CH 4 & 5 KEY
.docx
keyboard_arrow_up
School
California State University, Fullerton *
*We aren’t endorsed by this school
Course
409
Subject
Electrical Engineering
Date
Jun 21, 2024
Type
docx
Pages
13
Uploaded by MagistrateJellyfish20290
1.
As part of the five-layer network model used in this textbook, the data link layer sits directly between:
a.
the physical and the application layers
b.
the network and the application layers
c.
the network and transport layers
d.
the physical and the application layers
e.
the physical and the network layers
2.
Which of the following is true with respect to the data link layer?
a.
It accepts streams of bits from the application layer.
b.
It is responsible for encoding the bit-stream as a series of electronic voltages.
c.
It performs error detection.
d.
It performs routing functions.
e.
It organizes data from the physical layer and passes these coherent messages directly to the application layer.
3.
____________ is not a function of a data link protocol.
a.
Media access control
b.
Message delineation
c.
Amplitude shift keying
d.
Indicating when a message starts and stops
e.
Error control
4.
Media access control:
a.
is not very important in point-to-point with full duplex configuration.
b.
is not very important in local area networks.
c.
is not very important in a point-to-point with a half-duplex configuration.
d.
is not very important in a multipoint configuration.
e.
does not control when computers transmit.
5.
Which of the following is not a controlled access method of media access control?
a.
Token passing
b.
CSMA/CD
c.
polling
d.
roll call polling
e.
hub polling
6.
________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive.
a.
Contention
b.
Polling
c.
Pooling
d.
Carrier sense
e.
CRC
7.
Which of the following is true about roll call polling?
a.
It cannot be modified to increase priority of clients or terminals.
b.
It does not require a server, host, or special device that performs the polling.
c.
It is also called token passing.
d.
It is a type of contention approach to media access control.
e.
It typically involves some waiting because the server has to wait for a response from the polled client or terminal.
8.
With contention:
a.
computers wait until the circuit is free before they send data
b.
the server or front end processor works consecutively through a list of clients to determine who should have access to the media
c.
the front end processor must wait for a response from the polled client or terminal
d.
one computer starts the poll and passes it to the next computer on the multipoint circuit
e.
there is never a chance for “collision,” or two computers trying to send data at the same time
9.
In general, controlled approaches:
a.
work better than contention approaches for small networks that have low usage.
b.
work better than contention approaches for large networks that have high usage.
c.
work better than contention approaches for all sizes of networks.
d.
do not require a host, server, or active monitor to assign media access control.
e.
have many collisions.
10. In a _________, more than one data bit is changed by the error-causing condition.
a.
burst error
b.
data rate shift
c.
Trellis-coded modulation
d.
uniform distribution
e.
amplitude key shift
11. Errors on a network can occur:
a.
only on dial-up type of circuits.
b.
because of noise on the line.
c.
only on poorly maintained networks.
d.
only due to Gaussian noise.
e.
only due to lightning strikes.
12. The two sublayers of the data link layer consist of the media access control sublayer and the________.
a.
logical link control sublayer
b.
network control sublayer
c.
session sublayer
d.
physical sublayer
e.
transport sublayer
13. Which of the following media is least susceptible to noise?
a.
fiber optic cable
b.
coaxial cable
c.
twisted pair
d.
unshielded twisted pair
e.
shielded twisted pair
14. Optical media is:
a.
more likely to suffer from noise than electrical media.
b.
has about the same likelihood of suffering from noise as electrical media.
c.
has about the same likelihood of suffering from noise as coaxial cable.
d.
less likely to suffer from noise than electrical media.
e.
more prone to noise than twisted pair media.
15. ____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.
a.
Contracted bits
b.
Polled bits
c.
Inverse multiplexed bits
d.
Flipped bits
e.
Bit delineation
16. Another term for impulse noise is:
a.
Gaussian noise
b.
spikes
c.
attenuation
d.
cross-talk
e.
intermodulation noise
17. The familiar background static on radios and telephones is called:
a.
echoes
b.
intermodulation noise
c.
gray noise
d.
cross-talk
e.
white noise
18. The primary source of error in data communications is:
a.
echoes.
b.
intermodulation noise.
c.
spikes.
d.
attenuation.
e.
cross-talk.
19. __________can obliterate a group of bits, causing a burst error.
a.
Cross-talk
b.
Attenuation
c.
Impulse noise
d.
Intermodulation noise
e.
Gray noise
20. Cross-talk:
a.
occurs when one circuit picks up signals in another.
b.
is always bothersome because it has a high signal strength.
c.
decreases with increased proximity of two wires.
d.
decreases during wet or damp weather.
e.
increases with lower frequency signals.
21. When a signal is reflected back to the transmitting equipment, it is called a(n) _________.
a.
white noise
b.
echo
c.
crosstalk
d.
attenuation
e.
impulse noise
22. The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is
_____.
a.
white noise
b.
spiking
c.
attenuation
d.
intermodulation noise
e.
echo
23. If a signal with a frequency of 500 MHz combines with another signal of 1500 MHz and they form a new
signal of 2000 MHz, this is an example of:
a.
intermodulation noise
b.
attenuation
c.
echo
d.
white noise
e.
cross-talk
24. _____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
a.
Shielding wires
b.
Adding fluorescent lights
c.
Adding repeaters to a circuit
d.
Adding amplifiers to a circuit
e.
Shorting a circuit
25. _____________ is an effective way to prevent attenuation.
a.
Shielding wires
b.
Adding fluorescent lights
c.
Adding repeaters or amplifiers to a circuit
d.
Changing multiplexing techniques
e.
Shorting a circuit
26. Which of the following is way to reduce or eliminate crosstalk on a circuit?
a.
Physically separating the cables from other communication cables
b.
Adding repeaters or amplifiers to a circuit
c.
Reducing the length of the cable
d.
Adding fluorescent lights
e.
Shorting a circuit
27. On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
a.
amplifiers
b.
repeaters
c.
multiplexers
d.
digitizers
e.
modems
28. Which of the following is not an error detection method used in the data link layer?
a.
Parity checking
b.
Cyclic redundancy checking
c.
CRC-32
d.
Pulse code checking
e.
Odd parity
29. With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
a.
01101011
b.
00011011
c.
00100101
d.
10110110
e.
11111110
30. The probability of detecting an error, given that one has occurred, using parity checking is about:
a.
0%
b.
50%
c.
75%
d.
98%
e.
100%
31. Using parity, the probability for detecting an error, given that one has occurred, is:
a.
about 50% for either even or odd parity.
b.
about 70% for even parity and 30% for odd parity.
c.
about 30% for even parity and 70% for odd parity.
d.
about 0% for either even or odd parity.
e.
about 100% for either even or odd parity.
32. The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:
a.
0%
b.
75%
c.
50%
d.
> 99%
e.
exactly 100%
33. ARQ means that:
a.
a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error
b.
the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries
c.
a sender is using a data link protocol called Asynchronous Repeating reQuest
d.
a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines
e.
a sender is using a parity scheme called Array Resource Quality
34. In ARQ, a NAK:
a.
is sent by the recipient if the message was received without error
b.
is sent by the sender at the same time as it sends a data packet
c.
is sent by the recipient if the message contains an error
d.
refers to non-asynchronous Kermit technique
e.
means that the sender should continue with sending the next message
35. ________ has essentially replaced SDLIt offers a larger sliding window.
a.
Ethernet
b.
PPP
c.
Asynchronous transmission
d.
HDLC
e.
Full complex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Q4/ Why the performance of multimode graded index is better than multimode step index?
Q5/ Design fiber optics communication system with analogue input and then measure
the performance of the three types of fiber optics configurations. After that, answer the
following questions:
1. Which configuration is the better? Comment!
2. Which parameters that improve the performance of multimode step index? Comment!
3. Which parameters that improve the performance of multimode graded index? Comment!
4. Which parameters that improve the performance of single mode step index? Comment!
5. If we need to increase the fiber length from 1 km to 15 km. which configuration is
used? Comment!
arrow_forward
1- Which layers are network support layers?
a. Physical Layer b. session Layer
2-What are the responsibilities of Data Link Layer?
a. Framing b. Encryption c. Mail services
3- What are the types of errors?
a. Compression b. Redundancy c. Single-Bit
4- What are the responsibilities of Application Layer?
c. Application Layers
Flow Control b. Translation c. Mail services
5- application layer protocols?
a. TFTP b. ICMP c. (ARP)
arrow_forward
(i)
Below (figure 1) is an example of a VHDL code for a multiplexer.
--multiplexer.vhd
--Common Multiplexer
LIBRARY ieee;
USE ieee.std_logic_1164.ALL;
ENTITY multiplexer IS
PORT(el, d3, d2, d1, d0 : IN STD_LOGIC;
a,b.c,d,e,f.g.h.ij.k,lm,n:OUT STD LOGIC);
END multiplexer;
ARCHITECTURE mult OF multiplexer IS
SIGNAL input : STD LOGIC_VECTOR (4 downto 0);
SIGNAL output : STD LOGIC_VECTOR (13 downto 0);
BEGIN
input ca el & d3 & d2 & d1 & d0;
WITH input SELECT
"00000010000001"WHEN "10000",--Input A
"00000010000001"WHEN "10001",-
"00000010000001"WHEN "10010",-
"00000010000001"WHEN "10011",-
"00000011001111"WHEN "10100"
"00000011001111"WHEN "10101
"00000011001111"WHEN "10110"
"00000011001111"WHEN "10111"
"10011110000001"WHEN "11000"
"10011110000001"WHEN "11001"
"10011110000001"WHEN "11010,
"10011110000001"WHEN "11011"
"10011111001111"WHEN "11100"
"100111110011i1"WHEN "11101",-
"10011111001111"WHEN "11110",--
"10011111001111"WHEN "11111":-.
"00000010000001" -00
--"00000011001111"-01…
arrow_forward
Q2: In the 7-segment display, derive an SOP
expression for segment ('f )'using the input
variables WXYZ and theń
expression using Karnaugh map (each digit
represented by a BCD codě).
minimize the
arrow_forward
To implement 8-to-1 line multiplexer using two 4-to-1 line
multiplexer(MUX):
O a. The third selctor is connected to the enable line of the first
and second MUX.
O b. Only the enable line of the first MUX must be connected
dirictly to the enable for the second MUX.
O c. The third selctor is connected to the enable line of the first
MUX which is connected through inverter to the enable of
the second MUX.
O d. All inputs lines for the first mux must be connected to the
input lines for the second mux.
arrow_forward
QUESTION 4
a. In your own words, explain the term companding used in telecommunications the important of
that process.
b. In telecommunication, a line code is a pattern of voltage, current, or photons used to represent
digital data transmitted down a transmission line. Assuming that you are about to send a set of
bit string: 1000 1001 1101 0110 down to the transmission line, illustrate the resulted coded
signal after it went through line coder using differential Manchester code formats.
arrow_forward
question4
plz provide explained answer
arrow_forward
Digital Communication
Information Theory
arrow_forward
Solve it quickly please
arrow_forward
4-a) what are the application of gray code?
b) what is the advantages of the gray code?
arrow_forward
We want to design a digital circuit that converts
Gray code (ABC) to Binary code (xyz). Set up a 8-to-
1 line multiplexer so that the output gives y as a
function of ABC. "A" is given to the most significant
bit of the control inputs of the multiplexer. "C" is
given to the least significant bit of the control inputs
of the multiplexer.
arrow_forward
List three major types of communication services that are not yet digital but could eventually be,
and explain how digital techniques could be applied to those applications.
(Our subject is Principles of Electronic Communications)
arrow_forward
Q: Fill in the blanks with suitable word(s)
1. The input impedance of a BIT transistor amplifier is purely -.
A. capacitive B. inductive C. resistive D. high E. very high
-- - controlled devices.
A. Voltage B. power C. resistance D. current E. energy
in nature.
2. BIT transistor amplifiers are referred to as
3. In the cutoff region the collector-base and base-emitter junctions of a transistos are
both --.
A. Same bias B. forward-biased C. reverse D. reverse-biased E. different bias
4. B increases with
in temperature.
A. decrease B. decrement C. no decrease D. increase E. no increase
5. The transistor is a -- semiconductor device.
A. Two - layer B. one - layer C. four - layer D. three - layer E. npn
6. The basic amplifying action was produced by transferring a current I from a -----
resistance circuit.
A. Low to a high B. high to low C. low to low D. high to high E. big to small
arrow_forward
B/Select the correct answer:
1) The basic structures in VHDL contain
a) Entity
b)
Architecture
The com
IVIUE
NJIHOVIO.
c) Library
d) All of them
nea
3) VHDL is a
design language.
a) Software b) Hardware c) Software and Hardware d) Not all is mentioned
arrow_forward
Subject: Computer Networks
Note: Please answer in own words. copy from internet will very unhelpful for me.
Question:
Consider an IP Datagram of 4500 Byte. If MTU is 2420 Byte show the fragmented IP datagram.
arrow_forward
P6 - Problem 4.28
Using a decoder constructed with NAND gates and external gates, design the combinational circuit defined
by the following three Boolean functions:
F₁ = z' + xy
F₂ = yz + xy + y'z'
F3 = (x + y)z + xy'z
arrow_forward
Compare between the status and control flags? Explain the status flags for
the operation AEH+37H ?
What are the purposes of both segmentation and physical address generation?
Explain with draw and numerical example?
What is the size of the memory for each case below?
• Each segment is
• All segments are ...
• Overall memory is ...
.....
