Sei sulla pagina 1di 14

FACULTY OF SCIENCE & AGRICULTURE

SCHOOL OF INFORMATION STUDIES


SPRING SESSION EXAMINATION 2005
ITC242 Introduction to Data Communications

LECTURER:

Phil Roy

DAY & DATE:


WRITING TIME:

TIME:

Three (3) Hours

READING TIME:

Ten Minutes

MATERIALS SUPPLIED BY UNIVERSITY:

1 x 12pp Answer Booklet


General Purpose Answer Sheet

MATERIAL PERMITTED IN EXAMINATION:

Pens and Pencils, Calculator


2B pencil, eraser

NUMBER OF QUESTIONS:

Part A: Forty (40) multiple choice questions (1 mark each)


Part B: Twenty Five (25) completion questions (1 mark each)
Part C: Seven (7) short answer questions (5 marks each)

INSTRUCTIONS TO CANDIDATES:
1.

Enter your name, student number and signature at the bottom of this page.

2.

This is a closed book examination, therefore no written material, reference books or notes will be permitted into
the examination room.

3.

ALL questions should be attempted.

4.

Mark your answers to the multiple choice questions, Part A, on the general purpose answer sheet.

5.

Answers to Part B and Part C are to be written in the examination answer booklets provided

6.

There are 100 marks in total. Part A 40 marks, Part B 25 marks, Part C 35 marks,

INSTRUCTIONS TO INVIGILATORS:
1.

QUESTION PAPER MUST BE COLLECTED

ITC242 Spring Session Examination 2005

Page 1 of 14

STUDENT NAME: ..STUDENT NO:..

STUDENT SIGNATURE:..

PART A: Multiple Choice Questions


(Each question is worth 1 mark each. Answer the questions on the general purpose answer
sheet provided).
1. At which layer of the TCP/IP protocol suite would you find a chat program?
a.
b.
c.
d.

Transport
Presentation
Application
Session

2. Digital lines attempt to offer what level of error-free transmission?


a.
b.
c.
d.

99%
90%
80%
70%

3. Which term describes the process where data is packaged with necessary protocol
information as it passes through layers of the OSI reference model?
a.
b.
c.
d.

Wrapping
Encapsulation
Encryption
Protocolisation

4. The sharing of a medium and its link by two or more devices is called
a.
b.
c.
d.

Modulation
Encoding
Line discipline
Multiplexing

5. What component of an unshielded twisted pair cable reduces its susceptibility to crosstalk?
a.
b.
c.
d.

Outer conductor shielding


A single inner conductor
Twisted core conductor pairs
Diameter of cable

ITC242 Spring Examination 2005

Page 2 of 14

6. The addition of unwanted electromagnetic energy onto a cable between transmitter and
receiver is:
a.
b.
c.
d.

Attenuation
Noise
Amplitude
Spectrum

7. A network style where the application and presentation logic resides on the client and the
data storage logic resides on a server is called:
a.
b.
c.
d.

Client/Server
Client Based
Host Base
Peer-to-Peer

8. When a bridge receives a packet that has a destination MAC address located on the same
segment from which it came, the packet is:
a.
b.
c.
d.

Forwarded
Blocked
Repeated on all segments
All of the above

9. ISDN basic rate interface (BRI) multiplexes _______________ separate data channels.
a.
b.
c.
d.

One
Two
Three
Four

10. ____________________ is a very powerful error detection technique and should be


considered for data transmission systems.
a.
b.
c.
d.

Vertical redundancy check


Cyclic redundancy checksum
Simple parity
Horizontal parity

11. The CSMA/CD network is described by which frame specification?


a.
b.
c.
d.

IEEE 802.2
IEEE 802.3
IEEE 802.4
IEEE 802.5

ITC242 Spring Examination 2005

Page 3 of 14

12. In a ____________________ subnet, a dedicated physical path is established to transmit the


data packets across the subnet.
a.
b.
c.
d.

Circuit-switched
Packet-switched
Large
Heavily loaded

13. The length of a IPv4 address is:


a.
b.
c.
d.

8 bits
16 bits
32 bits
48 bits

14. The concept that describes the merger of previously distinct telephony and information
technologies and markets is called:
a.
b.
c.
d.
e.

Unification
Bundling
Outsourcing
Merger
Convergence

15. The types of networks commonly used in businesses today include:


a.
b.
c.
d.
e.

Local area networks, wide-area networks, and telephone networks


Local area networks, telephone networks, and voice mail networks
Wide area networks, voice mail networks, and email networks
Voice mail networks, email networks, and local area networks
Television networks, voice networks, and data networks

16. Which of the following is the most commonly used standard for computer communications?
a.
b.
c.
d.
e.

SLA
TCP/IP
ISO
USD
DLINK

17. Which of the following does not represent a digital form of information?
a. An MP3 player
b. A Compact Disk containing music recordings
c. A watch that displays date as DD:MM:YYYY
ITC242 Spring Examination 2005

Page 4 of 14

d. The hour and minute hand on a clock


e. A fax transmission
18. Which of the following represents the most basic unit of digital information?
a.
b.
c.
d.
e.

Byte
Nibble
Pixel
Bit
Octet

19. The time interval between when a user presses a key and when the result of that action
arrives at his or her workstation is called the:
a.
b.
c.
d.
e.

Response time
Turn-around time
Think time
Delay time
Transmission time

20. Which of the following is not a benefit of distributed data processing?


a.
b.
c.
d.
e.

Increased responsiveness to organizational needs


Better correspondence to organizational patterns
Greater user involvement and control
Enhanced centralization of data definitions
Reduced systems incompatibility

21. The development of a internationally distributed collection of multimedia files addressed


using universal resource locators led to the:
a.
b.
c.
d.
e.

Telnet package
Email system
World-wide-web
FTP package
Domain resource locator

22. Some of the problems of using IP numbers for addressing hosts in the Internet are resolved
using:
a.
b.
c.
d.
e.

The concept of domains and the use of domain names


The use of Telnet applications
The use of email servers
Splitting IP addresses into four octets
Using fixed routing paths through the network

ITC242 Spring Examination 2005

Page 5 of 14

23. The key features of the DNS database are


a.
b.
c.
d.
e.

Variable-depth hierarchy for names, centralised databases, and name servers


Resolvers, distributed databases, and address servers
Central control of the database, resolvers, and distributed databases
Domain name spaces, address servers, and variable-depth hierarchies
Variable-depth hierarchy for names, distributed databases, and distribution
controlled by the database

24. Which of the following is not a layer of the OSI model?


a.
b.
c.
d.
e.

Presentation layer
Session layer
TCP Layer
Data link layer
Physical layer

25. Which of the following is not a layer of the TCP/IP model?


a.
b.
c.
d.
e.

Application layer
Connection layer
Transport layer
Internet layer
Network access layer

26. A widely used extension to the RFC 822 framework that expands what can be sent via email
is called
a.
b.
c.
d.
e.

MIME
ASCII
VoIP
SMTP
IMAP

27. SMTP is not concerned with the format or content of messages, except for two exceptions.
Which of the following is one of these exceptions?
a.
b.
c.
d.

SMTP standardizes the message character set as 7-bit ASCII


SMTP standardizes the message length into multiples of the packet size
SMTP checks for virus content
SMTP adds binary attachments to the content, when present

28. Which of the following is not a class of client/server processing?


a. Host-based processing
b. Server-based processing
c. Client-based processing
ITC242 Spring Examination 2005

Page 6 of 14

d. Access-based processing
e. Cooperative processing
29. Which of the following describes class C networks?
a.
b.
c.
d.

Many networks, each with a few hosts


Medium number of networks, each with a medium number of hosts
Few networks, each with many hosts
A dedicated network, with a set number of hosts

30. Which of the following LAN technologies has the highest capacity?
a.
b.
c.
d.

Ethernet
Fast Ethernet
Wireless LAN
Gigabit Ethernet

31. Which of the following is NOT one of the stated advantages of packet switching over circuit
switching?
a.
b.
c.
d.

There is less network delay


Line efficiency is greater
Priorities can be used
Ability to use multiple paths for increased reliability

32. When using cellular networks:


a.
b.
c.
d.
e.

Single base station can serve multiple cells


Adjacent cells must use the same frequencies
Adjacent cells are assigned different frequencies
Non-adjacent cells must be assigned different frequencies
Non-adjacent cells can use any frequency

33. Analogue signals differ from digital signals in that:


a. Analogue signals are measured against time while digital signals are measured against
frequency
b. Analogue signals are periodic, digital signals are not
c. Analogue signals are continuous while digital signals remain at one constant level and
then move to another constant level
d. Analogue signals operate a higher frequencies than digital signals
e. Digital signals operate at higher frequencies than analogue signals
34. Which of the following is NOT one of the ways that frequency spectrum can be divided
among active users?

ITC242 Spring Examination 2005

Page 7 of 14

a.
b.
c.
d.

frequency division multiple access


time division multiple access
code division multiple access
cell division multiple access

35. The bandwidth of a signal is


a.
b.
c.
d.

The width of the spectrum


The average of the frequencies
The maximum amplitude of the signal
The minimum amplitude in the signal

36. A carrier wave is modulated with 4 amplitudes and 4 phase changes. How many bits can be
represented with each signal change?
a.
b.
c.
d.
e.

1
2
3
4
5

37. Multiplexing technique where multiple users use distinct time slots such that the transmitted
bits are shared by all users is called:
a.
b.
c.
d.
e.

Frequency division multiplexing


Time division multiplexing
Separate channel multiplexing
Common channel multiplexing
Separate frequency multiplexing

38. ______ is the message output after encryption occurs:


a.
b.
c.
d.

Plaintext
Ciphertext
Key
Encryption algorithm

39. Fault management deals with:


a. Facilities needed to evaluate the behaviour of managed objects and the effectiveness of
communication
b. Aspects essential to operate OSI network management correctly and to protect managed
objects
c. Facilities that enable charges to be established for the use of managed objects
d. Facilities that exercise control over, identify, collect data from, and provide data to
managed objects

ITC242 Spring Examination 2005

Page 8 of 14

e. Facilities that enable the detection, isolation, and correction of abnormal operation of
the OSI environment
40. Which type of satellites orbit at an altitude of approximately 35,000 km, remain above the
same spot on the earths surface but suffer from significant propagation delay?
a.
b.
c.
d.

Low Earth Orbit (LEO) satellites


Medium Earth Orbit (MEO) satellites
Geostationary Earth Orbit (GEO) satellites
None of the above

ITC242 Spring Examination 2005

Page 9 of 14

PART B: Completion Questions


From the provided words select the most appropriate word/s that complete each
statement. Note: Not all words provided are used.
(Each question is worth 1 mark. Answer the questions in the Answer booklet provided.)
impulse

Router

fast

SAN

IEEE 802.11a

bluetooth

Reliability

protocol

VoIP

message transfer agent

asymmetric

Degradation

high speed

SMTP

frame check sequence

gigabit

Bridge

intranet

TCP

management agent

symmetric

Synchronou
s

hub

WAP

IEEE 802.11g

availability

frame

transport

DHCP

SNMP

token ring

Parity

white

PDU

IDS

Physical

Extranet

attenuation

UDP

SIP

1) Thermal noise is uniformly distributed across the frequency spectrum and hence is often
referred to as ____white______ noise.
2) A ___protocol_____ is a set of semantic and syntactic rules that describe how to transmit
data, especially across a network.
3) A ____PDU_______ is a segment of data generated by a specific layer in a protocol stack;
usually consists of a block of data from a higher layer encapsulated by the next lower layer
with a header and trailer. It is passed to the corresponding layer on another device across a
network.
4) Layer 4 of the OSI reference model is the _____transport_____ layer. It provides reliable
transfer of data between end points.
5) _____SIP_____ is an application level control protocol for setting up, modifying and
terminating real time sessions between participants over an IP data network.
6) Internet telephony is also commonly referred to as _____VoIP_____.
7) __SMTP____ is the standard protocol for transferring mail between hosts in the TCP/IP
protocol suite.
8) ___Intranet___ is the term used to refer to the implementation of internet technologies
within a corporate organisation.
9) An ___extranet___ makes use of TCP/IP protocols and applications to provide access to
corporate resources to other companies, customers and suppliers located outside the
corporate network.
10) A layer 4 protocol that is part of the TCP/IP protocol architecture, ____UDP____ is a
connectionless unreliable protocol.
ITC242 Spring Examination 2005

Page 10 of 14

11) A _____SAN____ is a separate network used to handle storage needs.


12) A ____router___ operates at layer 3 of the OSI reference model and is involved with path
selection through a network.
13) The ___Gigabit___ Ethernet 802.3 specification includes physical layer alternatives:
1000Base-LX, 1000Base-SX, 1000Base-CX and 1000BaseT.
14) ____Bluetooth____ is an always on, low power, short range wireless standard using the
2.4Ghz band for a wide range of devices.
15) ___WAP____ is a universal open standard developed to provide mobile users of wireless
phones access to telephony and information services including the Internet and the Web.
16) A decrease in magnitude of current, voltage or power of a signal in transmission between
points is known as ___attenuation___.
17) The term ___asymmetric__ is used in ADSL because more capacity is provided
downstream, from the carrier to the customer, than upstream from the customer to the
carrier.
18) In __synchronous___ TDM sources get a pre-assigned fixed proportion of time slots.
19) ___SNMP___ is an application level protocol that is part of the TCP/IP protocol suite. It is a
collection of specifications for network management that include the protocol itself, the
definition of a database, and associated concepts.
20) ___Availability___ is the percentage of time that a particular function or application is
available for users.
21) A ___frame___ is a group of bits that includes data plus one or more addresses and other
protocol control information. It generally refers to a Link Layer protocol data unit.
22) A __token ring___ network does not have collisions because access to the medium is
controlled.
23) The ___physical___ layer of the OSI reference model and TCP/IP protocol architecture is
concerned with electrical, mechanical and timing aspects.
24) A ___parity___ bit is appended to an array of binary digits for use in error detection.
25) An __IDS___ usually works with a firewall or router to detect that a security breach was
attempted and inform a network administrator.

ITC242 Spring Examination 2005

Page 11 of 14

PART C: Short Answer Questions


(Each question is worth 5 marks. Answer the questions in the Answer booklet provided.
Use diagrams where appropriate to enhance your answers.)
1. Explain how local area networks differ from wide area networks.
Answer:
Local area networks are typically limited to a single premise where all interconnections are
implemented by and owned by the business. In contrast, wide area networks typically involve
multiple premises and the interconnections must rely on access to public right-of-ways and
services provided by regulated common carriers.
2. List and describe the three primary methods for replicating databases.
Answer:
1) Real-time replication involves synchronizing all data immediately, as in transaction
systems.
2) Non-real-time replication involves backups in batches, at fairly frequent intervals.
3) Deferred replication involves bulk transfer of changes at infrequent intervals.
3. Provide the full name for each of the following acronyms
PDU
TCP
UDP
SMTP
SNMP
Answer:
PDU Protocol Data Unit
TCP Transmission Control Protocol
UDP User Datagram Protocol
SMTP Simple Mail Transport Protocol
SNMP Simple Network Management Protocol
4. Describe one (1) of the following Wide Area Network technologies:
ISDN
X.25
ATM
FDDI
SONET
Answer: See Reading 2.
5. Complete the following table describing IEEE 802.11 wireless LAN characteristics.
Frequency

Maximum Data Rate

IEEE 802.11a

ITC242 Spring Examination 2005

Page 12 of 14

IEEE 802.11b
IEEE 802.11g
Answer
Frequency

Maximum Data Rate

IEEE 802.11a

5Ghz

54Mbps

IEEE 802.11b

2.4Ghz

11Mbps

IEEE 802.11g

2.4Ghz

54Mbps

6. Show all working and any assumptions for the following. Given a resolution of 320 pixels x
240 pixels, 1 byte of colour information per pixel and a transmission rate of 30 frames per
second:
a. Calculate the bandwidth necessary for this signal.
b. A 512MB flash drive after formatting has an actual capacity of 498MB (498,000,000 Bytes).
What length of transmission could be stored on the 512MB flash drive?
c. In addition to the 1 byte of colour, sixteen levels of intensity are to be added for each pixel.
What length of transmission could now be stored on the 512MB flash drive?
Answer:
a. 320 x 240 x 8bits x 30fps = 18.4 Mbps
b. 498MB / (18.4Mbps / 8) = 216.5 secs = 3min 36.5 secs
c. 16 levels of intensity require an additional 4 bits per pixel.
498MB / (320 x 240 x 8 x 4 x 30fps)/8 = 498MB/9.2 = 54.13 secs

ITC242 Spring Examination 2005

Page 13 of 14

7. Describe the three types of modulation shown as (a), (b) and (c) in the following diagram.

W. Stallings, Business Data Communications, 5th Edition, 2005.

Answer:
Answer removed similar question in Assignment 2.

ITC242 Spring Examination 2005

Page 14 of 14

Potrebbero piacerti anche