0% found this document useful (0 votes)
71 views4 pages

Data Communication Error Control Exam

This document appears to be an exam for a second year non-programmable technologies course. It contains 6 questions regarding data communication topics like error detection, parity bits, coding, and IP addressing. It also includes a coding problem to find the error bit in a received codeword and build a Huffman encoding tree from a table of characters and probabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views4 pages

Data Communication Error Control Exam

This document appears to be an exam for a second year non-programmable technologies course. It contains 6 questions regarding data communication topics like error detection, parity bits, coding, and IP addressing. It also includes a coding problem to find the error bit in a received codeword and build a Huffman encoding tree from a table of characters and probabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

N

EXNoii;

UNIVERSITY OF COLO
.l
ii'

FACULTY OE
SECOND YEAR. EXAMINATION IN

Non-programmsble

1i"

ff:rt,'t,.
#ii

'

i:,

.)' i

;,..1
SEMESTER I g'2005
.t

II\

Psrt A

Qr

Qucstion

L,'

I-Z\

Tcchnologies
01 snd 02

B1

Ilriefly

I.

discuss the usc

n and correction in data cornmunication'

of

I{.

State error contol aPProac

iit.
ii:

"Two bit errors are not

lV.

What is the use of

by data communication.

to detect in single parity bit checkingl''

Elaborate on this.

'

V.

'*'' !

in data communication?

't:

The following code ha3


Calculate the codeword us

,.1011010'.
the data bits (information word).
insT/4 mechanism.

If rqceived codeword in
error ness bil and write

mechanism is "1q190119011"' find thc 'i


t' "- ';
crrect

't

Vl.

714

codeword.

.t.'q't"

statistical approach. It is obviotrs


characters.If we can encode

storage

sPace.

,.Itt*a

thrt

_ ^. ,i

are analyzed and their reletii.cl

ich is an unbalanced biriary irce is sreatcd?

...;i

Tabi! given below has


lluffrnan encoding tree

with their respective probabilities. Butitd tbS


down the code for each character. .r ' i
.L

..

.r.1
\S

r.T

?>o /

4-(s

,4

itl
"

il
s,

f,

t'

1:.

i:

*,:.*i1ii.:

',:ilft

What is 802.1i in the context of


recomrnend to use this? brirLo,ra

II.

.'-i'lijr

In each of the following cases

0-2ss)

,
.-

a. I 19.17."13. 155
b, t7 .255.255.0
c. 121.9.13.151
d. t20.17.255.255
'

e., ,235.5.8.171

IV. Describe the importance of


Consider crcating 6 usable

Writc down the network


Horv many useable host I
What is the iP address of
d. Find the subnet mask of
e. What are rhe altemative
a.

b.
c.

broadcast IP of each suSriet.


n each subnet.
of the subnet #3 (3'd subneQ
:arrangement.
of setting up variable sized subneti?

n\
tcl 2,
rin

lSS

I 6 g,
r J-)-s

l4),1{'

tlir:

W
1

-4

'

'.'i

'

-" I <-=--.;;:l :-r

/*Outprit {iclcl nlnrls

.::!i'*i 'i
1:

us rri!rl
I

rl-q
.C 1-.1;.e.

/ kOutprrt

!,,{..'.Ir. (..

..

(Hr..A'rr...

lli

!...

rccrlrds+/

fu.t.;.q.q. .-...

i'..

.'.:.!.=/.s:!:

/sCf r:;in;j proccrll.rrt s*/

t'oi:

You might also like