You are on page 1of 8
MULTIMEDIA 'O) UNIVERSITY STUDENT ID NO MULTIMEDIA UNIVERSITY THIRD TRIMESTER EXAMINATION, SESSION 2003/04 ECP2056 - DATA COMMUNICATIONS AND. COMPUTER NETWORKING (BE, CE, ME, TE, MCE, BMM) 31 March 2004 2.30pm- 4.30pm (2 hours) INSTRUCTION TO STUDENT. 1. This Question paper consists of 8 pages including cover page with 6 Questions only 2, Attempt TWO out of THREE questions from SECTION A and any TWO out of three questions from SECTION B. All questions carry equal marks and the distribution of the marks for each question is given. 3. Please print all your answers in the answer Booklet provided ecen0ss DATA COMMUNICATIONS & COMPUTER NETWORKING Apr, 2008 SECTION A Question fa) (b) (c) In asynchronous transmission, frame synchronization is achieved by using two control characters STX and ETX. (i) With the aid of a diagram, illustrate how this scheme works. [3 marks] (ii) What would be the problem(s) encountered while using the two control characters mentioned above transmitting blocks of pure binary data? [2 marks} Gi) How can the problem(s) encountered in (ii) be overcome? [2 marks} ‘Suppose a data file of 2 Mbytes is to be transmitted over a line at 4.8 kbps. (i) Calculate the overhead in bits and time using asynchronous communication Assume that 1 start bit, I stop bit and 1 parity bit are used for every §-bit characters. (4 marks} (ii) Calculate the overhead in bits and time using synchronous communication. Assume that data are sent in frames and each frame consists of 500 characters (a character = 8 bits) and 48 contro! bits. [4 marks) ‘A data terminal equipment 1 (DTE1) is to transmit a 10 bit message M 1010101101 over a communication line to another data terminal equipment 2 (DTE2). Cyclic redundancy check (CRC) error detection mechanism has been implemented between the two DTEs. If'a generator polynomial for checking errors P= X'+Xx*+X*H1 and 5 bits of FCS are used: (i) Demonstrate how DTE1 carries out the RCS generation process before transmitting the message M. [5 marks] (ii) How does DTE2 use the FCS checking process to verify that the message it received has no errors? [5 marks] Continued... ZUBEIRKSANGWHTANAIAGOWTCHIENGIANMAR 2/8, ecP20s6 DATA COMMUNICATIONS & COMPUTER NETWORKING APRIL 2004 Question 2 (a) Briefly describe the mechanisms of phase modulation and amplitude modulation? What is the major factor that makes phase modulation superior to amplitude modulation? [6 marks} (6) What kind of information can be obtained from a constellation diagram? [6 marks] (©) Given that a telephone line has a usefill bandwidth of 4KHz for data transmisision. When the signal is 10W and the noise is SmW, what is the maximum data rate supported by the telephone line? (5 marks} (4) A network system has generated a constellation diagram as shown in Figure 2.1 Figure 2.1 (i) How many different states or levels can a signal have? [3 marks) (ii) Assuming the system is under noiseless condition, determine the capacity of the system if the bandwidth is 10KHz. [5 marks] Continued... ZUBEIRKSANGIWHTANHAGOKIMTCHIENGAMMAR 3/8 P2086 DATA COMMUNICATIONS f& COMPUTER NETWORKING APRIL. 2008 Question 3 (a) State two differences between the services provided by UDP and TCP. [2 marks] (b) What is the size of a UDP header and what are the four fields in the header? [3 marks} (©) A TCP process previously has an estimated round trip time of 30ms. However the round trip time that it measures is S0ms. In response, it increases its estimated round trip time to 34ms, If the next round trip time that it measures is 40ms, determine the new estimated round trip time, [6 marks] (4) In a network employing TCP with congestion control, the original slow start threshold (ssthresh) is 16 segments and the initial congestion window is 1 segment. ‘A graph depicting the size of congestion window (cwnd) in this network over 10 round-trip times (RTTs) is shown in Figure 3.1. By referring to the graph, explain why cwnd increases exponentially from the beginning of the transmission to the 4” RTT, increases linearly from the 4" RTT to the 6" RTT and drops to | at the 7" RTT. [6 marks} own [segments] 8 16 4 12 0 8 6 4 2 . zt Seca eet oes tees eee cin sare octet y-eeed meee eee dD round-trip times Figure 3.1 (e) Under what situations will a negative acknowledgement (NAK) be retumed to sender in a stop-and-wait ARQ scheme? [2 marks] Continued... 