0% found this document useful (0 votes)
68 views2 pages

ECX5234 Data Communications Assignment 1 - 2011/2012: The Open University of Sri Lanka

The document provides guidelines and questions for an assignment on data communications. It instructs students to: 1) Answer all questions in brief while citing references and avoiding direct reproduction of course materials. 2) Questions cover topics like layered network architectures, protocols, transmission techniques, coding methods, and Local Area Network media types. 3) Tables and diagrams should be used where instructed to illustrate answers concisely.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views2 pages

ECX5234 Data Communications Assignment 1 - 2011/2012: The Open University of Sri Lanka

The document provides guidelines and questions for an assignment on data communications. It instructs students to: 1) Answer all questions in brief while citing references and avoiding direct reproduction of course materials. 2) Questions cover topics like layered network architectures, protocols, transmission techniques, coding methods, and Local Area Network media types. 3) Tables and diagrams should be used where instructed to illustrate answers concisely.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ECX5234 - Data Communications

The Open University of Sri Lanka


DEPARTMENT OF ELECTRICAL & COMPUTER ENGINEERING

ECX5234 Data Communications Assignment 1 - 2011/2012 - Due on 15/07/2011


Very Important Reduced marks are given for late submissions. Zero marks will be given for copying. Direct reproduction of course material as answers will result in reduction of marks. Clear and brief answers with no unnecessary details will gain maximum marks. Always keep contact with the course coordinator either through email, telephone or by prior appointment. For this assignment you need to find additional information from internet or Libraries in addition to the given course material. Please write the references you use.

Answer all questions. Q1. (a) Briefly explain what a layered architecture is and how it operates when a network application is used. Also give 2 advantages and 2 disadvantages of using a layered architecture. Describe the International Standards Organization (ISO) reference model for Open Systems Interconnection (OSI) giving functions, protocols and networking devices used at each layer. Use a table to present your answer. Give some advantages and disadvantages of combining the session, presentation and application layer in the internet model. Compare circuit switching, datagram packet switching and virtual circuit packet switching. Also give an application for each. Use a table to present your answer. Converting digital data into digital methods involves 3 techniques: line coding, block coding and scrambling. Briefly explain each of these techniques giving 2 commonly used coding methods for each. For the bit stream 1 1 1 0 0 0 0 1 0 1 1 1 , draw the encoded output of the following line encoding schemes (i) NRZ-I (ii) Manchester (iii) Differential Manchester (iv) MLT-3 If the NRZ-HDB3 coding method is used, show the output for the following bit stream. 1 1 0 0 0 0 1 0 0 0 0 0 1 0.

(b)

(c)

Q2.

(a)

(b)

(c)

(d)

(PTO)

ECX5234 - Data Communications

Q3.

(a)

(b)

(c) (d)

Compare and contrast Pulse Code Modulation (PCM) and Delta Modulation (DM). DM scheme is not suitable for signals with largely varying amplitudes between samples. Explain why. Suppose the frequency spectrum of a communication channel is from 3MHz to 4MHz. (i) If the signal to noise ratio of the channel is 24 dB, find the capacity of the channel. (ii) If there were no noise, how many signal levels would be needed to achieve the above bit rate? Phase Shift Keying (PSK) is widely used in telecommunications and networking. Explain the principle behind PSK, BPSK and QPSK. Draw the constellation diagram for the following: (i) ASK, with peak amplitude values of 2 and 4 (ii) BPSK, with a peak amplitude value of 3 (iii) QPSK, with a peak amplitude value of 4

Q4.

(a)

Consider a CSMA/CD network with a data rate of 10 Mbps. The maximum distance between any station pair is found to be 2500m for the correct operation of the collision detection process. Find the maximum distance if we increase the data rate to (i) 100 Mbps (ii) 1 Gbps (iii) 10 Gbps The Medium Access Control (MAC) in the 802.11 specification supports an optional access method designed to avoid the hidden terminal problem. (i) What is the hidden terminal problem that occurs in 802.11 networks? (ii) Briefly explain the MAC protocol used in 802.11 networks and how it avoids the hidden station problem. (iii) Compare this MAC protocol with the MAC protocols used in wired Ethernet. What is the hexadecimal equivalent of the following Ethernet? 01011010 00011000 01010101 10001000 00001010 00001111

(b)

(c)

Q5.

Do a survey on transmission media used for Local Area Networks based on the following aspects: (i) Type (ii) Data rate (iii) Maximum segment length (iv) Other characteristics Hint: You are expected to give above details for different types of Copper cables and optical fiber in your answer.

(PTO)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy