N
EXNoii;
UNIVERSITY OF COLO
.l
ii'
FACULTY OE
SECOND YEAR. EXAMINATION IN
Non-programmsble
1i"
ff:rt,'t,.
#ii
'
i:,
.)' i
;,..1
SEMESTER I g'2005
.t
II\
Psrt A
Qr
Qucstion
L,'
I-Z\
Tcchnologies
01 snd 02
B1
Ilriefly
I.
discuss the usc
n and correction in data cornmunication'
of
I{.
State error contol aPProac
iit.
ii:
"Two bit errors are not
lV.
What is the use of
by data communication.
to detect in single parity bit checkingl''
Elaborate on this.
'
V.
'*'' !
in data communication?
't:
The following code ha3
Calculate the codeword us
,.1011010'.
the data bits (information word).
insT/4 mechanism.
If rqceived codeword in
error ness bil and write
mechanism is "1q190119011"' find thc 'i
t' "- ';
crrect
't
Vl.
714
codeword.
.t.'q't"
statistical approach. It is obviotrs
characters.If we can encode
storage
sPace.
,.Itt*a
thrt
_ ^. ,i
are analyzed and their reletii.cl
ich is an unbalanced biriary irce is sreatcd?
...;i
Tabi! given below has
lluffrnan encoding tree
with their respective probabilities. Butitd tbS
down the code for each character. .r ' i
.L
..
.r.1
\S
r.T
?>o /
4-(s
,4
itl
"
il
s,
f,
t'
1:.
i:
*,:.*i1ii.:
',:ilft
What is 802.1i in the context of
recomrnend to use this? brirLo,ra
II.
.'-i'lijr
In each of the following cases
0-2ss)
,
.-
a. I 19.17."13. 155
b, t7 .255.255.0
c. 121.9.13.151
d. t20.17.255.255
'
e., ,235.5.8.171
IV. Describe the importance of
Consider crcating 6 usable
Writc down the network
Horv many useable host I
What is the iP address of
d. Find the subnet mask of
e. What are rhe altemative
a.
b.
c.
broadcast IP of each suSriet.
n each subnet.
of the subnet #3 (3'd subneQ
:arrangement.
of setting up variable sized subneti?
n\
tcl 2,
rin
lSS
I 6 g,
r J-)-s
l4),1{'
tlir:
W
1
-4
'
'.'i
'
-" I <-=--.;;:l :-r
/*Outprit {iclcl nlnrls
.::!i'*i 'i
1:
us rri!rl
I
rl-q
.C 1-.1;.e.
/ kOutprrt
!,,{..'.Ir. (..
..
(Hr..A'rr...
lli
!...
rccrlrds+/
fu.t.;.q.q. .-...
i'..
.'.:.!.=/.s:!:
/sCf r:;in;j proccrll.rrt s*/
t'oi: