be easily understood by the user.
23. In Telecommunication management Network (TMN) system, the role of the manager is to issue
commands and requests to the agent. These commands and requests are known as
________________.
a. notifications
b. feedbacks
c. operations
d. acknowledgements
24. The sequence of the binary digits representing the outcomes of parity checks in Hamming codes is
known as _________________.
a. look-up entry
b. Hamming distance
c. radix
d. syndrome
25. Rather than sending the absolute value of each sample, it is possible to achieve a smaller transmission
bit-rate by sending the difference between consecutive samples. This is known as _______________.
a. delta modulation
b. delta–sigma modulation
c. adaptive delta modulation
d. differential PCM
26. The electron beam in the cathode ray tube (CRT) inside the TV set is made to scan the whole visible
surface of the screen in a zigzag pattern. This is known as ____________.
a. raster
b. picture line
c. frame
d. broadcast
4
27. The figure below shows an example of a modulation system used in digital communication. What is
that modulation system?
a. PCM Modulation.
b. Delta Modulation.
c. Sigma Modulation.
d. Differential Modulation.
28. One of the compression techniques in communication uses the fact that in most pictures, there is
considerable correlation between neighboring areas that is a high degree of redundancy in the data to
compress. This type of compression is known as _____________.
a. temporal compression
b. dynamic compression
c. spatial compression
d. random compression
29. Reversible or lossless coding is a type of coding for which the exact data can be recovered after
decoding. This type of coding is used by _________________.
a. PCM encoding
b. Huffman encoding
c. Run-length encoding
d. Both b and c
30. The error represented by the difference between the original and quantized signals set a fundamental
limitation to the performance of PCM systems known as __________________.
a. dynamic range
b. quantization noise
c. Detection
d. PCM encoding
31. Discuss the reason for the 9.6 μs inter-frame gap of network interface card in CSMA/CD.
The reason for the 9.6 μs inter-frame gap is to allow the station that last transmitted to cycle its circuitry
from transmit mode to receive mode. Without the inter-frame gap, such a station might miss a fame that
was destined for it because it had not yet cycled back into receive mode.
Hub Switch
Operates at Layer 1 Operates at Layer 2
The transmission medium is shared The transmission medium is dedicated
5
Collisions could happen No collisions
33. What is the function of the following devices?
- Repeater
- The repeater regenerates the signal in order to reach longer distances. It operates at Layer 1
of the OSI model.
- Bridge
- The bridge is a device that connects two different or similar LANs and it operates at Layer
2 of the OSI model. The bridge is used to increase the network performance by avoiding
collisions happened in one LAN to affect (propagate) the other LAN.
TCP UDP
Connection Oriented Protocol Connection Less Protocol
Suitable for delay insensitive date such as Suitable for delay sensitive date such as
email and file transfer real time audio and video
Suitable for non-reliable networks Suitable for reliable networks
Packets arrive in order Packets may arrive out of order
36. List the four components that are needed by the network operating system software in order to change
a stand-alone PC to a ‘networked’ PC.
- Multiplexer
- Regenerator
- Add/Drop Multiplexer (ADM)
- Digital Cross Connect (DXC)
38. Plots of hazard rate against time often take the form of a ‘bath-tub’ curve. Illustrate with diagram.
42. State the four categories of message which SMB peer-to-peer protocol defines for passing requests
and acknowledgements.
o session control
o file
o printer
o message.
Numerical problems
43. What is the minimum frame size necessary to ensure the correct operation of the CSMA/CD protocol at
a bit-rate of 1500 Mbit/s in a star topology with a maximum segment length of 200 m and two repeaters?
Solution:
Therefore, the total round-trip delay (slot time) is: 4.52 + 3 = 7.52 s.
The number of bits that can be transmitted during the slot time is:
44. Two computers A and B are connected through an Ethernet link having a bit-rate of 10 Mbit/s. The
Round-Trip Time (RTT) between the two computers is assumed to be 2 milliseconds. Computer A is
sending messages containing 250 octets to computer B and waits for an ACK after each message.
7
a- What is the percentage utilization of the channel capacity by computer A in this scenario?
b- If a sliding window algorithm with a window width of seven messages is used, what would be then,
the percentage utilization?
Solution:
a- Channel Capacity= bit-rate Duration X (<5) Y(≥ 5) x RTT = (10 x 106 ) x (2x 10-
3
) = 2x 104 bits L (Local-calls) 11358 4365
O (Overseas calls) 3124 1153
A message of 250 octets transports 8 x 250 = 2000 bits.
The percentage utilization of the channel = the ratio between the number of bits sent within an
RTT period and the number of bits that could be sent (i.e. the channel capacity) x 100:
b- Using a sliding window algorithm with a window width of 10 messages, the number of bits
that is actually sent is given by:
45. The table below gives information on 20000 telephone calls. Calls are classified by distance and
duration and the table gives the number of calls of each type. Category X represents calls lasting less
than five minutes and Y represents calls lasting five minutes or longer. L represents local calls, and O
represents overseas calls.
a- What is the probability that an Overseas call lasts less than 5 minutes?
b- What is the probability that a Local call lasts 5 minutes or more?
c- What is the probability that a call would be a local call?
Solution:
a- The total number of overseas calls= 3124+1153= 4277 and 3124 of these lasted less
than five minutes. So, the probability that an overseas call lasts less than five minutes=
3124/4277=0.73.
C- The total number of local calls=15723 and the total number of calls = 20000 calls. So,
the probability that a call would be a local call = 15723/20000=0.786.
46. A network contains eight switches. Each has a probability of 0.85 of being in operation at any given
time.
Therefore, the probability of all switches being in operation is= (0.85) 8 = 0.272
b- The probability of all switches being out of operation is= (0.15) 8 = 2.56x10-7
c-The probability of five of the eight switches being in operation is given by Formula of
the binomial distribution:
47. There are five companies sharing an internet connection through a leased line with an Internet Service
provider (ISP). Each company needs to use the internet connectivity for 20% of the time, on the
average.
a- What is the probability that, at a give time, only one company wants to use the Internet?
b- What is that probability that, at a given time, no companies wants to use the Internet?
c- What is the probability that, at a given time, more than one company wants to use the Internet?
The probability of a company wants to use the internet link at any given time is 0.2. So,
the probability of a company not wanting to use the internet link is: 0.8.
a- The probability P (1) that, one company wants to use the Internet link at a given time is
given by:
b- The probability P (0) that, no companies wants to use the Internet link at a given time is
given by:
c- The probability P (>1) that more than one company wants to use the Internet link at a
given time is given by:
48. A subsystem of a communication system has the reliability diagram shown in the figure below that
shows the individual components reliability.
0.6
There are six components shown in the diagram above three of which are connected in
parallel.
49. A coding scheme has to transmit five distinct messages, with probabilities and code words as given in
the table below:
Message Probability Code
A 0.2 11
B 0.3 101
C 0.25 110
D 0.1 111
E 0.15 10
a- What is the average length of a code word transmitted using this system?
b- What is the entropy of the source?
c- What is the efficiency of the code?
Solution:
Given the probabilities and the codes, the following table can be constructed:
Message Probability Code Word Average code word Source entropy
(symbol) P B=? bits Length L= P x B H= -p x log2p
A 0.2 11 B=2 bits = 0.2x2 =0.4 =-0.2xlog20.2= 0.464
B 0.3 101 B=3 bits = 0.3x3 =0.9 =-0.3x log20.3=0.521
C 0.25 110 B=3 bits =0.25x3=0.75 =-0.25x log20.25=0.5
D 0.1 111 B=3 bits =0.1x3 =0.3 =-0.1x log20.1=0.332
E 0.15 10 B=2 bits =0.15x2=0.3 =-0.15x log20.15=0.41
Total: 1.00 L= 2.65 (bits) H= 2.227
a- Based on the above table, the average length of the code word, L= 2.65 bits.
b- Based on the above table, the source entropy, H=2.227 bits.
c- The efficiency of the code E= H/L=2.227/2.65=0.84037 ≈ 84 %.
