0% found this document useful (0 votes)
1K views8 pages

ITT400

Contoh soalan ITT400 Telecommunications and networking

Uploaded by

Zack Edward
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
1K views8 pages

ITT400

Contoh soalan ITT400 Telecommunications and networking

Uploaded by

Zack Edward
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
CONFIDENTIAL CSIJUL 2017/ITT400 UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE INTRODUCTION TO DATA COMMUNICATION AND NETWORKING COURSE CODE ITT400 DATE JULY 2017 TIME : 3HOURS INSTRUCTIONS TO CANDIDATES 1 This question paper consists of three (3) parts: PART A (20 Questions) PART B (5 Questions) PART C (2 Questions) 2. ‘Answer ALL questions from all three (3) parts, i) Answer PART A in the Objective Answer Sheet, ii) Answer PART B and C in the Answer Booklet. Start each answer on a new page. 3, Do not bring any material into the examination room unless permission is given by the invigilator, 4 Please check to make sure that this examination pack consists of i) the Question Paper ji) _ an Answer Booklet ~ provided by the Faculty il) an Objective Answer Sheet — provided by the Faculty iv) a graph paper — provided by the Faculty 5. ‘Answer ALL questions in English DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO D0 SO This examination paper consists of 6 printed pages, © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 2} CSIJUL 2017/1TT400 PART A (20 MARKS) 1, The is the physical path over which a message travels. A. protocol B. medium C. signal D. frequency 2. The information to be communicated in a data communications system is the A. medium B. protocol C. message D. transmission 3. Anunauthorized user is a network issue. A. performance B. reliability C. security D. feasibility 4, Before data can be transmitted, they must be transformed to A. _ periodic signals B. electromagnetic signals C. aperiodic signals D. _ low frequency sine waves 5. __ Ina frequency domain plot, the horizontal axis measures the ‘A. peak amplitude B. frequency C. phase D. slope 6. When the frequency increases, the period decreases increases remains the same doubles com> (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 3 CSIJUL 2017/TT400 10. 1. 12. encoding has no transition at the middle of each bit. O& (ys B. Manchester C. _ Differential Manchester D.ONRZL encoding has a transition at the beginning of each 0 bit. RZ Manchester Differential Manchester NRZ-L. pom> Which of the following encoding methods does not provide for synchronization? A NRZ-L B. RZ Cc. NRZ- D. Manchester The conversion is the process of changing one of the characteristics of an analog signal based on the information in the digital data. A. digital-to-digital B. digital-to-analog C. _ analog-to-analog D. _analog-to-digital Which of the following is not a digital-to-analog conversion? A ASK. B. PSK. Cc. FSK. D. AM. use two carriers, one in-phase and the other quadrature. A ASK B. PSK Cc. FSK D. QAM © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL, 4 CSIJUL 2017/ITTA00 13. 14, 15. 16. 7. 18. IEEE has defined the specifications for a wireless LAN which is called IEEE 802.3 IEEE 802.5 IEEE 802.11 IEEE 802.2 Dvom> In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two A. BSSs B. ESSs Cc. APs: D. — Scatternets The IEEE 802.3 Standard defines CSMAICD as the access method for first- generation 10-Mbps Ethernet. A. t-persistent B. _ p-persistent C. — x-persistent D. _non-persistent Bluetooth is a technology that connects devices (called gadgets) in a small area. A. wired LAN B. wireless LAN Cc. VLAN D. ethernet A regenerates a signal, connects segments of a LAN, and has no filtering capability. A. repeater B. bridge C. router D. switch A bridge can forward and filter frames and automatically build its forwarding table. A. simple B. dual C. transparent D. triple © Hak Cipta Universiti Teknologi MARA CONFIDENTIAL, CONFIDENTIAL, 5 19. A virtual local area network (VLAN) is configured by A B. C. D. 20. A___ A B. c. D. software physical wiring hardware malware is a device that operates only in the physical layer. passive hub repeater bridge router (© Hak Cipta Universit Teknologl MARA CSIJUL 2017/1400 CONFIDENTIAL CONFIDENTIAL, 6 CSIJUL 2017/ITT400 PART B (60 MARKS) QUESTION 1 2) lustrate the digital signal for data stream 00110101 using the followings digital encoding techniques: i) _ Differential Manchester. (2 marks) i) Manchester. (2 marks) i) NRZL (2 marks) iv) NRZA. (2 marks) b) Differentiate between data element and signal element. (2 marks) QUESTION 2 2) Define Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK) and Quadrature Amplitude Modulation (QAM) in Digital-To-Analog modulation. (8 marks) b) Briefly explain Analog-to-Analog Modulation. (2 marks) (QUESTION 3 a) Briefly describe transmission medium. (4 marks) b) State the difference between Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) cable. (3 marks) ©) Draw RJ-45 Male and Female Unshielded Twisted Pair (UTP) connector. (3 marks) (© Hak Cipta Universit! Teknologi MARA CONFIDENTIAL, CONFIDENTIAL 7 CSIJUL 2017/ITT400 QUESTION 4 a) List FOUR (4) generations of Ethemet evolution. (4 marks) b) Briefly explain 10Base-T Standard Ethernet. (4 marks) c) Calculate the hexadecimal equivalent of the following binary Ethernet address: 01101011 00010010 01000100 00010101 10111011 00001111 (2 marks) QUESTION 5 a) Distinguish between amplifier and repeater. (4 marks) b) Describe a transparent bridge. (2 marks) ©) Draw a topology of a star backbone that will connect four local area networks. (4 marks) (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL, CONFIDENTIAL, 8 CSIJUL 2017/ITT400 PART C (30 MARKS) QUESTION 1 a) Define the meaning of burst error in network communication. (2 marks) b) Internet has been using a 16-bit checksum for error detection. Determine the steps of calculating the internet checksum on the sender's side before the data is sent to the receiver. ( marks) c) Given a dataword 1101 and a divisor of 1011. Show the process at the sender in generating the codeword and prove the syndrome at receiver using Cyclic Redundancy ‘Check (CRC). (8 marks) QUESTION 2 a) Explain the following IPv4 addresses: i) Network address (2 marks) ji) Broadcast address (2 marks) iii) Host address (2 marks) b) An address block of 192.178.0.1/27 has been assigned to Global Management Sdn. Bhd. in intention of setting up the company's new computer network. i) _ Identify the class for the given network address, (1 mark) ii) Convert the CIDR of the given address block into dotted decimal form. ‘ » (2 marks) ili) Determine the total number of subnets for the address block. (2 marks) iv) Figure out the total available host for each subnet. (2 marks) v) _ Find the broadcast address for the first subnet. (2 marks) END OF QUESTION PAPER (@ Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL

You might also like