Chapter 9: Data Transmission

Similar documents
Lecture / The Data Link Layer: Framing and Error Detection

1.1. INTRODUCTION 1.2. NUMBER SYSTEMS

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

Advantages and disadvantages

Digital Fundamentals

DATA LINK LAYER UNIT 7.

Digital Fundamentals

Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3)

Framing and Stuffing. Advanced Computer Networks

Packet/Frame, Error Detection How to send data efficiently & reliably?

Fig.12.5 Serial Data Line during Serial Communication

Chapter 3: Number Systems and Codes. Textbook: Petruzella, Frank D., Programmable Logic Controllers. McGraw Hill Companies Inc.

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Input-Output Organization

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

Chapter 3. The Data Link Layer

Serial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey

Configuration of Synchronous Protocols

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

Introduction to Computer Networks. 03 Data Link Layer Introduction

Chapter 6 Digital Data Communications Techniques

Positional Number System

Fundamentals of Programming (C)

Lecture 5: Data Link Layer Basics

Chapter 4: Computer Codes. In this chapter you will learn about:

CSE 123: Computer Networks

Data Link Protocols DATA LINK PROTOCOLS. Asynchronous Protocols. Types of Data Link Protocols XMODEM. Asynchronous Protocols.

Universal Asynchronous Receiver Transmitter Communication

UNIT 7A Data Representation: Numbers and Text. Digital Data

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums


Transmission SIGNALs

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Data Representation and Binary Arithmetic. Lecture 2

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 2 Number Systems and Codes Dr. Xu

I/O Organization John D. Carpinelli, All Rights Reserved 1

A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS

PART III. Data Link Layer MGH T MGH C I 204

Dec Hex Bin ORG ; ZERO. Introduction To Computing

PPP. Point-to-Point Protocol

CS 4453 Computer Networks Winter

Data Link Layer. Overview. Links. Shivkumar Kalyanaraman

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes

umber Systems bit nibble byte word binary decimal

CSCI-1680 Link Layer I Rodrigo Fonseca

UNIT I FUNDAMENTALS & LINK LAYER

Direct Link Networks. Framing. Lecture - Encoding & Framing 1. Problems. Areas for Discussion

RECOMMENDATION ITU-R BS.776 * Format for user data channel of the digital audio interface **

Data Link Control Protocols

HP 48 I/O Technical Interfacing Guide

The Gray Code. Script

Review of Number Systems

BINARY SYSTEM. Binary system is used in digital systems because it is:

Representing Characters, Strings and Text

Digital codes. Resources and methods for learning about these subjects (list a few here, in preparation for your research):

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

3COM0271 Computer Network Protocols & Architectures A

15110 Principles of Computing, Carnegie Mellon University - CORTINA. Digital Data

(Refer Slide Time: 2:20)

CompSci 356: Computer Network Architectures. Lecture 4: Link layer: Encoding, Framing, and Error Detection Ref. Chap 2.2, 2.3,2.4

UNIT-II 1. Discuss the issues in the data link layer. Answer:

DIGITAL SYSTEM DESIGN

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:

Binary. Hexadecimal BINARY CODED DECIMAL

Data Link Layer. Indian Institute of Technology Madras

)454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU

Modbus Remote Communication Protocol for REM 54_. Technical Description

Direct Link Networks. Lecture - Encoding & Framing 1. Areas for Discussion. Problems

2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme

PayLink-IP/232 Configuration Guide 2005 Lava Computer MFG Inc.

4. Error correction and link control. Contents

Digital Logic. The Binary System is a way of writing numbers using only the digits 0 and 1. This is the method used by the (digital) computer.

Specification. Current Consumption Range 8m * Rotational Angle +/- 50 degrees * Shear Angle +/- 40 degrees *

Pretty Good Privacy (PGP

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Number System (Different Ways To Say How Many) Fall 2016

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

Where we are in the Course

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

CHAPTER 4 DATA COMMUNICATION MODES

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems

DATA LINK LAYER: NEED

Code No: RR Set No. 1

Data Link Layer (cont.) ( h h h ) (Sicherungsschicht) HDLC - 1.

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.

Laboratory Finite State Machines and Serial Communication

Data Link Control Protocols

UTF and Turkish. İstinye University. Representing Text

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

Parallel and Serial Bus Analysis Instructor s Guide

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:

UNIT I FUNDAMENTALS & LINK LAYER

DATA COMMUNICATION. Part TWO Data Transmission

CC411: Introduction To Microprocessors

Representing Characters and Text

Transcription:

Chapter 9: Data Transmission MULTIPLE CHOICE 1. In practical terms, parallel data transmission is sent: a. over short distances only c. over any distance b. usually over long distances d. usually over a coaxial cable A 2. The five-level teletype code was invented by: a. the Morkum Company c. Western Union b. the Teletype Company d. Emile Baudot 3. Data codes are also called: a. character codes c. they do not have any other name b. character sets d. both a and b C 4. Digital data that is not being used to carry characters is called: a. FIGS data c. numerical data b. binary data d. all of the above 5. Character codes include: a. alphanumeric characters c. graphic control characters b. data link control characters d. all of the above 6. ASCII stands for: a. American Standard Character-set 2 b. American Standard Code for Information Interchange c. American Standard Code 2 d. Alphanumeric Standard Code for Information Interchange 7. BS, FF, and CR are examples of: a. nonstandard character codes c. control characters b. escape characters d. none of the above C 8. LF stands for: a. Line Feed c. Line Forward

b. Link Feed d. Link Forward A 9. UART stands for: a. Universal Asynchronous Receiver-Transmitter b. Unidirectional Asynchronous Receiver-Transmitter c. Unaltered Received Text d. Universal Automatic Receiver for Text A 10. In asynchronous transmission, the transmitter and receiver are: a. frame-by-frame synchronized using the data bits b. frame-by-frame synchronized using a common clock c. frame-by-frame synchronized using the start and stop bits d. not synchronized at all, hence the name "asynchronous" C 11. In asynchronous transmission, the time between consecutive frames is: a. equal to zero c. equal to the start and stop bit-times b. equal to one bit-time d. not a set length 12. In synchronous transmission, the frames are: a. about the same length as ten asynchronous frames b. much longer than asynchronous frames c. 128 bytes long d. 1024 bytes long 13. Synchronous transmission is used because: a. no start and stop bits means higher efficiency b. it is cheaper than asynchronous since no UARTS are required c. it is easier to implement than asynchronous d. all of the above A 14. In synchronous transmission, the receiver "syncs-up" with the transmitter by using: a. the clock bits c. the CRC bits b. the data bits d. a separate clock line 15. To maintain synchronization in synchronous transmission: a. long strings of 1s and 0s must not be allowed b. transmission must stop periodically for resynchronization c. the clock circuits must be precisely adjusted d. the channel must be noise-free

A 16. BISYNC: a. is an IBM product c. requires the use of DLE b. is a character-oriented protocol d. all of the above 17. HDLC: a. is an IBM product c. is identical to SDLC b. is a bit-oriented protocol d. all of the above 18. The use of flags in SDLC requires: a. "bit-stuffing" c. FEC b. different flags at either end of a frame d. ARQ A 19. The initials ARQ are used to designate: a. automatic request for resynchronization c. automatic receiver queue b. automatic request for retransmission d. automatic request for queue 20. ARQ is used to: a. correct bit errors c. put data into a temporary buffer b. correct synchronization problems d. none of the above A 21. FEC stands for: a. Fixed Error Control c. Forward Error Correction b. Forward Error Control d. False Error Condition C 22. VRC is another name for: a. FEC c. LRC b. ARQ d. parity 23. CRC stands for: a. Control Receiver Code c. Cyclic Redundancy Check b. Correct Received Character d. Cycle Repeat Character C 24. Huffman codes: a. allow errors to be detected but not corrected b. allow errors to be detected and corrected c. allow alphanumeric data to be corrected

d. allow alphanumeric data to be compressed 25. Run-length encoding is used to: a. encrypt data c. correct data b. compress data d. none of the above 26. Public-key encryption: a. allows the use of digital signatures c. avoids the "password problem" b. is used to convey symmetric keys d. all of the above 27. SDLC stands for: a. Synchronous Data Link Control c. Synchronous Data Link Character b. Synchronous Data Line Control d. Synchronous Data Line Character A 28. HDLC is: a. a bit-oriented protocol c. an ISO standard b. based on SDLC d. all of the above COMPLETION 1. Parallel transmission can be used only for distances. short 2. The term "baud" was named after Emil. audot 3. Data codes are also called codes. character 4. The code is a 7-bit code commonly used in communication between personal computers. ASCII 5. The two letters designate the code character used to advance a printer to the next page. FF

6. An asynchronous frame begins with the bit. start 7. An asynchronous frame ends with the bit. stop 8. At the end of an asynchronous frame, the line will be at the level. mark binary 1 9. An integrated circuit called a is used in an asynchronous communication system to convert between parallel and serial data. UART 10. When receiving digital data, are used to hold data until they can be read. buffers 11. Synchronous communication is more than asynchronous since there are fewer "overhead" bits. efficient 12. There must be sufficient 1-to-0 to maintain synchronization in synchronous transmission. transitions 13. Clock sync is derived from the stream of bits in synchronous transmission. data 14. In the protocol, each frame begins with at least two SYN characters. ISYNC 15. In HDLC, each frame starts with an 8-bit. flag 16. The first eight bits of an SDLC frame are. 01111110 17. BCC stands for check character.

block 18. DLE stands for data link. escape 19. HDLC uses bit- to prevent accidental flags. stuffing 20. errors cause many consecutive bits to be bad. urst 21. FEC stands for error correction. forward 22. An scheme corrects errors by requiring the retransmission of bad blocks. ARQ 23. Parity fails when an number of bits are in error. even 24. CRC codes are particularly good at detecting errors. burst 25. Huffman coding and run-length encoding are examples of data. compression 26. A is an encoding scheme that is not public in order to protect data. cipher 27. A is often used to generate an encryption key because it is easier to remember. password 28. If the key is enough, private-key encryption can be quite secure. long 29. Messages cannot be using a public key. decrypted 30. Because it is -intensive, public-key encryption can be slow.

computation SHORT ANSWER 1. How many different characters could be encoded using a six-bit code? 64 2. What is the numerical difference between ASCII 'a' and ASCII 'A' if you treat them as hexadecimal (hex) numbers? 20 hex (32 decimal) 3. The ASCII codes for the characters '0' through '9' are what hex numbers? 30H to 39H 4. If an asynchronous frame is used to send ASCII characters in the form of bytes (8 bits), what is the shortest time it could take to send 1000 characters if each bit in a frame is 1 msec long? 10 seconds 5. Suppose an asynchronous frame holds 8 bits of data, a parity bit, and two stop bits (it could happen). Calculate the efficiency of the communication system. 66.7% 6. Suppose a synchronous frame has 16 bits of non-data in the front and a 16-bit BCC at the end. The frame carries 1024 bytes of actual data. Calculate the efficiency of the communication system. 97.0%