10
50. In tests of a certain type of component, it is found that approximately one-sixth of the surviving
components fail each day. The table shown below predicted results for the first two days of a 5-day test of
600 of these components.
a- Complete the missing fields in the above table (round your answers to the nearest integer).
b- Calculate the value of the reliability R (t) at the end of day 4.
c- Calculate the value of the failure function Q (t) at the end of the test period.
Solution:
a- The completed table is shown below with taking into consideration the rounding to the
nearest integer.
b- The reliability function R(t) at a time t = Ns(t)/No where Ns(t) is the number of
components surviving at time t & No is the number of components under test.
No = 600; the number of surviving components at the end of day 4= Ns (t) = 289.
Therefore, reliability R(t) at the end of day 4 = 289/600=0.481
c- The failure function Q(t) at a time t = Nf(t)/No where Nf(t) is the number of components
which have failed by Day Survivors at the start of day Failures during day time t & No
is the number of 1 600 100 components
under test 2 500 83
3
4
From the table, the 5
number of
components that have survived by
the end of day 5 is: 289-48= 241. Then, the total number of components which have
failed by the end of day 5 = Nf(t)= 600-241=359.
Therefore, the failure function Q(t) at the end of the test period= 359/600=0.598
51. The components in a new communication system are known to have a constant hazard rate. It is a
requirement of Day Survivors at the start of day Failures during day the system
that exactly 4% of the
components 1 600 100 should fail in
the first 2000 2 500 83 hours of
operation. 3 417 70
4 347 58
What is the MTTF that
corresponds to such 5 289 48 a system?
Solution:
11
We have: 4% of the components failing during the first 2000 hour. This means that after,
2000 hours R(t)= 0.96.
Because components have a constant hazard rate, h, the reliability function R(t) is given
by: R(t)= exp(-ht). So, R(2000)=exp(-hx2000)=0.96.
To find the value of h, take natural logarithms of both sides, this gives:
52. A picture is stored electronically in a space probe as an array 600 by 600 pixels which can each have
one of 32 equally probable brightness levels. The picture is sent to earth using a 150 Hz channel with a
signal-to-noise ratio of 0.5.
Assuming that the information rate for the channel is one-fifth of its ideal capacity, how long will the
picture take to transmit?
Solution:
The channel’s actual rate, which is one-fifth of the ideal capacity=17.548 bit/s.
There are 32 equally probable brightness levels per pixel, so five bits are needed per
pixel. The total picture therefore requires:
600x600x5=1800000 bits.
53.
a- V.32bis modems can send data at 14400 bit/s. The modems operate on the assumption that the
bandwidth of the telephone line is 2400 Hz. Using this bandwidth and a signal-to-noise ratio of 1500,
calculate the theoretical channel capacity of the telephone line. What percentage of the theoretical
channel capacity is achieved by a V.32bis modem?
b- V.34 modems can send data at 28800 bit/s. These modems operate on the initial assumption that the
telephone line bandwidth is 3429 Hz. What is the theoretical channel capacity corresponding to this
increased bandwidth and the same signal-to-noise ratio 1500? What percentage of the theoretical
channel capacity can a V.34 modem achieve?
Solution:
12
a- S/N=1500 ; W=2400;
A modem operating at 14400 bit/s will then, achieve a percentage of the theoretical
capacity = 14400/25324 x 100%= 56.86 %.
b- Using the new value of 3429 Hz for the bandwidth W gives an increased theoretical
capacity: 3429 log2 (1+1500) =3429x10.552=36183 bit/s.
A modem operating at 28800 bit/s will achieve a percentage of the theoretical capacity
equal to= (28800/36183) x 100%= 79.6 %
13