2UBEIR:KSANGWHTANMAGOWMTCHIENGIAMMAR 4/8 Ecr2056 DATA COMMUNICATIONS & COMPUTER NETWORKING APRIL 2008 (8 Data is transmitted using an idle RQ error control scheme through a 2Mbps link @ propagation speed of 2x10° ms". Assume constant 150-byte data frames, negligible time for the transmission of ACK frames and negligible processing time for data frames and ACK frames. Given that the link has a bit-error-rate (BER) of 2x10, determine the maximum possible link length if the link utilization is not less than 50%, {6 marks] Given that: Link utilization, U 12a Where jis frame length in bits Pis bit error rate ais the ratio of signal propagation delay to frame transmission time Continued... -2UBEIRIKSANGOHTANHAGOHMMTCHIENGIAMMAR 5/8 Ecrn056 DATA COMMUNICATIONS & COMPUTER NETWORKING APR 2008 SECTION B Question 4 (a) Describe the following medium access methods : (i) Reservation. [4 marks] (i) Token Passing/Round Robin. [4 marks] (b) CSMAVCA procedure is different from CSMA/CD because it avoids collision rather than detects them. Explain how the protocol for CSMA/CA works? [8 marks] (©) Figure 4.1 shows a }0Mbps Ethemet network with minimum frame size of 64 bytes. Assuming the propagation speed on the medium is 210% ms'', and the hub has 1.5x10° seconds delay, determine: (The minimum transmission time (T.). [2 marks} i) The maximum propagation time (Ty). [2 marks} (iii) The length L between the hub and a station. [3 marks] (iv). The efficiency of the network. (2 marks} Given that the efficiency of the network is 1 1+5a Us where a is the ratio of propagation delay to frame transmission time. Hub Len meter Computer Computer Figure 4.1 Continued... ZUBEIRVKSANGIWHTANAGOHATCHIENGIAMMAR 6/8 ecP2056 ATA COMMUNICATIONS & COMPUTER NETWORKING APRIL 2008 Question 5 (2) State five main differences between frame relay and X.25 (5 marks] (b) Describe the functions of flag, address and FCS fields in Figure 5.1 below: [14144 marks] Tae Adres | Inman rs Ts “r a Voriabls o> . Figure 5.1 Frame Relay Frame (©) With a fixed 53-octet cell size, S-octet Header and 48-octet Payload, what are the advantages of ATM over frame relay? [3 marks} (d) Assume that Nemo, a video server is transmitting a compressed video stream to a client station over an ATM network, and the ATM video cells must travel across 7 ATM switches in order to reach the destination. (What is the maximum cell transmission rate (in cell/second) if a switeh’s data rate is 155 Mbps? [1 mark] (ii) What is the transmission time for one cell to go through one switch? [1 mark] (iii) Assume that all cells are treated equally (no priority). If a switch is busy transmitting a cell from other traffic flow when Nemo’s video cell arrives, ‘Nemo’s cell has to wait until the cell is transmitted completely. However if the switch is free, Nemo's video cell will be transmitted immediately. What is the maximum possible delay experienced by Nemo’s video cell, starting from its arrival at the first switch (and wait) until its departure from the seventh or the last switch? (Ignore the propagation time) (2 marks] (iv) Assume that the average switch utilization is 70% or the probability of the switch being busy is 0.7. If a switch is busy transmitting a cell, the average delay spent waiting for the cell to finish transmission is half of the cell's transmission time, What is the average time for Nemo’s video cell to enter the first switch until its departure from the seventh switch? (3 marks] (¥) Use part (iii) and part (iv) to calculate the maximum and average jitter (or the variability in delay), respectively. [2+2 marks] Continued... ZUBEINKSANGWHTANHAGONRTCHIENGIAMMAR 7/8 Bc¥2056 DATA COMMUNICATIONS & COMPUTER NETWORKING. APRIL 2008 Question 6 (a) (b) An Intemet Service Provider (ISP) which has a network address 191.255.0.0, decided to implement a subnetting scheme with 254 hosts for each subnet Determine: (i) The classes of the network address, [1 mark] (ii) The number of bits for hostid [3 marks] (iii) The maximum number of subnets that can be obtained. (3 marks} (iv). The subnet mask that should be adopted. {2 marks} For the network topology shown in the Figure 6.1, find the shortest path routing table for router “A” using Dijkstra algorithm, Show the derivation steps. [16 marks] Figure 6.1 End of Page ‘ZUBEIR/RSANGIWHTANMAGOWMTCHIENG/AMMAR 8/8

You might also like