Вы находитесь на странице: 1из 13

DIGITAL COMMUNICATION 1. In Mobile telecommunication systems, a number of databases are used to store information about mobile users.

One of these databases contains data records about mobile stations that can be used to check for stolen mobile stations. This type of database is known as _________________. a. b. c. d. home location register visitor location register equipment identity register signaling level register

. The banyan network is an e!ample of a blocking network. There are two types of blocking that occur in the banyan network" one is called the output port blocking and the other is called ______________. a. b. c. d. internal link blocking e!ternal link blocking input link blocking buffer link blocking

#. $ convenient way for specifying a %ueuing system is to use &endall notation which takes the form" $'(')'*. In &endall notation, +ymbol ( is used to represent ____________. a. b. c. d. the arrival process the service process the number of servers the ma!imum number of ,obs in the %ueue

-. .onsider the following self/synchroni0ing scrambler"

The tap polynomial that represents the above self/synchroni0ing scrambler is ____________ a. b. c. d. 11!/ 1 !/1+x-3+ x-5 11!/ 1 !/2 11!/#1 !/-

2. 3olay code and *eed/+olomon codes are e!amples of _____________ that are commonly used in communication system. a. convolutional error/correcting codes b. tree error/correcting codes c. parity error/correcting codes d. block error-correcting codes 4. 5iterbi decoding is one of the most commonly used techni%ue in modern systems that is used to decode the data encoded by ___________________. a. b. c. d. block coding 6amming coding convolutional coding .*. coding

Form A - 1

7. 3iven the following binary modulation scheme shown below"

The above modulation scheme is an e!ample of _____________________. a. b. c. d. phase shift keying fre%uency shift keying amplitude shift keying continuous/phase fre%uency shift keying

8. In a linear system, if an input x19t: produces an output y19t:, and an input x 9t: produces an output y 9t:, then an input x19t: 1 x 9t: produces an output y19t: 1 y 9t:. This property of the linear system obeys ____________________. a. b. c. d. fre%uency preservation property orthogonal property principle of superposition amplification property

;. $pplications like <igitally coded voice signals, high %uality audio signals and constant bit rate video signals are used in $TM network where the preservation of a constant bit/rate is the most significant. These applications are supported by the $TM $daptation layer of _____________. a. b. c. d. Type 1 Type Type = Type 2

1>. On/off keying is the modulation scheme used for the ma,ority of optical/fiber communication systems. This scheme is an e!ample of ____________________. a. b. c. d. binary fre%uency shift keying binary phase shift keying binary continuous/phase fre%uency shift keying binary amplitude shift keying

11. ?ight is an electromagnetic wave similar to a radio signal with a fre%uency __________________. a. very much slower than fre%uency of a radio signal b. very much higher than frequency of a radio signal c. identical to the fre%uency of a radio signal d. very similar to the fre%uency of a radio signal 1 . @hen a specific physical transmission channel is provided for the e!clusive and continuous use of each path through a network, this is called _____________. a. b. c. d. packet switching circuit s itching network switching virtual switching

Form A - 2

1#. Aackets can be transmitted through a packet/switched network as independent packets. This kind of transmission is known as _________________. a. b. c. d. datagrams virtual circuits asynchronous synchronous

1-. The most common addressing scheme used in internet is IA version -. This IA version is composed of __________. a. - bits b. #4 bits c. 3! bits d. 4- bits 12. <ifferential coding produces an output in which the information is contained in differences between successive bits such that the output changes state if the input bit is a 1 otherwise the output remains the same. $ssuming the initial condition for the output is >, the differential coding for the input se%uence 11>>1>1 is ___________. a. b. c. d. 1>111>1 1>1>1>1 1"""11" 11111>1

14. The routing tables within the router are used for routing the packets. The need for routing tables can be avoided by using simple strategies. $n e!ample of such a simple strategy is ___________. a. b. c. d. dynamic alternative routing least/cost routing flooding routing static routing

17. One way of implementing a time switch is to use two memory devices" one for storing the incoming data and the other stores the order in which the octets are sent to the outgoing lines. The memory device that is used for storing incoming data is called ______________. a. b. c. d. connection store speech store buffer store space store

18. In optical fiber systems, there are two sorts of light sources" light emitting diodes 9?B<s: and laser diodes. The optical line/width of a laser diode is _______________________. a. narro er than that of a #$% b. wider than that of a ?B< c. e%ual to that of a ?B< d. similar to that of a ?B< 1;. In a communication system, when two finite/power waveforms ! 9t: and y 9t: having the properties" C! yD E> and C 9! 1 y: DE C!D 1 CyD , then these waveforms are said to be __________. a. b. c. d. identical overlap similar orthogonal

Form A - 3

>. $n important impairment to digital signals in a communication system is the irregularities in timing caused by imperfections in clock e!traction and waveform regeneration. This effect is known as __________________. a. b. c. d. &itter aliasing fading attenuation

1. @hen a gap e!ists in optical fiber cable, a reflection of the signal passing in the fiber will occur. This effect is know as __________________. a. b. c. d. aliasing reflection fresnel reflection wireless reflection glass reflection

. Optical amplifiers are devices which are used to amplify the signals passing in optical fiber cables. One of the technologies used for manufacturing optical amplifiers is ________________. a. b. c. d. FaccopGs amplifiers copper amplifiers iron amplifiers 'aman amplifiers

#. In $TM network, each message is divided into a number of e%ual si0ed packets called cells. Bach cell carries a number of octets e%ual to __________. a. b. c. d. # -8 53 4-

-. In $TM network, the main task of the $TM layer is to __________________. a. b. c. d. organi(e the multiplexing and s itching of the cells split data into a number of octet chunks to fit the si0e of a cell and pass these to lower layer minimi0e the possibility of cells with corrupted headers being passed on to upper layer all of the above

2. (ecause $TM is a packet/switched network, several cells destined for the same output could arrive from different inputs within the same cell time slot. The simultaneous arrival of more than one cell needing to be directed to the same output is known as ______________. a. b. c. d. %ueuing buffering lacking contention

Form A - 4

4. $ metallic wire can be made dc blocking by adding a transformer or capacitor to prevent dc signals from passing which affects transmitted signals causing them to drift towards > 5 as shown in the figure below"

This effect is called ___________________. a. b. c. d. crosstalk aliasing base/band signal modulation baseline ander

7. Interleaving is a techni%ue used to allow error/correcting codes to protect against bursts. If we are interleaving & code words from a block error correcting code with code words of length ? bits 9using a matri! with dimensions & rows and ? columns:, this will introduce ______________. a. b. c. d. a total delay E 9& ! ?: a total delay) ! *+ x #, a total delayE - 9& ! ?: no delay

8. One type of optical fiber is the ___________________ that is cheap, easy to use and suitable for short/ distance communication. a. b. c. d. glass fiber iron fiber copper fiber plastic fiber

;. In optical fiber, the data carrying capacity of a single fiber can be increased by a special type of multiple!ing known as __________________. a. b. c. d. code division multiple!ing frequency division multiplexing amplitude division multiple!ing phase division multiple!ing

#>. $ useful spectral model of many types of noise encountered in communication systems is @hite noise. $n important property of a @hite noise is that it has ____________________. a. b. c. d. a decreasing power density for all fre%uencies an increasing power density for all fre%uencies a constant po er density for all frequencies an increasing power density for high fre%uencies only

Form A - 5

Part II: Short essay questions (18 mar s!


This part consists of 8 questions carrying a "#IG$T O% & mar s ea'h. You must answer on(y ) (any! of the following questions (-uggested Time about .5 minutes!. #1. @ith reference to the header of an $TM cell shown below, e!plain the purpose of the cell loss priority 9.?A:.

The cell loss priority 9.?A: field is a single field that indicates whether a cell may be discarded or not in th event of network congestion. Hor e!ample, when traffic is policed to check for compliance with a traffic contract, non/compliant cells might be flagged rather than being discarded immediately. # . B!plain the principle of operation of .*. error checking. Include in your answer an e!ample using denary notation for the message M E 1#27; and the generator 3 E ;;. $t the encoder the message 9M: is divided by a shorter known divisor 93: 1#27; ';; E 1#71.4#4# $ remainder can be calculated by taking away from the message the largest number that can be divided e!actly by the divisor. 1#27; I 1#27 ; E 4# The remainder is sent with the message to the decoder, where the remainder is recalculated. If there are no errors, the remainder will be the same If there are errors, the remainder is likely to be different. Hor e!ample, suppose the first digit is changed from 1 to , the remainder will be" #27; ';; E #81.7#7 #27; I #81 ! ;; E 7# since 7# is different from 4# the receiver knows there must have been errors. ##. @hat do the three parameters 9M, M, and 1: indicate for a %ueue described by the e!pression M'M'1J In M'M'1, the first M means that the arrivals are a Markov process, i.e., a poisson arrival distribution The second M means that the service is also a Markov process" a Aoisson'e!ponential service distribution The 1 is the number of servers

Form A - 6

#-. B!plain advantages and disadvantages of using a flooding routing strategy. $dvantages" )o routing tables are re%uired at each node. $ node only needs to know which links it has, not where the links are going. 5ery robust in cases of network failure. )ew links and nodes can be added to a network without any administrative overheads. <isadvantages" Hor each packet sent, there can be many copies made and transmitted. This increases the traffic load on the links and nodes. Aossible instability if a loop is formed which does not include the source or destination unless some additional control is imposed, such as a time/to/live counter. #2. B!plain the differences in the transfer of packets in a packet/switched network in which virtual circuits are used compared with one in which datagrams are used. 5irtual circuits must be set up before any data packets are transferred, whereas datagrams can be transferred without any prior e!change of protocol messages. 5irtual circuits allow greater control over the %uality of service in the form of flow control, error control and se%uence control. Once a virtual circuit has been set up, switching 9forwarding: is simpler, and this can lead to shorter delay compared with datagrams. *outing 9forwarding: tables are smaller and simpler for virtual circuits 9once a circuit has been set up: than for datagrams. The same route is used between the source and destination for all data packets unless a fault occurs in a virtual circuit, but may vary for each datagram to balance the traffic loading of the network. <atagrams contain the full addresses, but data packets carried by virtual circuits need to contain addresses of virtual circuits. #4. <escribe the role of any stores used in the incoming time switch, and how they are kept synchroni0ed. The incoming time switch has a speech store and a connection store. Incoming octets are stored in the speech store. The connection store is used to determine the order in which octets are read out of the speech store. (oth stores are kept in synchroni0ation using a counter. #7. Hor each of the following modulation schemes briefly describe how it works, sketch a possible waveform for the se%uence 11>1. 9i: On/off keying" $ sinusoidal carrier is switched on 9for a data 1: and off 9for a data >:. @aveform similar to the following with different data se%uence.

9ii:

Hre%uency shift keying" uses segments of sinusoids of different fre%uency. @aveform similar to the following with different data se%uence.

Form A - 7

9iii:

(inary phase shift keying" uses two different phases of a segment of a sinusoidal waveform are used. @aveform similar to the following with different data se%uence.

#8. @hat is meant by wavelength division multiple!ing 9@<M: in the conte!t of optical fibre communicationJ @hy is it usedJ @<M increases the capacity of a single optical fibre by putting several channels on a single fibre, distinguishing them by operating each at a different wavelength 9optical fre%uency:. It is used to get more data down a single fibre without having to operate at very high signaling rates 9which is the alternative way of increasing the capacity of the fibre:.

Form A - 8

Part III: Numeri'a( *ro+(ems (&) mar s!


This part consists of 8 questions carrying a "#IG$T o, ) mar s ea'h. You must answer on(y ) (any! of the following questions (-uggested Time about /" minutes!. #;. The figure below shows the encoder of a convolutional code. $fter each bit enters the encoder two code digits are transmitted to the channel.

*+,.tora!e e%ement
.onvolutional encoder 9a: values. 9b: 9c: <raw a state diagram and trellis diagram for the code. $ssume that the encoder starts off with > in the storage element. @hat would the data 11>1>> be encoded toJ 9The first bit to be encoded is on the left: what is the rate and input constraint length for this codeJ B!plain how you arrive at these

(a) The rate is the ratio between the number of input bits in a frame (1) and the number of ode di!its transmitted per frame (2)" so the rate is #$ The input onstraint %en!th is the number of bits in&o%&ed in the en odin! of an' one frame" in this ase 2$
9b:

9c:

4($ Aart of a router in packet/switching system consists of a single/server %ueue with an infinite buffer. Aacket arrivals can be assumed to be a Aoisson process with an arrival rate of >>> packets per second. The service of >.-ms is the same for all packets. <etermine the mean waiting time in the buffer.

Form A - )

$ deterministic system must be assumed with ts E >.-ms and E >>> ,obs per second Thus E K ts E >>> K >.-K 1>/# E >.8 and using e%uation -.7 of the *eference (ook tw = ts / ($4 /1( 3 / ($8 ($4 /1( 3 = = = 1ms 2(1 ) 2( ($2 ) ($4

-1. $ single/server %ueue has a Aoisson arrival rate of 1 ,obs per second and a negative e!ponential service rate of > ,obs per second. The buffer can hold 8 ,obs. b: @rite out the &endall notation for this %ueue. c: .alculate the probability of blocking. a: M'M'1'; b: ts E 1' > $ E ts E 1 ' > E >.4 +o $ *11 E >.4 1> CC 1

E 91/>.4: >.4 ; E >.>>- . Table below shows the parameters of an optical fibre communications link. <raw up a power budget to determine the ma!imum link length that can be used with this system. 0arameter Ma!imum launch power *eceive sensitivity $llowance for connector and splice losses Ma!imum fibre attenuation ?ink power penalties 1alue d(m 1>I d(m -I d( 1.2 d('km 1.2 d( -

The ma!imum loss allowed is 1- d(, calculated from /1> d(m /9/ -: d(m 1d( Hrom this we subtract the allowance for connector and splice losses 91.2 d(: and the link power penalities 9-d(:, leaving 8.2 d(. The fibre attenuation is 1.2 d('km, so the allowed distance is 2.7 km. -#. $n M'M'1 %ueue is to be designed such that the probability that there should be at most five ,obs waiting in the system 9buffer 1 server: is >.;2. <etermine the ma!imum acceptable level of server utili0ation for this %ueue. B%uation -.1# from the *eference (ook is" A9number in system n: E 1 / n11 +ubstituting values >.;2 E 1 / 4 *earranging 4 E 1 / >.;2 E >.>2 taking logs 4 log E log 9>.>2: E /1.# log E />. 17 E 1>/>. 17 E >.4>7

Form A - 1(

44$ $ metallic cable transmits electrical signals in a way that appro!imates closely the L f modelG of attenuation. $ sinusoidal 1> k60 signal with a transmitted amplitude of 4 5 at the near end of the cable is found to be attenuated to 1. 5 over a distance of 1> km. 9i: @hat is the attenuation of the cable in d('kmJ 9ii: If the fre%uency of the signal were increased to 14> k60, with the near/end amplitude unchanged, what would be the received amplitude after traveling 1> kmJ i: attenuation over 1> km is given by > log 94'1. : E 1- d( that is 1-'1> E 1.- d( ' km ii: the fre%uency has increased by a factor of 14>'1> E 14, so the attenuation in d('km increases by a factor of 14 E - to 1.- K - E 2.4 d('km, so the attenuation over 1> km is 1> K 2.4 E 24 d(. The voltage ratio is therefore 1> 24' > E 4#1, and the output voltage 4'4#1 E ;.2 ! 1> /# 5 E ;.2 m5 -2. $ signal at a level of I12 d(m has band/limited noise accompanying it in the range -> to 4> k60. The power density of the noise is 1 p@' 60. Bstimate the +ignal/to/)oise ratio as a ratio. /12 d(m converts to a power level of 1> I1.2 m@ E >.>#14 m@ The noise power is 1 K1>/; K > K 1> # m@ E >.>> - m@ $nd thus the +)* is 1#1 or 1. d( -4. $ component has an e!ponential reliability function and its mean time to failure 9MTTH: is 1>>> hours. 9i: @rite down an e!pression for the reliability function, R9t:, and calculate the probability that the component will have failed by 2>> hours. 9ii: $ system consists of two of the components described above, connected in series from a reliability point of view. @hat is the probability that the system will have failed by 2>> hoursJ 9i:The component has an e!ponential reliability function and its mean time to failure 9MTTH: is 1>>> hours, so *9t: E B!p9/t'1>>>: 9where t is in hours:. The probability of surviving to 2>> hours is therefore *92>>: E B!p9/2>>'1>>>: E >.41 The probability of failing by 2>> hours is 1/>.41 E >.#;. 9ii: Hor components with e!ponential reliability functions the failure rate is 1'MTT*, and when such components are connected in series their failure rates add. +o the reliability function for the system is given by" *9t: E B!p9/ t'1>>>: The probability of surviving to 2>> hours is therefore *92>>: E B!p9/ ! 2>>'1>>>: E >.#7 The probability of failing by 2>> hours is 1/>.#7 E >.4#. $lternatively, using the result from part 9ii:, the probability of them both surviving is >.41 and therefore the probability of at least one failing is 1 / >.41 E >.4#.

Form A - 11

Part I-: Lon.er *ro+(ems (1) mar s!


This part consists of ! questions carrying a 2$345T of 6 marks each. Mou must answer 7## of the following %uestions *-uggested Time about 3" minutes,.

-7. Higure below shows the links and link costs of a network. 9i: 9ii: Nse <i,kstraGs algorithm to find the least/cost paths in the network, with node $ as the source node. Mour answer should clearly show the least/cost list, the candidate list and the cost. .onstruct a routing table based on the least/cost paths for node $.

2 8

0
2

4 7

2
1 2

9i: The following table can be constructed using the <i,kstra algorithm"

0ath #east 8cost list

3nitial $

1st $

!nd $ (

3rd $ ( .

.th $ ( . B < H > # 2 4

5th $ ( . < B H

/th $ ( . < B H

9andidate list

%77 %7: %79 %7% %7$ %7;

( < B > 8

. < B > # 8

< B H > # 2 7

> # 2 4

> # 2 4

9ii: *outing table for $ <estination )e!t node $ / ( ( . ( < ( B B H B

Form A - 12

48$ A base-band di!ita% transmission s'stem usin! meta%%i ab%es is to be up!raded so that the bitrate is in reased b' a fa tor of 4$ The noise at the re ei&er is assumed to be white and 3aussian" and the same for the ori!ina% and the up!raded %in4s$ The a&era!e power transmitted o&er the up!raded %in4s must remain the same$ (i) .uppose that the ori!ina% %in4 operates b' transmittin! 5 5 re tan!u%ar pu%ses whi h are attenuated to 5( m 5 at the re ei&er$ The ma+imum %en!th of the %in4 for the !i&en error spe ifi ation is 4 4m$ 6hat is the attenuation in de ibe%s per 4i%ometre7 *stimate the attenuation in de ibe%s per 4i%ometre at the hi!her bit-rate$ The ener!' in a re tan!u%ar pu%se hei!ht of V &o%ts and duration T se onds is V2 T. To maintain the same error rate" what must be the minimum hei!ht of the pu%ses re ei&ed o&er the hi!her-speed %in47 6hat is the ma+imum %en!th of the hi!her-speed %in4 if the re ei&ed pu%ses are to ha&e a suffi ient ma!nitude7

(ii) (iii)

(i&)

9a: The attenuation in decibels over - km is" > ?og 92 ' 2!1>/ : E > log 1>> E ->. In other words, it is 1> d( km/1. 9b: Increasing the bit/rate by a factor of - will increase all fre%uency components by a factor of -. +ince attenuation in decibels per kilometre in metallic cables is roughly proportional to the s%uare root of fre%uency, the attenuation of the higher/speed link can be estimated at twice that of the original" > d( km /1. 9c: To maintain the same error rate with the noise characteristics unchanged, the pulse energy must remain the same at the higher bit rate. Met at the higher rate the received pulse width, T, will have been reduced by a factor of - in comparison with the original. To maintain the pulse energy, V2 T, constant, the value of V2 must increase by a factor of -. The received voltage, V, must therefore increase by a factor O- E , to 1>> m5 or >.1 5. 9d: $n attenuation from 2 5 to >.1 5 is > log 92'>.1: E #- d(. $t an attenuation of > d( km /1, the link therefore has a ma!imum length of #-' > E 1.7 km. Increasing the bit/rate by a factor of - has thus decreased the ma!imum link length to 1.7'- E >.- 2 of its original value.

Form A - 13

Вам также может понравиться