Top Banner
DIGITAL COMMUNICATION 1. In Mobile telecommunication systems, a number of databases are used to store information about mobile users. One of these databases contains data records about mobile stations that can be used to check for stolen mobile stations. This type of database is known as _________________. a. home location register b. visitor location register c. equipment identity register d. signaling level register 2. The banyan network is an example of a blocking network. There are two types of blocking that occur in the banyan network: one is called the output port blocking and the other is called ______________. a. internal link blocking b. external link blocking c. input link blocking d. buffer link blocking 3. A convenient way for specifying a queuing system is to use Kendall notation which takes the form: A/B/N/R. In Kendall notation, Symbol B is used to represent ____________. a. the arrival process b. the service process c. the number of servers d. the maximum number of jobs in the queue 4. Consider the following self-synchronizing scrambler: The tap polynomial that represents the above self-synchronizing scrambler is ____________ a. 1+x -2 + x -4 b. 1+x -3 + x -5 c. 1+x -2 + x -5 d. 1+x -3 + x -4 5. Golay code and Reed-Solomon codes are examples of _____________ that are commonly used in communication system. Form A - 1
17

Digital Communication Q&A

Nov 26, 2015

Download

Documents

Digital Communication question and answer
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

Multiple-choice questions

Digital Communication1. In Mobile telecommunication systems, a number of databases are used to store information about mobile users. One of these databases contains data records about mobile stations that can be used to check for stolen mobile stations. This type of database is known as _________________.a. home location registerb. visitor location registerc. equipment identity register

d. signaling level register2. The banyan network is an example of a blocking network. There are two types of blocking that occur in the banyan network: one is called the output port blocking and the other is called ______________.a. internal link blockingb. external link blockingc. input link blockingd. buffer link blocking3. A convenient way for specifying a queuing system is to use Kendall notation which takes the form: A/B/N/R. In Kendall notation, Symbol B is used to represent ____________.a. the arrival processb. the service processc. the number of serversd. the maximum number of jobs in the queue4. Consider the following self-synchronizing scrambler:

The tap polynomial that represents the above self-synchronizing scrambler is ____________

a. 1+x-2+ x-4

b. 1+x-3+ x-5

c. 1+x-2+ x-5

d. 1+x-3+ x-4

5. Golay code and Reed-Solomon codes are examples of _____________ that are commonly used in communication system.

a. convolutional error-correcting codesb. tree error-correcting codesc. parity error-correcting codesd. block error-correcting codes6. Viterbi decoding is one of the most commonly used technique in modern systems that is used to decode the data encoded by ___________________.a. block codingb. Hamming codingc. convolutional codingd. CRC coding7. Given the following binary modulation scheme shown below:

The above modulation scheme is an example of _____________________.a. phase shift keyingb. frequency shift keyingc. amplitude shift keyingd. continuous-phase frequency shift keying8. In a linear system, if an input x1(t) produces an output y1(t), and an input x2(t) produces an output y2(t), then an input x1(t) + x2(t) produces an output y1(t) + y2(t). This property of the linear system obeys ____________________.a. frequency preservation propertyb. orthogonal propertyc. principle of superpositiond. amplification property9. Applications like Digitally coded voice signals, high quality audio signals and constant bit rate video signals are used in ATM network where the preservation of a constant bit-rate is the most significant. These applications are supported by the ATM Adaptation layer of _____________.a. Type 1

b. Type 2c. Type

d. Type 5

10. On-off keying is the modulation scheme used for the majority of optical-fiber communication systems. This scheme is an example of ____________________.a. binary frequency shift keyingb. binary phase shift keyingc. binary continuous-phase frequency shift keyingd. binary amplitude shift keying11. Light is an electromagnetic wave similar to a radio signal with a frequency __________________.a. very much slower than frequency of a radio signalb. very much higher than frequency of a radio signal

c. identical to the frequency of a radio signald. very similar to the frequency of a radio signal12. When a specific physical transmission channel is provided for the exclusive and continuous use of each path through a network, this is called _____________.a. packet switching

b. circuit switching

c. network switchingd. virtual switching13. Packets can be transmitted through a packet-switched network as independent packets. This kind of transmission is known as _________________.a. datagrams

b. virtual circuitsc. asynchronousd. synchronous

14. The most common addressing scheme used in internet is IP version 4. This IP version is composed of __________.a. 24 bitsb. 36 bitsc. 32 bits

d. 64 bits15. Differential coding produces an output in which the information is contained in differences between successive bits such that the output changes state if the input bit is a 1 otherwise the output remains the same. Assuming the initial condition for the output is 0, the differential coding for the input sequence 1100101 is ___________.a. 1011101

b. 1010101

c. 1000110

d. 1111101

16. The routing tables within the router are used for routing the packets. The need for routing tables can be avoided by using simple strategies. An example of such a simple strategy is ___________.a. dynamic alternative routingb. least-cost routingc. flooding routing

d. static routing17. One way of implementing a time switch is to use two memory devices: one for storing the incoming data and the other stores the order in which the octets are sent to the outgoing lines. The memory device that is used for storing incoming data is called ______________.

a. connection storeb. speech store

c. buffer stored. space store

18. In optical fiber systems, there are two sorts of light sources: light emitting diodes (LEDs) and laser diodes. The optical line-width of a laser diode is _______________________.a. narrower than that of a LED

b. wider than that of a LEDc. equal to that of a LEDd. similar to that of a LED19. In a communication system, when two finite-power waveforms x (t) and y (t) having the properties: =0 and < (x + y)2 >= 2 + 2 , then these waveforms are said to be __________.a. identicalb. overlapc. similard. orthogonal20. An important impairment to digital signals in a communication system is the irregularities in timing caused by imperfections in clock extraction and waveform regeneration. This effect is known as __________________.a. jitterb. aliasingc. fadingd. attenuation21. When a gap exists in optical fiber cable, a reflection of the signal passing in the fiber will occur. This effect is know as __________________.a. aliasing reflectionb. fresnel reflectionc. wireless reflectiond. glass reflection22. Optical amplifiers are devices which are used to amplify the signals passing in optical fiber cables. One of the technologies used for manufacturing optical amplifiers is ________________.a. Jaccops amplifiersb. copper amplifiersc. iron amplifiersd. Raman amplifiers23. In ATM network, each message is divided into a number of equal sized packets called cells. Each cell carries a number of octets equal to __________.a. 32 b. 48 c. 53 d. 64 24. In ATM network, the main task of the ATM layer is to __________________.a. organize the multiplexing and switching of the cellsb. split data into a number of octet chunks to fit the size of a cell and pass these to lower layerc. minimize the possibility of cells with corrupted headers being passed on to upper layerd. all of the above25. Because ATM is a packet-switched network, several cells destined for the same output could arrive from different inputs within the same cell time slot. The simultaneous arrival of more than one cell needing to be directed to the same output is known as ______________.a. queuingb. bufferingc. lackingd. contention26. A metallic wire can be made dc blocking by adding a transformer or capacitor to prevent dc signals from passing which affects transmitted signals causing them to drift towards 0 V as shown in the figure below:

This effect is called ___________________.a. crosstalkb. aliasingc. base-band signal modulationd. baseline wander

27. Interleaving is a technique used to allow error-correcting codes to protect against bursts. If we are interleaving K code words from a block error correcting code with code words of length L bits (using a matrix with dimensions K rows and L columns), this will introduce ______________.a. a total delay = (K x L)

b. a total delay= 2 (K x L)

c. a total delay= 4 (K x L)d. no delay

28. One type of optical fiber is the ___________________ that is cheap, easy to use and suitable for short-distance communication.

a. glass fiberb. iron fiberc. copper fiberd. plastic fiber

29. In optical fiber, the data carrying capacity of a single fiber can be increased by a special type of multiplexing known as __________________.a. code division multiplexingb. frequency division multiplexing

c. amplitude division multiplexingd. phase division multiplexing30. A useful spectral model of many types of noise encountered in communication systems is White noise. An important property of a White noise is that it has ____________________.a. a decreasing power density for all frequenciesb. an increasing power density for all frequenciesc. a constant power density for all frequencies

d. an increasing power density for high frequencies onlyPart II: Short essay questions (18 marks)

This part consists of 8 questions carrying a WEIGHT OF 3 marks each. You must answer only 6 (any) of the following questions (Suggested Time about 45 minutes).31. With reference to the header of an ATM cell shown below, explain the purpose of the cell loss priority (CLP).

The cell loss priority (CLP) field is a single field that indicates whether a cell may be discarded or not in th event of network congestion.

For example, when traffic is policed to check for compliance with a traffic contract, non-compliant cells might be flagged rather than being discarded immediately.

32. Explain the principle of operation of CRC error checking. Include in your answer an example using denary notation for the message M = 135792 and the generator G = 99.

At the encoder the message (M) is divided by a shorter known divisor (G)

135792/99 = 1371.6363

A remainder can be calculated by taking away from the message the largest number that can be divided exactly by the divisor.

135792 135729 = 63

The remainder is sent with the message to the decoder, where the remainder is recalculated.

If there are no errors, the remainder will be the same

If there are errors, the remainder is likely to be different.

For example, suppose the first digit is changed from 1 to 2, the remainder will be:

235792/99 = 2381.737

235792 2381 x 99 = 73

since 73 is different from 63 the receiver knows there must have been errors.

33. What do the three parameters (M, M, and 1) indicate for a queue described by the expression M/M/1?

In M/M/1, the first M means that the arrivals are a Markov process, i.e., a poisson arrival distribution

The second M means that the service is also a Markov process: a Poisson/exponential service distribution

The 1 is the number of servers

34. Explain advantages and disadvantages of using a flooding routing strategy.

Advantages:

No routing tables are required at each node. A node only needs to know which links it has, not where the links are going.

Very robust in cases of network failure.

New links and nodes can be added to a network without any administrative overheads.

Disadvantages:

For each packet sent, there can be many copies made and transmitted. This increases the traffic load on the links and nodes.

Possible instability if a loop is formed which does not include the source or destination unless some additional control is imposed, such as a time-to-live counter.

35. Explain the differences in the transfer of packets in a packet-switched network in which virtual circuits are used compared with one in which datagrams are used.

Virtual circuits must be set up before any data packets are transferred, whereas datagrams can be transferred without any prior exchange of protocol messages.

Virtual circuits allow greater control over the quality of service in the form of flow control, error control and sequence control.

Once a virtual circuit has been set up, switching (forwarding) is simpler, and this can lead to shorter delay compared with datagrams. Routing (forwarding) tables are smaller and simpler for virtual circuits (once a circuit has been set up) than for datagrams.

The same route is used between the source and destination for all data packets unless a fault occurs in a virtual circuit, but may vary for each datagram to balance the traffic loading of the network.

Datagrams contain the full addresses, but data packets carried by virtual circuits need to contain addresses of virtual circuits.

36. Describe the role of any stores used in the incoming time switch, and how they are kept synchronized.

The incoming time switch has a speech store and a connection store. Incoming octets are stored in the speech store. The connection store is used to determine the order in which octets are read out of the speech store. Both stores are kept in synchronization using a counter.

37. For each of the following modulation schemes briefly describe how it works, sketch a possible waveform for the sequence 1101.

(i) On-off keying: A sinusoidal carrier is switched on (for a data 1) and off (for a data 0). Waveform similar to the following with different data sequence.

(ii) Frequency shift keying: uses segments of sinusoids of different frequency. Waveform similar to the following with different data sequence.

(iii) Binary phase shift keying: uses two different phases of a segment of a sinusoidal waveform are used. Waveform similar to the following with different data sequence.

38. What is meant by wavelength division multiplexing (WDM) in the context of optical fibre communication? Why is it used?

WDM increases the capacity of a single optical fibre by putting several channels on a single fibre, distinguishing them by operating each at a different wavelength (optical frequency).

It is used to get more data down a single fibre without having to operate at very high signaling rates (which is the alternative way of increasing the capacity of the fibre).

Part III: Numerical problems (36 marks)

This part consists of 8 questions carrying a WEIGHT of 6 marks each. You must answer only 6 (any) of the following questions (Suggested Time about 60 minutes).39. The figure below shows the encoder of a convolutional code. After each bit enters the encoder two code digits are transmitted to the channel.

Convolutional encoder

(a) what is the rate and input constraint length for this code? Explain how you arrive at these values.(b) Draw a state diagram and trellis diagram for the code.(c) Assume that the encoder starts off with 0 in the storage element. What would the data 110100 be encoded to? (The first bit to be encoded is on the left)

(a) The rate is the ratio between the number of input bits in a frame (1) and the number of code digits transmitted per frame (2), so the rate is . The input constraint length is the number of bits involved in the encoding of any one frame, in this case 2.(b)

(c)

40. Part of a router in packet-switching system consists of a single-server queue with an infinite buffer. Packet arrivals can be assumed to be a Poisson process with an arrival rate ( of 2000 packets per second. The service of 0.4ms is the same for all packets. Determine the mean waiting time in the buffer.

A deterministic system must be assumed with ts = 0.4ms and (= 2000 jobs per second

Thus ( = ( * ts = 2000 * 0.4* 10-3 = 0.8 and using equation 4.7 of the Reference Book

41. A single-server queue has a Poisson arrival rate of 12 jobs per second and a negative exponential service rate of 20 jobs per second. The buffer can hold 8 jobs.

b) Write out the Kendall notation for this queue.

c) Calculate the probability of blocking.

a) M/M/1/9

b) ts = 1/20

A = ( ts = 12/20 = 0.6

So A R+1 = 0.6 10