Given the ES=3050H, SS=1298H, CS=ABC3H determine the physical
address for
a) SP=2583H
b) DI=3399H
c) IP=18F7H
arrow_forward
Example 3: Find the amount of information containing in a black and white TV picture if each picture
has 2 * 105 dots (pixels) and each pixel has 8 equal probability level of brightness.
Solution:
I(pixel) = log₂ level = log₂ 8 = 3 bits
I(picture) = 3 * 2 * 105 = 600 Kbits
AW: Calculate the amount of information if binary digits occur with equal likelihood in binary PCM.
H.W2: In binary PCM of "0" occur with probability, and with "1" occur with probability 3/4, then
calculate the amount of information of each binary digit (binit).
H.W3: A fair dice is thrown; find the amount of information gained if you are told that no. 4 will
appear.
H.W4: How many bits of information are contained in the statement, "my birthday was on Friday"?
How many bits of information contained in the statement "my birthday was on Friday, September 12"?
arrow_forward
Discuss in detail about the evolution of electrical/
electrical Communication methods and technologies
arrow_forward
(b) Figure Q.4b shows an Adder/Subtractor circuit implemented using Adder Q. The delay for
XOR = 2t, OR = AND=1t and cascadable full adder is used for ripple carry adder. Assume
inputs X, Y and ADDSUB have arrived at Ot. Analyze the critical path delay for the circuit
if:-
X[7.4]
YI7.4]
4.
A[3.0]
A[3.0]
lo"cle
C4
C8
C4
Adder Q
co
C4
Adder Q
co
ADDSUB
Sum(3.0]
Sum[3.0]
Z17.4]
Figure Q.4b
i. Adder Q is a 4-bit Ripple-Carry Adder. Show your analysis in Table Q.4b.i.
ii. Adder Q is a 4-bit Carry-Lookahead Adder. Show your analysis in Table Q.4b.ii.
Table Q.4b.i
Table Q.4b.ii
To Node
Delay
To Node
Delay
Z3
Z3
С4
С4
Z7
Z7
C8
C8
Page 14 of 21
arrow_forward
The following data are transmitted in a serial communication system (P is the parity
bit). What parity is being used in each case?
a. ABCDEFGHP = 010000101
b. ABCDEFGHP = 011000101
c. ABCDP = 01101
d. ABCDEP = 101011
e. ABCDEP = 111011
arrow_forward
3. Analyze the following design based on different values of X and Y and determine whether it can
store a bit of information. If yes, form the characteristic table and show each of the set, reset, store,
and complement actions if available. Otherwise, explain the problem with the design.
DD
arrow_forward
Hiii could you help me to solve thisss?? Thankks a loot!
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Introductory Circuit Analysis (13th Edition)
Electrical Engineering
ISBN:9780133923605
Author:Robert L. Boylestad
Publisher:PEARSON
Delmar's Standard Textbook Of Electricity
Electrical Engineering
ISBN:9781337900348
Author:Stephen L. Herman
Publisher:Cengage Learning
Programmable Logic Controllers
Electrical Engineering
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Fundamentals of Electric Circuits
Electrical Engineering
ISBN:9780078028229
Author:Charles K Alexander, Matthew Sadiku
Publisher:McGraw-Hill Education
Electric Circuits. (11th Edition)
Electrical Engineering
ISBN:9780134746968
Author:James W. Nilsson, Susan Riedel
Publisher:PEARSON
Engineering Electromagnetics
Electrical Engineering
ISBN:9780078028151
Author:Hayt, William H. (william Hart), Jr, BUCK, John A.
Publisher:Mcgraw-hill Education,
Related Questions
- Q4/ Why the performance of multimode graded index is better than multimode step index? Q5/ Design fiber optics communication system with analogue input and then measure the performance of the three types of fiber optics configurations. After that, answer the following questions: 1. Which configuration is the better? Comment! 2. Which parameters that improve the performance of multimode step index? Comment! 3. Which parameters that improve the performance of multimode graded index? Comment! 4. Which parameters that improve the performance of single mode step index? Comment! 5. If we need to increase the fiber length from 1 km to 15 km. which configuration is used? Comment!arrow_forward1- Which layers are network support layers? a. Physical Layer b. session Layer 2-What are the responsibilities of Data Link Layer? a. Framing b. Encryption c. Mail services 3- What are the types of errors? a. Compression b. Redundancy c. Single-Bit 4- What are the responsibilities of Application Layer? c. Application Layers Flow Control b. Translation c. Mail services 5- application layer protocols? a. TFTP b. ICMP c. (ARP)arrow_forward(i) Below (figure 1) is an example of a VHDL code for a multiplexer. --multiplexer.vhd --Common Multiplexer LIBRARY ieee; USE ieee.std_logic_1164.ALL; ENTITY multiplexer IS PORT(el, d3, d2, d1, d0 : IN STD_LOGIC; a,b.c,d,e,f.g.h.ij.k,lm,n:OUT STD LOGIC); END multiplexer; ARCHITECTURE mult OF multiplexer IS SIGNAL input : STD LOGIC_VECTOR (4 downto 0); SIGNAL output : STD LOGIC_VECTOR (13 downto 0); BEGIN input ca el & d3 & d2 & d1 & d0; WITH input SELECT "00000010000001"WHEN "10000",--Input A "00000010000001"WHEN "10001",- "00000010000001"WHEN "10010",- "00000010000001"WHEN "10011",- "00000011001111"WHEN "10100" "00000011001111"WHEN "10101 "00000011001111"WHEN "10110" "00000011001111"WHEN "10111" "10011110000001"WHEN "11000" "10011110000001"WHEN "11001" "10011110000001"WHEN "11010, "10011110000001"WHEN "11011" "10011111001111"WHEN "11100" "100111110011i1"WHEN "11101",- "10011111001111"WHEN "11110",-- "10011111001111"WHEN "11111":-. "00000010000001" -00 --"00000011001111"-01…arrow_forward
- Q2: In the 7-segment display, derive an SOP expression for segment ('f )'using the input variables WXYZ and theń expression using Karnaugh map (each digit represented by a BCD codě). minimize thearrow_forwardTo implement 8-to-1 line multiplexer using two 4-to-1 line multiplexer(MUX): O a. The third selctor is connected to the enable line of the first and second MUX. O b. Only the enable line of the first MUX must be connected dirictly to the enable for the second MUX. O c. The third selctor is connected to the enable line of the first MUX which is connected through inverter to the enable of the second MUX. O d. All inputs lines for the first mux must be connected to the input lines for the second mux.arrow_forwardQUESTION 4 a. In your own words, explain the term companding used in telecommunications the important of that process. b. In telecommunication, a line code is a pattern of voltage, current, or photons used to represent digital data transmitted down a transmission line. Assuming that you are about to send a set of bit string: 1000 1001 1101 0110 down to the transmission line, illustrate the resulted coded signal after it went through line coder using differential Manchester code formats.arrow_forward
- 4-a) what are the application of gray code? b) what is the advantages of the gray code?arrow_forwardWe want to design a digital circuit that converts Gray code (ABC) to Binary code (xyz). Set up a 8-to- 1 line multiplexer so that the output gives y as a function of ABC. "A" is given to the most significant bit of the control inputs of the multiplexer. "C" is given to the least significant bit of the control inputs of the multiplexer.arrow_forwardList three major types of communication services that are not yet digital but could eventually be, and explain how digital techniques could be applied to those applications. (Our subject is Principles of Electronic Communications)arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Introductory Circuit Analysis (13th Edition)Electrical EngineeringISBN:9780133923605Author:Robert L. BoylestadPublisher:PEARSONDelmar's Standard Textbook Of ElectricityElectrical EngineeringISBN:9781337900348Author:Stephen L. HermanPublisher:Cengage LearningProgrammable Logic ControllersElectrical EngineeringISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
- Fundamentals of Electric CircuitsElectrical EngineeringISBN:9780078028229Author:Charles K Alexander, Matthew SadikuPublisher:McGraw-Hill EducationElectric Circuits. (11th Edition)Electrical EngineeringISBN:9780134746968Author:James W. Nilsson, Susan RiedelPublisher:PEARSONEngineering ElectromagneticsElectrical EngineeringISBN:9780078028151Author:Hayt, William H. (william Hart), Jr, BUCK, John A.Publisher:Mcgraw-hill Education,
Introductory Circuit Analysis (13th Edition)
Electrical Engineering
ISBN:9780133923605
Author:Robert L. Boylestad
Publisher:PEARSON
Delmar's Standard Textbook Of Electricity
Electrical Engineering
ISBN:9781337900348
Author:Stephen L. Herman
Publisher:Cengage Learning
Programmable Logic Controllers
Electrical Engineering
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Fundamentals of Electric Circuits
Electrical Engineering
ISBN:9780078028229
Author:Charles K Alexander, Matthew Sadiku
Publisher:McGraw-Hill Education
Electric Circuits. (11th Edition)
Electrical Engineering
ISBN:9780134746968
Author:James W. Nilsson, Susan Riedel
Publisher:PEARSON
Engineering Electromagnetics
Electrical Engineering
ISBN:9780078028151
Author:Hayt, William H. (william Hart), Jr, BUCK, John A.
Publisher:Mcgraw-hill Education,