0% found this document useful (0 votes)
400 views3 pages

Chapter 10: Forouzan Data Communications and Networks

1. The document contains questions and answers about data communications and networking topics like error detection methods, flow control, error correction, and protocols. 2. Common error detection methods discussed include parity checks, cyclic redundancy checks (CRC), checksums, and two-dimensional parity checks. 3. Error correction methods like forward error correction (FEC) and error correction by retransmission are also summarized.

Uploaded by

Maitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
400 views3 pages

Chapter 10: Forouzan Data Communications and Networks

1. The document contains questions and answers about data communications and networking topics like error detection methods, flow control, error correction, and protocols. 2. Common error detection methods discussed include parity checks, cyclic redundancy checks (CRC), checksums, and two-dimensional parity checks. 3. Error correction methods like forward error correction (FEC) and error correction by retransmission are also summarized.

Uploaded by

Maitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ANS: C

4. The actual bit rate of ADSL downstream data is ________________.


a. 64 kbps c. 31 kps to 255 Mbps
b. 6 to 30 kbps d. 500 kps to 8 Mbps
ANS: D

5. _____________ is a device at the telephone company site that can packetize data to be sent to the
ISP server.
a. A DSLAM c. A Filter
b. An ADSL modem d. A Splitter
ANS: A
Chapter 10: Forouzan Data Communications and Networks

TRUE/FALSE

1. Errors can be categorized as a single-bit error or a dual bit error.

ANS: F

2. Redundancy is the concept of sending extra bits for use in error detection.

ANS: T

3. Three common redundancy methods are: parity check, cyclic redundancy check (CRC) and zero-
sum.

ANS: F

4. An extra bit (parity bit) is added to the data unit in the parity check method.

ANS: T

5. In two-dimensional parity check, a redundant data unit follows n data units.

ANS: T

MULTIPLE CHOICE

1. Which error detection method consists of a parity bit for each data unit as well as an entire data
unit of parity bits?
a. Simple parity check. c. CRC
b. Two-dimensional parity check d. Check-sum
ANS: B

2. Which error detection method uses ones complement arithmetic?


a. Simple parity check c. CRC
b. Two-dimensional parity check d. check-sum
ANS: D
3. ______________ increases the likelihood of detecting burst errors.
a. Simple parity check c. CRC
b. Two-dimensional parity check d. Check-sum
ANS: B

4. Which error detection method consists of just 1 redundant bit per data unit?
a. Single parity c. CRC
b. Two-dimensional parity check d. Check-sum
ANS: A

5. Which error detection method involves polynomials?


a. Simple parity check c. CRC
b. Two-dimensional parity check d. Check-sum
ANS: C

6. Which of the following best describes a single-bit error?


a. A single bit is inverted c. A single bit is inverted per transmission
b. A single bit is inverted per data unit d. Any of the above
ANS: B

7. In cyclic redundancy checking, the divisor is _______________ the CRC.


a. The same size as c. 1 bit more than
b. 1 bit less than d. 2 bits more than
ANS: A

8. If the data unit is 111101, the divisor 1101, what is the dividend at the transmitter?
a. 111111000 c. 001
b. 10000 d. 1111111010
ANS: C

9. While it's a good thing for networks to be able to detect errors, it is better to be able to have in
place the capacity of/for:
a. Resolution c. Error rescue
b. Error correction d. All of the above
ANS: B

10. In ____________________________________________ a receiver can use an error-correcting


code that automatically corrects certain errors.
a. Reverse error correction c. Beginning error correction
b. Forward error correction d. Error correction by retransmission
ANS: B

11. In ___________________________ a receiver can have the sender retransmit the entire data unit
when an error is discovered.
a. Reverse error correction c. Beginning error correction
b. Forward error correction d. Error correction by retransmission
ANS: D
12. Three common redundancy methods are:
a. parity check c. check-sum
b. cyclic redundancy check d. All of the above
ANS: D

13. The ____________________ is an error ___________________ method using redundant bits.


a. Hamming ; detection c. Hamring; detection
b. Hamming; correction d. Hamring; correction
ANS: B

14. By rearranging the order of bit transmission of the data units, the Hamming code can
_____________________________.
a. correct single bit errors. c. correct burst errors
b. detect burst errors d. None of the above.
ANS: C

15. The parity check can detect _____________ errors and not an ______________ errors.
a. an odd number of errors; even number of c. Both A and B
errors
b. an even number of errors; odd number of d. None of the above
errors
ANS: B
Chapter 11: Forouzan Text

TRUE/FALSE

1. Flow control is the regulation of the sender's data rate so that the receiver buffer does not become
overwhelmed.

ANS: T

2. Error control only detects errors.

ANS: F

3. The bandwidth-delay product is a measure of the number of bytes a system can have in transit at
any given time.

ANS: F

4. HDLC is a protocol that implements ARQ mechanisms. It supports communication over point-
to-point or multipoint links.

ANS: T

5. In Stop and Wait ARQ, the sender sends a frame and waits for an acknowledgment from the
receiver before sending the next frame.

ANS: T

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy