Data Communication Question Bank
Data Communication Question Bank
UNIT 1
1. What are the three criteria necessary for an effective and efficient network?
The most important criteria are performance, reliability and security. Performance of the network depends
on number of users, type of transmission medium, the capabilities of the connected h/w and the efficiency of
the s/w. Reliability is measured by frequency of failure, the time it takes a link to recover from the failure and
the network’s robustness in a catastrophe. Security issues include protecting data from unauthorized access
and viruses.
5. What is LAN?
A LAN is a common name used to describe a group of devices that share a geographic location. LAN is
limited to single building or campus.
18. State the major functions performed by the presentation layer of the ISO OSI model.
(Nov Dec 2006)
Presentation layer is concerned with the format of data exchanged between peers, for example, whether
an integer is 16, 32, or 64 bits long and whether the most significant bit is transmitted first or last, or how a
video stream is formatted.
20. What are the two fundamental ways by which network performance is measured?
1. Bandwidth
2. Latency
PART - B
1. Explain ISO/OSI reference model.
Physical layer
Data link layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
UNIT - II
2. What is DHCP?
The Dynamic Host Configuration Protocol has been derived to provide dynamic configuration. DHCP is
also needed when a host moves from network to network or is connected and disconnected from a network.
3. Define ICMP
Internet Control Message Protocol is a collection of error messages that are sent back to the source host
whenever a router or host is unable to process an IP datagram successfully.
4. What is the need of internetwork?
To exchange data between networks, they need to be connected to make an Internetwork.
16. Identify the class and default subnet mask of the IP address 217.65.10.7.
IP Address 217.65.10.7 belongs to Class C. Its subnet mask is 255.255.255.0.
PART - B
UNIT - III
1. What is routing?
Routing is a process of selecting paths in a network through which network traffic is sent.
2. Define an internetwork.
A collection of interconnected network is called an internetwork.
5. What is multicasting?
Multicasting is the delivery of information to a group of destinations simultaneously using the most
efficient strategy to deliver the messages over each link of the network only once.
8. Define RIP.
RIP is a dynamic protocol used for finding the best route or path from ene-to-end over a network by
using a routing metric/ hop count algorithm.
9. What is OSPF?
OSPF protocol is a router protocol used within larger autonomous system networks in preference to the
Routing Information Protocol (RIP).
PART - B
2. Define routing & explain distance vector routing and link state routing.
Distance vector routing
Sharing information
Routing table:
Creating the table
Updating the table:
Updating algorithm
Link state routing:
Information sharing
Packet cost
Link state packet:
Getting information about neighbors
Initialization Link state database
4.Explainsub-netting
Three levels of hierarchy masking
Masks without sub-netting
Masks with sub-netting
Finding the sub-network address
Boundary level masking
Non-boundary level masking
UNIT- IV
1. What are the fields on which the UDP checksum is calculated? Why?
UDP checksum includes a pseudo header, the UDP header and the data coming from the application
layer.
2. What is TCP?
TCP provides a connection oriented, reliable byte stream service. The connection oriented means the
two applications using TCP must establish a TCP connection with each other before they can exchange data.
3. Define congestion
When too many packets rushing to a node or a part of network, the network performance degrades.
This situation is called as congestion.
7. What is multiplexing?
The job of gathering data chunks at the sources host from different sockets, encapsulating each data
chunks with header information to create segments, and passing the segments to the network layer is called
multiplexing.
8. What is de-multiplexing?
The job of delivering the data in a transport layer segment to the correct socket is called de-
multiplexing.
9. What is RTT?
RTT is an acronym for Round Trip Time: it is a measure of the time it takes for a packet to travel from
a computer, across a network to another computer, and back.
22. What are the two types of protocols used in Transport layer?
The two types of protocols used in Transport layer are
TCP
UDP
26. What are the types of port numbers used in transport layer?
Well-known port
Registered port
Dynamic port
PART - B
1. Explain the duties of transport layer.
End to end delivery
Addressing
Reliable delivery
Error control
Sequence control
Loss control
Duplication control
Flow control
Multiplexing
UNIT - V
1. Define the two types of user agents in the electronic mail system
Command driven: It normally accepts a one character command from the keyboard to perform its task.
GUI based: They contain GUI components that allow the user to interact with the software by using both
the keyword and mouse.
2. What is DNS?
DNS is a client/server application that identifies each host on the internet with a unique user friendly name.
4. What is SMTP?
Simple Mail Transfer Protocol is a standard and reliable host to host mail transport protocol that operates over
the TCP port 25.
PART - B
3. What is pixel?
Each screen point in a monitor is called a pixel/pel. It is also called picture element.
4. Define aspect ratio.
It is a property of video monitors. This number gives the ratio of vertical points to horizontal points necessary
to produce equal-length lines in both directions on the screen.
6. What is DDA?
The Digital Differential Analyzer is a scan-conversion line algorithm based on calculating either difference in
y-coordinate (dy) or difference in x-coordinate. We sample the line at unit intervals in one coordinate and
determine corresponding integer values nearest the line path for the other coordinate.
PART B
5. What is projection?
The process of displaying 3D objects on a 2D display is called as Projection
3. What is Holography?
It is defined as the means of creating a unique photographic image without the use of a lens.
4. What is hologram?
The photographic recoding of the image is called a hologram, which appears to be an unrecognizable pattern
of stripes and whorls but which when illuminate by coherent light as by a laser beam, organizes the light in to
3D representation of the original object.
PART B
1. Define Cadence.
Cadence is a term used to define the regular rise and fall in the intensity of sound.
6. What is Luminance?
Luminance refers to brightness. This is a measure of the brightness of the light emitted or reflected by an
object.
7. What are the levels of definition in JPEG standards?
Baseline system, Extended system, special loss less function.
8. Define Quantization.
It is a process of reducing the precision of an integer, thereby reducing the number of bits required to store the
integer.
18. Write the four basic technologies used for flat panel displays.
Passive-matrix monochrome, Active-matrix monochrome, Passive-matrix color, Active-matrix color.
PART B
5. What is panning?
Panning implies that the image window is unable to display the full image at the selected resolution for
display. In that case the image can be panned left to right or right to left as well as top to bottom or bottom to
top. Panning is useful for finding detail that is not visible in the full image.
10. What are key issues in data organization for multimedia systems?
Data independence, Common Distributed Database Architecture, Multiple Data servers.
11. What are the key elements in object server architecture of multimedia applications?
Multimedia application, Common object management, Object request broker, Object name server, Object
directory manager, Object server, Object manager, Network manager, Object data store.
15. What are the primary n/w topologies used for multimedia?
Traditional LANS, extended LANS, High-speed LANS, WANS.
16. Give the primary goal of MAPI.
Separate client applications from the underlying messaging services, Make basic mail-enabling a standard
feature for all applications, Support messaging-reliant workgroup applications.
18. What are the characteristics of image and still video stores ?
Compressed information, Multi-image documents, Related annotations, Large volumes, Migration b/w high-
volume media such as an optical disk library and high speed media such as magnetic cache storage, shared
access.
PART B
1. Explain hypermedia messaging.
2. Explain the components of distributed multimedia systems.
3. Give the multi server n/w topologies.
4. Explain Distributed Client-server operation.
5. How to manage Distributed objects.
Introduction to OOAD
What is UML?
20. What does Use case Diagram represent? Give an example. (2 Marks)
The UML provides use case diagram notation to illustrate the names of use cases and actors, and
the relationships between them.
Guideline:
A simple use case diagram is drawn in conjunction with an actor-goal list.
A use case diagram is an excellent picture of the system context; it makes a good context diagram
that is, showing the boundary of a system, what lies outside of it, and how it gets used. It serves as a
communication tool that summarizes the behaviour of a system and its actors. A sample partial use
case context diagram for the NextGen system is shown below.
UML activity diagrams and modelling
27. Define − Event, State and Transition (A/M – 11, M/J – 12) (2
Marks)
An event is defined as a significant or noteworthy occurrence. It is a label associated with a
transition that identifies the message which causes a state change. Example: A telephone receiver is
taken off the hook.
A state is defined as the condition of an object at a moment in time, the time between events.
Example: A telephone is in the state of being "idle" after the receiver is placed on the hook
and until it is taken off the hook.
A transition is defined as a relationship between two states that indicates that when an event
occurs, the object moves from the prior state to the subsequent state. Example: When the event
"off hook" occurs, transition the telephone from the "idle" to "active" state.
31. What is meant by an axiom? List the two design axioms of object oriented design. (2
Marks)
An axiom is a fundamental truth that always is observed to be valid and for which there is
no counter example or exception. Two design axioms of object oriented design are:
Axiom 1: The independence
axiom Axiom 2: The
information axiom
PART- B
1. Explain about POS generation systems.
-The Next Gen POS System
-Architectural Layers and Case Study Emphasis
-Iterative Development and Iterative Learning
2. Define Inception. Explain about artifacts of Inception
-Inception: An Analogy
-What Artifacts May Start in Inception
-You Didn't Understand Inception When...
UNIT-II
Designing objects with responsibilities
2. List the ways to connect the UI Layer to the Domain Layer. (2 Marks) The ways are:
• An initializing routine (for example, a Java main method) creates both a UI and a domain
object, and passes the domain object to the UI.
• A UI object retrieves the domain object from a well-known source, such as a factory object that
is responsible for creating domain objects.
Creator
11. What are the advantages of factory objects? (2 Marks) The advantages are:
• Separate the responsibility of complex creation into cohesive helper objects.
• Hide potentially complex creation logic.
• Allow introduction of performance-enhancing memory management strategies, such as object
caching or recycling.
12. List some Abstract for Factory (GoF) for Families of Related Objects. (2 Marks) The Java POS
implementations will be purchased from manufacturers.
For example:
// IBM's drivers
com.ibm.pos.jpos.CashDrawer (implements jpos.CashDrawer)
com.ibm.pos.jpos.CoinDispenser (implements jpos.CoinDispenser)
// NCR's drivers
com.ncr.posdrivers.CashDrawer (implements jpos.CashDrawer)
com.ncr.posdrivers.CoinDispenser (implements jpos.CoinDispenser)
Low Coupling
16. Define – Coupling (A/M-11, M/J-12) (2 Marks) The degree to which components depend on one
another. There are two types of coupling, "tight" and "loose". Loose coupling is desirable for good software
engineering but tight coupling may be necessary for maximum performance. Coupling is increased when the
data exchanged between components becomes larger or more complex. Coupling is the degree to which
one class knows about another class. Let us consider two classes class A and class B. If class A knows class B
through its interface only i.e., it interacts with class B through its API then class A and class B are said to be
loosely coupled. If on the other hand class A apart from interacting class B by means of its interface also
interacts through the non-interface stuff of class B then they are said to be tightly
coupled.
19. What is meant by patterns? (M/J-13, M/J-12) (2 Marks) Design patterns are supposed to
provide a structure in which problems can be solved. When solving a real problem, you have to consider
many tiny variations of a solution to that problem to see whether any fits a design pattern. In particular, you
will probably need to generalise your problem, or
its solution, in order to make a design pattern fit.
21. Write a note on patterns. (N/D-11) (2 Marks) Design pattern identifies the key aspects of a
common design structure that makes it useful for creating a reusable object oriented design. Furthermore, it
identifies the participating classes and instances, their roles and collaborations, and the distribution of
responsibilities. It describes when it applies, whether it can be applied in view of other design constraints and
the consequences and tradeoffs of its use.
A pattern is an instructive information that captures the essential structure and insight of a successful
family of proven solutions to a recurring problem that arises within a certain context and system of forces.
High Cohesion
23. List out some scenarios that illustrate varying degrees of functional cohesion. (2 Marks) Some
scenarios that illustrate varying degrees of functional cohesion are,
Very low cohesion
Low cohesion
High cohesion
Moderate cohesion
Cohesion Coupling
Cohesion refers to what the class (or module) It refers to how related are two classes / modules
will do. Low cohesion would mean that the class and how dependent they are on each other. Being
does a great variety of actions and is not focused low coupling would mean that changing
on what it should do. High cohesion would then something major in one class should not affect
mean that the class is focused on what it should the other. High coupling would make your code
be doing, i.e. only methods relating to the difficult to make changes as well as to maintain
intention of the class. it, as classes are coupled closely together,
making a change could mean an entire
system revamp.
High cohesion within modules Low coupling between modules.
Increased cohesion and decreased coupling do The most effective method of decreasing
lead to good software design. coupling and increasing cohesion is design by
interface.
Controller
Information expert
PART –B
1. Write briefly about elaboration and discuss the differences between Elaboration and Inception
with examples.
-Definitions
-Guidelines for creating domain model
-Examples
Elaboration
3. What are the key ideas and best practices that will manifest in elaboration? (2 Marks)
The key ideas and best practices are:
1. Do a short time boxed risk-driven iterations
2. Start programming early
3. Adaptively design, implement, and test the core and risky parts of the architecture
4. Test early, often, realistically
5. Adapt based on feedback from tests, users, developers
6. Write most of the use cases and other requirements in detail, through a series of workshops,
once per elaboration iteration
Domain Models
11. List the three strategies to find conceptual classes. (2 Marks) The thr
1. Reuse or modify existing models.
2. Use a category list.
3. Identify noun phrases
Associations
1 +
Attributes
21. How does domain model is further refined after the first iteration?
(2 Marks)
Generalization and specializations are fundamental concepts in domain modeling.
Conceptual class hierarchies are often inspiration for software class hierarchies that
exploits inheritance and reduce duplication of code.
Packages are a way to organize large domain models into smaller units.
Domain model is further refined with Generalization, Specialization, Association
classes, Time intervals, Composition and packages, usage of subclasses.
28. What are the uses of defining conceptual super classes and subclasses?
(2 Marks)
29. State the role of conceptual subclass and super classes in set membership.
(2 Marks)
Conceptual subclasses and super classes are related in terms of set membership. By
definition, all members of a conceptual subclass set are members of their super class set.
For example, in terms of set membership, all instances of the set CreditPayment are also
members of the set Payment. This is shown in the Venn diagram shown below.
30. What is 100% rule?
(2 Marks)
100% of the conceptual Super class’s definition should be applicable to the
subclass. The subclass must conform to 100% of the Super class’s attributes and
associations.
31. Write the guidelines followed in defining a super class. (2 Marks) The gu
Create a super class in a generalization relationship to subclasses when :
1. The potential conceptual subclasses represent variations of a similar
concept
2. The subclasses will confirm to the 100% and Is-A rules
3. All subclasses have the same attribute that can be factored out and
expressed in the super class
4. All subclasses have the same association that can be factored out and
related to the super class
32. What are the strong motivations to partition a conceptual class with
subclasses? (2 Marks) The following are the strong motivations to partition a
class into subclasses :
Create a conceptual subclass of a super class when :
1. The subclass has additional attributes of interest
2. The subclass has additional associations of interest
3. The subclass concept is operated on, handled, reacted-to, or manipulated
differently than the super class or other subclasses
Aggregation and
Composition
UNIT IV
System Sequence Diagram
2. What is meant by sequence number in UML? Where and for what it is used?
(N/D-11) (2 Marks)
Sequence number can be of:
Automatic - Sequence numbers of messages will be updated automatically after
you moved the messages, and you cannot specify custom sequence number to
messages.
Manual - Sequence numbers of messages will not be updated even after you
moved the messages, and you can specify custom sequence number to messages.
Uses:
Trace external interactions with the software
Plan the internal behavior of the application
Study the software structure
View the system architecture
Trace behavior down to physical components
Category Function
Activity edges Represent the flow between activities
Associations Indicate that instances of one model element are connected to instances of
another model element
Dependencies Indicate that a change to one model element can affect another model
element
Generalizations Indicate that one model element is a specialization of another model element
Realizations Indicate that one model element provides a specification that another model
element implements
16. What are the connection between SSDs, system operations, and layers? (2
Marks)
The SSDs illustrate these system operations, but hide the specific UI objects.
Nevertheless, normally it will be objects in the UI layer of the system that capture these
system operation requests, usually with a rich client GUI or Web page.
UML Class
Diagrams
Package
diagrams
21. How to show methods in class diagrams?
(2 Marks)
A UML method is the implementation of an operation; if constraints are defined, the
method must satisfy them. A method may be illustrated several ways, including: in
interaction diagrams, by the details and sequence of messages in class diagrams,
with a UML note symbol stereotyped with
«method».
PART- B
UNIT V
Mappi
ng
Design
to
Code
4. What are the three relationships that can be shown in UML diagram? Define
them. (2 Marks) T
1. Association how are objects associated? This information will guide us in designing
classes.
2. Super-Sub Structure How are objects organized into super classes and
sub classes? This information provides us the direction of inheritance.
3. Aggregation and a part of Structure what is the composition of
complex classes? This information guides as in defining
mechanisms that properly manage object within object.
8. What are the two major goals considered for integrated testing? (2 Marks)
14. What are the three different incremental strategies of integration testing? (2 Marks)
Thread-based testing
Use-based testing
Cluster testing
15. List the types of errors found during integration testing. (2 Marks)
Messaging errors
User interface errors
Unit-V
PART- B
1. Explain UML State Machine Diagrams and Modeling.
-Definition
-How to apply
-Example
-Process
Discrete time signal: A discrete time signal is defined only at discrete instants
of time. The independent variable has discrete values only, which are uniformly spaced.
A discrete time signal is often derived from the continuous time signal by sampling it at
a uniform rate.
Even signal: continuous time signal x(t) is said to be even if it satisfies the
condition x(t)=x(-t) for all values of t.
Odd signal: he signal x(t) is said to be odd if it satisfies the condition x(-t)=-x(t)
for all t. In other words even signal is symmetric about the time origin or the vertical
axis, but odd signals are anti-symmetric about the vertical axis.
Energy signal: Signal is referred as an energy signal, if and only if the total
energy of the signal satisfies the condition 0<E<∞.
The elementary signals serve as a building block for the construction of more complex
signals. They are also important in their own right, in that they may be used to model
many physical signals that occur in nature.
x Ramp function
x Exponential function
x Sinusoidal function
8. What are time invariant systems?
A system is called time invariant if its output, input characteristics does not
change with time. A system is called time variant if its input, output characteristics
changes with time.
i.e., T [a1x1(n)+a2x2(n)]=a1T[x1(n)]+a2T[x2(n)]
The system is said to be causal if the output of the system at any time ‘n’
depends only on present and past inputs but does not depend on the future inputs.
e.g.:- y (n) =x (n)-x (n-1)
x Folding
x Shifting
x Multiplication
x Summation
x Commutative property
x Distributive law
The region of convergence (ROC) of X (Z) is the set of all values of Z for
which X (Z) attain final value.
18. State properties of ROC
2 ECG signals, Speech signal, Television All signal representation in computers and
signal etc. All the signals generated from digital signal processors are digital.
various sources in nature are analog.
(b) Determine if the system described by the following equations are causal or
noncausal
(b) Determine if the system described by the following input-output equations are
linear or non-linear.
8. (a) Explain the principle of operation of analog to digital conversion with a neat
diagram. (8)
(b) Explain the significance of Nyquist rate and aliasing during the sampling of
continuous
9. (a) List the merits and demerits of Digital signal processing. (8)
(b) Write short notes about the applications of DSP. (8)
10. (a) Find the convolution of the following sequences
i) x(n)=u(n) h(n)=u(n-3)
ii) x(n)={1,2,-1,1} h(n)={1,0,1,1} (8)
(b) Determine the response of the causal system y(n)-y(n-1)=x(n)+x(n-1) to inputs x(n)=u(n)
and x(n)=2 –n u(n). (8)
11. (a) Determine the solution of the difference equation
y(n) = 5/6 y(n-1) – 1/6 y(n-2) + x(n) for x(n) = 2n u(n) (8)
(b) Determine the response y(n), n>=0 of the system described by the second order
difference equation y(n) – 4y(n-1) + 4y(n-2) = x(n) – x(n-1) when the input is x(n) = (-
1)n u(n) and the
13. (a) Determine the z-transform and ROC of the signal i) x(n) = anu(n) and ii) x(n) = -
bnu(-n-
(b) Find the stability of the system whose impulse response h(n) = (2)nu(n) (16)
14. (a) Determine the z-transform of x(n) = cos ωn u(n) (8)
(b) State and prove the following properties of z-transform. i) Time shifting ii) Time
reversal iii)
16. Find the inverse z-transform of x(z) = (z2+z) / (z-1)(z-3), ROC: z > 3. Using (i)
Partial fraction method, (ii) Residue method and (iii) Convolution method (16) 17.
Determine the unit step response of the system whose difference equation is
Part A
1. Define DFT and IDFT (or) what are the analysis and synthesis equations of DFT
Periodicity
Linearity and symmetry Multiplication of two DFTs Circular convolution
Time reversal
Circular correlation
Let x1(n) and x2(n) are finite duration sequences both of length N with DFTs X1 (k) and
X2
(k). If X3(k) = X1(k) X2(k) then the sequence x3(n) can be obtained by circular convolution
defined as
4. How to obtain the output sequence of linear convolution through circular convolution
Consider two finite duration sequences x (n) and h (n) of duration L samples and M
samples. The linear convolution of these two sequences produces an output sequence of duration
L+M-1 samples. Whereas, the circular convolution of x(n) and h(n) give N samples where
N=max(L,M).In order to obtain the number of samples in circular convolution equal to L+M-1,
both x(n) and h(n) must be appended with appropriate number of zero valued samples. In other
words by increasing the length of the sequences x (n) and h(n) to L+M-1 points and then
circularly convolving the resulting sequences we obtain the same result as that of linear
convolution.
5. What is zero padding? What are its uses?
Let the sequence x (n) has a length L. If we want to find the N-point DFT (N>L) of the
sequence x (n), we have to add (N-L) zeros to the sequence x (n). This is known as zero padding.
The uses of zero padding are
If the data sequence x (n) is of long duration it is very difficult to obtain the output
sequence y(n) due to limited memory of a digital computer. Therefore, the data sequence is
divided up into smaller sections. These sections are processed separately one at a time and
controlled later to get the output.
7. What are the two methods used for the sectional convolution?
In this method the size of the input data block xi (n) is L. To each data block we append
M-1 zeros and perform N point cicular convolution of xi (n) and h(n). Since each data block is
terminated with M-1 zeros the last M-1 points from each output block must be overlapped and
added to first M-1 points of the succeeding blocks.This method is called overlap-add method.
In this method, the data sequence is divided into N point sections xi (n). Each section
contains the last M-1 data points of the previous section, followed by L new data points to form a
data sequence of length N=L+M-1. In circular convolution of xi (n) with h (n) the first M-1
points will not agree with the linear convolution of xi(n) and h(n) because of aliasing, the
remaining points will agree with linear convolution. Hence we discard the first (M-1) points of
filtered section xi (n) N h
(n). This process is repeated for all sections and the filtered sections are abutted together.
The Fast Fourier Transform is an algorithm used to compute the DFT. It makes use of the
symmetry and periodicity properties of twiddle factor to effectively reduce the DFT computation
time. It is based on the fundamental principle of decomposing the computation of DFT of a
sequence of length N into successively smaller DFTs.
12. How many multiplications and additions are required to compute N point DFT using
radix-2 FFT?
The number of multiplications and additions required to compute N point DFT using
radix-2 FFT are N log2 N and N/2 log2 N respectively.
The FFT algorithm is most efficient in calculating N point DFT. If the number of output
points N can be expressed as a power of 2 that is N = 2M, where M is an integer, then this
algorithm is known as radix-2 algorithm.
It is a popular form of the FFT algorithm. In this the output sequence X (k) is divided
into smaller and smaller sub-sequences, that is why the name Decimation - In - Frequency.
Correlation
Spectrum analysis
18. Distinguish between linear convolution and circular convolution of two sequences.
It can be used to find the response of a linear It cannot be used to find the response of a filter
filter
Zero padding is not necessary to find the Zero padding is necessary to find the response
response of a linear filter.
19. What are the differences and similarities between DIF and DIT algorithms?
Differences:
1) The input is bit reversed while the output is in natural order for DIT, whereas for DIF
the output is bit reversed while the input is in natural order.
2) The DIF butterfly is slightly different from the DIT butterfly, the difference being that
the complex multiplication takes place after the add-subtract operation in DIF.
Similarities:
Both algorithms require same number of operations to compute the DFT. Both algorithms can
be done in place and both need to perform bit reversal at some place during the computation.
PART B – 16 Marks
1. (a) Determine the output response y(n) if h(n) = {1,1,1,1}; x(n) = {1,2,3,1} by using (i)
Linear
convolution ii) Circular convolution and iii) Circular convolution with zero padding (12)
(b) Explain any two properties of Discrete Fourier Transform. (4)
2. Using linear convolution find y (n) = x (n)*h (n) for the sequences x (n) = (1,2,-1,2,3,-2,-3,-
1,1,1,2,-1) and h(n) = (1,2).Compare the result by solving the problem using
i) Over-lap save method and ii) Overlap – add method. (16)
3. Describe the decimation in time [DIT] radix-2 FFT algorithm to determine N-point
DFT. (16)
4. An 8-point discrete time sequence is given by x(n) = {2,2,2,2,1,1,1,1}. Compute the 8-point
DFT
5. (a) Compute the 4-point DFT and FFT-DIT for the sequence x(n) = {1,1,1,3} and What are
the basic steps for 8-point FFT-DIT algorithm computation? (12)
(b) What is the advantage of radix-2 FFT algorithm in comparison with the classical DFT
method?
(4)
6. (a) Perform circular convolution of the two sequences graphically x1(n) = {2,1,2,1} and
x2(n)=
{1,2,3,4} (6)
(b) Find the DFT of a sequence by x(n) = {1,2,3,4,4,3,21} using DIT algorithm. (10)
7. (a) Explain the decimation in frequency radix-2 FFT algorithm for evaluating N-point DFT
of the
given sequence. Draw the signal flow graph for N=8. (12)
(b) Find the IDFT of y (k) = {1,0,1,0} (4)
8. (a) Find the circular convolution of the sequences x1(n)= {1,2,3} and x2(n) = {4,3,6,1} (8)
(b) Write the properties of DFT and explain. (8)
9. (a) Draw the 8-point flow diagram of radix-2 DIF-FFT algorithm. (8)
(b) Find the DFT of the sequence x(n) = {2,3,4,5} using the above algorithm. (8)
10. (a) What are the differences and similarities between DIT and DIF FFT algorithms? (6)
(b) Compute the 8-point IDFT of the sequence x(k) = {7, -0.707-j0.707, -j, 0.707-
j0.707, 1,
11. (a) Compute the 8-point DFT of the sequence x (n) = {0.5,0.5,0.5,0.5,0,0,0,0} using radix-2
DIT
algorithm (8)
(b) Find the IDFT of the sequence x (k) = {4,1-j2.414,0,1-j0.414,0,1+j.414,0,1+j2.414} using
DIF
algorithm. (8)
Advantages:
a. FIR filters have exact linear phase.
b. FIR filters are always stable.
c. FIR filters can be realized in both recursive and non recursive structure.
d. Filters with any arbitrary magnitude response can be tackled using FIR sequence.
Disadvantages:
x For the same filter specifications the order of FIR filter design can be as high as 5 to
10 times that in an IIR design.
· Map the desired digital filter specifications into those for an equivalent analog filter.
· Derive the analog transfer function for the analog prototype.
· Transform the transfer function of the analog prototype into an equivalent digital filter
transfer function.
5. Mention the procedures for digitizing the transfer function of an analog filter.
The two important procedures for digitizing the transfer function of an analog filter are
d/dt y(t)=y(nT)-y(nT-
T)/T The above equation is called backward difference
equation.
8. What is the mapping procedure between S-plane & Z-plane in the method of mapping
differentials? What are its characteristics?
The mapping procedure between S-plane & Z-plane in the method of mapping of
differentials is given by
H(Z) =H(S)|S=(1-Z-1)/T
The above mapping has the following characteristics
· The left half of S-plane maps inside a circle of radius ½ centered at Z= ½ in the
Zplane.
· The right half of S-plane maps into the region outside the circle of radius ½ in the
Z-plane.
ii) The j .-axis maps onto the perimeter of the circle of radius ½ in the Z-plane.
In this method of digitizing an analog filter, the impulse response of the resulting
digital filter is a sampled version of the impulse response of the analog filter. If the transfer
function is of the form, 1/s-p, then
(z) =1/1-e-pTz-1
The bilinear transformation is a mapping that transforms the left half of S-plane into
the unit circle in the Z-plane only once, thus avoiding aliasing of frequency components. The
mapping from the S-plane to the Z-plane is in bilinear transformation is
S=2/T(1-Z-1/1+Z-1)
· The mapping for the bilinear transformation is a one-to-one mapping that is for every
point Z, there is exactly one corresponding point S, and vice-versa.
· The j .-axis maps on to the unit circle |z|=1,the left half of the s-plane maps to the
interior of the unit circle |z|=1 and the half of the s-plane maps on to the exterior of
the unit circle |z|=1.
12. Write a short note on pre-warping.
Advantages:
· The bilinear transformation provides one-to-one mapping.
· Stable continuous systems can be mapped into realizable, stable digital systems.
· There is no aliasing.
Disadvantage:
· The mapping is highly non-linear producing frequency, compression at high
frequencies.
· Neither the impulse response nor the phase response of the analog filter is preserved in
a digital filter obtained by bilinear transformation.
1. The magnitude response of the chebyshev filter exhibits ripple either in the stop band
or the pass band.
2. The poles of this filter lies on the ellipse
N Denominator polynomial
1 S+1
2 S2+.707s+1
3 (s+1) (s2+s+1)
4 (s +.7653s+1) (s2+1.84s+1)
2
Butterworth damping factor 1.44 chebyshev 1.06 Butterworth flat response damped
response.
PART B
b) Discuss the limitation of designing an IIR filter using impulse invariant method
4. Design a Chebyshev low pass filter with the specifications dB ripple in the pass band
dB ripple in the stop band using impulse invariance method
7. Design (a) a Butterworth and (b) a Chebyshev analog high pass filter that will pass all radian
frequencies greater than 200 rad/sec with no more that 2 dB attuenuation and have a stopband
attenuation of greater than 20 dB for all less than 100 rad/sec.
10. Use bilinear transformation method to obtain H (Z) if T= 1 sec and H(s) is
12. Design a chebyshev filter with a maxmimum pass band attenuation of 2.5 Db; at Ωp=20
rad/sec and the stop band attenuation of 30 Db at Ωs=50 rad/sec.
The phase distortion is introduced when the phase characteristics of a filter is nonlinear
within the desired frequency band. The delay distortion is introduced when the delay is not
constant within the desired frequency band.
The round off noise can be made small in non recursive realization of FIR filter.
6. Define necessary and sufficient condition for the linear phase characteristic of a FIR
filter?
The phase function should be a linear function of w, which in turn requires constant
group delay and phase delay.
6. List the well-known design technique for linear phase FIR filter design?
7. For what kind of application, the anti-symmetrical impulse response can be used?
The anti-symmetrical impulse response can be used to design Hilbert transforms and
differentiators.
9. For what kind of application, the symmetrical impulse response can be used?
The impulse response, which is symmetric having odd number of samples, can be used
to design all types of filters, i.e., lowpass, highpass, bandpass and band reject. The symmetric
impulse response having even number of samples can be used to design lowpass and bandpass
filter.
In frequency sampling method the desired magnitude response is sampled and a linear phase
response is specified .The samples of desired frequency response are defined as DFT
coefficients. The filter coefficients are then determined as the IDFT of this set of samples.
27. State the condition for a digital filter to be causal and stable
Causal---------h(n)= 0 for n<0
Stable -------------------
(d) Write the procedure for designing FIR filter using windows
iii) Multiply the Infinite Impulse response to obtain filter coefficients h(n) and to make it
finite
h(n) = hd(n)w(n),
=0, otherwise
29. Write the procedure for designing FIR filter using Frequency Sampling Method
Find phase
Choose Desired frequency response Hd(
Antisymmetric Response
To design Hilbert Transformer and Differentiator
PART - B
1. Write the expressions for the Hamming, Hanning, Bartlett and Kaiser windows (6)
2. Explain the design of FIR filters using windows. (10)
3. Design an ideal high pass filter with
5. Using a rectangular window technique design a lowpass filter with pass band gain of unity,
cutoff frequency of 1000 Hz and working at a sampling frequency of 5 kHz. The length of the
impulse response should be 7. (16)
6. .Design a FIR linear phase digital filter approximating the ideal frequency response (16)
With T=1 Sec using bilinear transformation .Realize the same in Direct form II
7. Obtain direct form and cascade form realizations for the transfer function of the system
givenby (10)
8. Design a LPF for the following response using hamming window with N=7 (8)
9. Prove that an FIR filter has linear phase if the unit sample response satisfies the condition
h(n)= ±h(M-1-n), n=0,1,….M-1. Also discuss symmetric and antisymmetric cases of FIR
filter (8)
10. Explain the need for the use of window sequences in the design of FIR filter. Describe the
11. Explain the need for the use of window sequences in the design of FIR filter. Describe the
13. Design an ideal band reject filter using Hamming window for the given frequency
14. Design an FIR filter using Hanning window with the following specification (16)
15. Using a rectangular window technique, design a low pass filter with pass band gain of unity cut off
frequency of 1000Hz and working at a sampling frequenc y of 5 kHz. The length of the impulse
response should be 7. (8)
16. Design an ideal band pass filter with a frequency response. (16)
Find the values of h(n) for N 7. Find the realizable filter transfer
function and magnitude function of
17. Design a digital FIR band pass filter with lower cut off frequency 2000Hz and upper cut off
frequency 3200 Hz using Hamming window of length N = 7. Sampling rate is 10000Hz. (8)
18. Design an FIR low pass digital filter using the frequency sampling method for the following
specifications (16)
Cut off frequency = 1500Hz Sampling frequency = 15000Hz Order of the
filter N = 10 Filter Length require d L = N+1 = 11
19. Determine the coefficients of a linear phase FIR filter of length M = 15 which has a
symmetric unit sample response and a frequency response that satisfies the conditions. (8)
20. Draw THREE different FIR structures for the H(z) given below: (10)
H(Z) = (1+5Z-1+6Z-2)(1+Z-1)
UNIT V
PART A
In 1,s complement form the positive number is represented as in the sign magnitude form. To
obtain the negative of the positive number, complement all the bits of the positive number.
In 2’s complement form the positive number is represented as in the sign magnitude form. To
obtain the negative of the positive number, complement all the bits of the positive number and
add 1 to the LSB.
4. Give the different quantization errors occurdue to finite word length registers in digital
filters?
.In digital signal processing, the continuous time input signals are converted into digital by using
b bit ADC. The representation of continuous signal amplitude by a fixed digit produces an error,
which is known as input quantization error.
The product quantization errors arise at the output of the multiplier. Multiplication of a b bit data
with a b bit coefficient results a product having 2b bits. Since a b bit register is used the
multiplier output will be rounded or truncated to b bits which produce the error.
7.Mention the different quantization methods available for Finite Word Length Effects?
2. Truncation
i Rounding
8. State truncation?
Truncation is a process of discarding all bits less significant than LSB that is retained.
9. Define Rounding?
Rounding a number to b bits is accomplished by choosing a rounded result as the b bit number
closest number being unrounded.
10. List the two types of limit cycle behavior of DSP?
1. Saturation arithmetic
2. Scaling
There are three types of arithmetic used in digital systems. They are fixed point arithmetic,
floating point, block floating point arithmetic.
In fixed point number the position of a binary point is fixed. The bit to the right represent the
fractional part and those to the left is integer part.
Depending on the negative numbers representation, there are three forms of fixed point
arithmetic. They are sign magnitude, 1’s complement, 2’s complement
7/8
Sign magnitude---------- (0.111)2
1’s complement---------- (0.111)2
2’s complement----------- (0.111)2
-7/8
Sign magnitude---------- (1.111)2
1’s complement---------- (1.000)2
2’s complement----------- (0.001)2
When a stable IIR filter digital filter is excited by a finite sequence, that is constant, the output
will ideally decay to zero. However, the non-linearity due to finite precision arithmetic
operations often causes periodic oscillations to occur in the output. Such oscillations occur in the
recursive systems are called Zero input Limit Cycle Oscillation. Normally oscillations in the
absence of output u (k) =0 by equation given below is called Limit cycle oscillations
The Limit cycle occurs as a result of quantization effect in multiplication. The amplitude of
output during a limit cycle are confined to a range of values called the dead band of the filter
13. Why Rounding is preferred to truncation in realizing digital filter?
The overflow caused by adder makes the filter output to oscillate between maximum amplitude
limits and such oscillations is referred as overflow oscillations
For sign magnitude representation the leading binary digit is used to represent the sign. If it is
equal to 1 the number is negative, otherwise it is positive.
PART B
15. Discuss in detail the errors resulting from rounding and truncation?
16. (i) Explain the limit cycle oscillations due to product round off and overflow errors?
18. With respect to finite word length effects in digital filters, with examples discuss about
Signal scaling
6. What is called quantization noise? Derive the expression for quantization noise power.
7. (i) Compare the truncation and rounding errors using fixed point and floating point
representation.
(ii) Represent the following numbers in floating point format with five bits for mantissa and
three bits for exponent.
710
0.2510
-710
-0.2510
8. Determine the dead band of the system y(n) = 0.2y(n–1) + 0.5y(n–2) + x(n) Assume 8 bits
are used for signal representation.
9. (a) i) Explain the characteristics of limit cycle oscillation with respect to the system described
by the difference equation : y(n) = 0.95 y(n-1) + x (n) ; x(n)= 0 and y(n-1)= 13.
Determine the dead range of the system.
ii) Explain the effects of coefficient quantization in FIR filters.
ii)Compare the truncation and rounding errors using fixed point and floating point
representation.
WIRELESS COMMUNICATION
UNIT I WIRELESS CHANNELS
PART A
1. Rapid changes in signal strength over a small travel distance or time interval.
2. Random frequency modulation due to varying Doppler shifts on different multipath
signals
3. Time dispersion caused by multipath propagation delays.
2. Define coherence bandwidth. (May 2016)
The coherence bandwidth is related to the specific multipath structure of the channel. The
coherence bandwidth is a measure of the maximum frequency difference for which signals are
still strongly correlated in amplitude. This bandwidth is inversely proportional to the rms value
of time delay spread.
It is defined as the range of frequencies over which the received Doppler spectrum is
essentially non-zero.
If the mobile radio channel has a constant gain and linear phase response over a bandwidth
which is greater than the bandwidth of the transmitted signal, then the received signal will
undergo flat fading.
If the channel possesses a constant gain and linear phase response over a bandwidth that is,
smaller than the bandwidth of transmitted signal, then the channel creates frequency selective
fading on the received signal.
The channel impulse response changes rapidly within the symbol duration. This type of channel
is called fast fading channel.
The channel impulse response changes at a rate much slower than the transm tted baseband
signal. This type of channel is called slow fading channel.
The path loss models are used to estimate the received signal level as the function of distance it
becomes possible to predict the SNR for a mobile communication system.
Intersymbol interference (ISI) is a form of distortion of a signal in which one symbol interferes
with subsequent symbols
23. Find the far field distance for an antenna with maximum dimension of 2m and
operating frequency 1 GHz?(Dec 2015)
Df = 2D2/λ= 2 * 2 * 2/0.3 = 26.7 m
24. Define Snell’s law. (May 2013)
Snell's law states that the ratio of the sines of the angles of incidence and refraction is equivalent
to the ratio of phase velocities in the two media, or equivalent to the reciprocal of the ratio of the
indices of refraction:
25. Calculate the Brewster Angle for a wave impinging on ground having a permittivity of
εr = 5.(May 2016)
= 0.409Brewster Angle = sin -1 (0.409) = 24.14
PART B -
1. What are the different types of multiple access schemes? (Dec 2013),(May
2016). FDMA-Frequency division multiple access-different frequencies are assigned
to different users TDMA-Time division multiple access-different time slots are
assigned to different users. CDMA-Code division multiple access-each user is
assigned a different code.
4. Define SAMA.
Spread Aloha Multiple Access is a combination of CDMA and TDMA. The CDMA better suits
for connection oriented services only and not for connection less burst data traffic because it
requires to program both sender and receiver to access different users with different codes.
5. Define CDMA.
Code Division Multiple Access systems use codes with certain characteristics to separate
different users. To enable access to the shared medium without interference. The users use the
same frequency and time to transmit data. The main problem is to find good codes and to
separate this signal from noise. The good code can be found the following 2 characteristic
1.Orthogonal. 2. Autocorrelation.
6. What is SDMA?
Space Division Multiple Access (SDMA) is used for allocating separated spaces to users in
wireless networks. The basis for the SDMA algorithm is formed by cells and sector zed antennas
which constitute the infrastructure implementing space division multiplexing (SDM).
7. What is FDD?
In FDMA, the base station and the mobile station establish a duplex channel. The two directions,
mobile station to base station and vice versa are separated using different frequencies. This
Scheme is called Frequency Division Duplex (FDD)
8. What limits the number of user in TDM and FDM compared to CDM?
The code space is huge compared to the frequency space and time space. Because of the limited
time space and frequency space, the number of user in TDM and FDM are limited.
9. How does near and far effect influence CDMA? What are counter measurements?
The near and far effect is a server problem of wireless networks using CDM. All signals should
arrive at the receiver with more or less the same strength. Precise power control is needed to
receive all senders with the same strength at a receiver.
Grade of Service in Wireless communication can be defined as ability of the user to connect on a
call when the cell is being used by multiple users. It can be given by the ratio of number of
blocked calls to the number of offered calls.
PART B
1. Compare and Contrast the TDMA,FDMA and CDMA techniques. (May 2016) (June
2013).
4. Explain in detail about multiple accesses with collision avoidance scheme. Also
explain the advantages of the same. (Dec 2013) .
5. Explain the concept of cell planning with relevant diagrams and expressions.
6. Explain the various methods that increase the channel capacity and coverage. (May
2016).
channels and voice channels in each cell for each of three systems.
10. Illustrate Cellular Frequency Reuse with a neat sketch.
1. Define modulation.
It is defined as the process by which some parameters of a high fr quency s g al termed as carrier,
is varied in accordance with the signal to be transmitted.
2. What is demodulation?
It is the process of recovering the original modulating signal from a modulated sig al.
If amplitude of the carrier is varied depending on the incoming digital signal, then it is called
Amplitude shift keying.
If the frequency of the sinusoidal carrier frequency is varied depending on the incoming digital
signal, then it is called Frequency shift keying.
If phase of the carrier is varied depending on the input digital signal, then it is called
phase shift keying.
In digital modulation instead of transmitting one bit at a time, two or more bits are transmitted
simultaneously. This is called M-ary transmission.
8. What is Quadrature modulation?
Sometimes two or more Quadrature carriers are used for modulation. It is called
Quadrature modulation.
Baud rate: Speed at which symbols are transmitted in a digital communication system,
i.e. no of symbols/second.
Bit rate: Speed at which data bits is transmitted in a digital communication system, i.e. no of
bits/sec.
10.What is QAM?
At high bit rates, a combination of ASK and PSK is employed in order to minimize the errors in
the received data. This method is known as Quadrature amplitude modulation.
QPSK is a multi-level modulation in which four phase shifts are used for
representing four different symbols.
In linear modulation technique, the amplitude of the transmitted (carrier) signal varies linearly
with the modulating digital signal. In general, linear modulation does not have a constant
envelope.
Bandwidth efficient, Very attractive for use in wireless communication systems, Accommodate
more and more users within a limited spectrum.
In nonlinear modulation, the amplitude of the carrier is constant regardless of the variation in the
modulating signal.
c. Limiter-discriminator detection can be used, which simplifies receiver design and provides
high immunity against random FM noise and signal fluctuations due to Rayleigh fading.
Demerits:
a. Constant envelope modulations occupy a larger bandwidth than linear modulation scheme
b. In situations where bandwidth efficiency is more important than power efficiency, constant
Envelope modulation is not well suited.
In QPSK the phase changes by 90 or 180 degrees. This creates abrupt amplitude variations in the
waveform. Therefore bandwidth requirement of QPSK is more. MSK overcomes this problem.
In MSK, the output waveform is continuous in phase hence there are no abrupt changes in
amplitude.
17. Why MSK is called as fast FSK? (May 2016).
MSK is called fast FSK, as the frequency spacing used is only half as much as that used in
conventional non-coherent FSK.
1. The main lobe of MSK is wide. This makes MSK unsuitable for the applications
where extremely narrow bandwidths and sharp cut-offs are required.
2. Slow decay of MSK power spectral density curve creates adjacent channel
interference. Hence MSK cannot be used for multiuser communications.
Gaussian filters used before the modulator to reduce the transmitted bandwidth of the signal. It
uses less bandwidth than conventional FSK.
21. Define M-ary FSK.
In M-ary system, M=2N different symbols are used and N no of bits per symbol. Every symbol
uses separate frequency for transmission.
22. Mention any two criteria for choosing a
modulation technique for a specific wireless
application? (June 2013)
The spectral efficiency of the modulation format should be as high as possible. This can best be
achieved by a higher order modulation format. This allows the transmission of many data bits
with each symbol. Adjacent channel interference must be small. This entails that the power
spectrum of the signal should show a strong roll-off outside the desired band. Furthermore, the
signal must be filtered before transmission.
In OFDM, delay dispersion leads to a loss of orthogonality between the subcarriers and thus
leads to Inter Carrier Interference (ICI). These negative effects can be eliminated by a special
type of guard interval called the cyclic prefix.
The peak to average power ratio PAPR is an important attribute of a communication system. A
low PAPR allows the transmit power amplifier to operate efficiently, whereas a high PAPR
forces the transmit power amplifier to have a large back off in order to ensure linear
amplification of the signal.
PART B
1. Explain QPSK transmitter and receiver with signal space diagram and give an expression for
spectral efficiency. (Dec 2013)(Dec 2014)
2. Explain π/4 Differential QPSK & OQPSK transmitter and receiver with signal space
diagram and give an expression for spectral efficiency. (June 2013)(May 2016).
3. Explain BFSK transmitter and receiver with signal space diagram and give an expression for
spectral efficiency.(Dec 2014)
4. Explain MSK transmitter and receiver with signal space diagram and give an expression for
spectral efficiency. (June 2013),(Dec 2015)
5. Explain GMSK transmitter and receiver with signal space diagram and give an expression for
spectral efficiency.(Dec 2015)(May 2016).
6. Discuss about the performance of digital modulation in fading channels. (Dec 2013)
7. Explain the Nyquist criterion for ISI cancellation. (Dec 2013)
8. Explain in detail about OFDM modulation technique with necessary diagrams.
9. (i)Describe with a block diagram π/4 Quadrature phase shift keying and its advantages.
PART A
i. Diversity is used to compensate for fading channel imparmeters, and is usually implemented
by using two or more receiving antennas.
The most common diversity technique is called spatial diversity, whereby multiple a tennas are
strategically spaced and connected to a common receiving system. While one antenna sees a
signal null, one of the other antennas may see a signal peak, and the receiver is able to select the
antenna with the best signals at any time.
To combat ISI, the equalizer coefficients should change according to the channel status so as to
track the channel variations. Such an equalizer is called an adaptive equalizer since it adapts to
the channel variations.
9. What is training mode in an adaptive equalizer?
First, a known fixed length training sequence is sent by the transmitter, then the receiver's
equalizer may adapt to a proper setting of minimum bit error rate detection, where the training
sequence is pseudorandom binary signal or a fixed and prescribed bit pattern.
Immediately following the training sequence, the user data is sent, and the adaptive equalizer at
the receiver utilizes a recursive algorithm to evaluate the channel and estimate filter coefficients
to compensate for the distortion created by multipath in the channel.
If the output is not used in the feedback path to adapt, then this type of equalizer is called linear
equalizer. If the output is fed back to change the subsequent outputs of the equalizer, this type of
equalizer is called
nonlinear equalizers.
It is simplest and easily available, Numerical stability, Faster convergence, Unique structure of
the lattice filter allows the dynamic assignment of the most effective length of the lattice
equalizer and When the channel becomes more time dispersive, the length of the equalizer can be
increased by the algorithm without stopping the operation of the equalizer.
The linear equalizers are very effective in equalizing channels where ISI is not severe. The
severity of ISI is directly related to the spectral characteristics. In this case there are spectral
nulls in the transfer function of the effective channel; the additive noise at the receiver input will
be dramatically enhanced by the linear equalizer. To overcome this problem, nonlinear
equalizers can be used.
Decision feedback equalization (DFE), Maximum likelihood symbol detection and Maximum
likelihood sequence estimation (MLSE).
DFE is particularly useful for channels with severe amplitude distortions and is widely used in
wireless communications.
16. Define rate of convergence.
The no of iterations required for the algorithm in response to stationary inputs to converge close
enough to the optimum solution.
It maximizes the signal to distortion at its output within the constraints of the equalizer filter
length, Low computational complexity and Simple program
To increase signal to noise ratio, for error free digital transmission, to degrade
the bit error probability.
19. Explain Diversity concept.
If one radio path undergoes a deep fade, another independent path may have a strong signal. By
having more than one path to select from, both the instantaneous and average SNRs at the
receiver may be improved.
Macrodiversity Microdiversity
2. Since correlators form the main working system of the receiver. The best
version of the received signal is selected and given as output.
2. Since correlators form the main working system of the receiver. The best version of the
received signal is selected and given as output.
PART B
1. Explain the classification of equalizers.
(ii)Explain the operation of an adaptive equalizer at the receiver side (Dec 2014)
PART A
1. What is Beamforming?
The multiple antennas at the transmitter and receiver can be used to obtain array and diversity
gain instead of capacity gain. In this setting the same symbol weighted by a complex scale factor
is sent over each transmit antenna, so that the input covariance matrix has u it rank. This scheme
is also referred to as MIMO beamforming.
Multiple antennas are used to improve wireless system performance. One option is to obtain
capacity gain by decomposing the MIMO channel into parallel channels and multiplexing
different data str ams onto these channels.This capacity gain is also referred to as multiplexing
gain.
In transmit diversity there are multiple transmit antennas, and the transmit power is divided
among these antennas. Transmit diversity is desirable in systems where more space,power,and
processing capability is available on the transmit side than on the receive side.Transmit diversity
design depends on whether or not the complex channel gain is known to the transmitter.
In Multipath environment, if the multiple versions of the signal arrive more than one chip
interval apart from each other. The receiver can recover the signal from multiple paths and then
combine them with suitable delays. This method achieves better performance than simply
recovering dominant signal and treating remaining signals as noise.
Systems with multiple antennas at the transmitter and receiver,which are commonly referred to
as multiple-
input multiple-output (MIMO) systems. The multiple antennas can be used to increase data rates
through multiplexing or to improve performance through diversity.
ii. For a given transmit energy per bit, multiplexing gain provides a higher data rate
whereas diversity gain provides a lower BER in fading.
iii. Support a higher data rate for a given energy per bit, so it transmits the bits more
quickly and can then shut down to save energy.
i. MIMO systems entail significantly more circuit energy consumption than their single antenna
counterparts, because separate circuitry is required for each antenna signal path.
ii. Signal processing associated with MIMO can
be highly complex. 12. Mention the
applications of MIMO systems.
ii. The IEEE 802.16e standard and the IEEE 802.11n standard also use MIMO
system.
iii. MIMO is used in mobile radio telephone standard such as 3GPP and 3GPP2
standard.
3GPP High Speed Packet Access Plus (HSPA+) and Long Term Evolution (LTE) standard use
MIMO.
13. How does spatial multiplexing work?
Spatial multiplexing uses MEA’s (Multiple element antennas) at the transmitter for
transmission of data streams. An original high-rate DataStream is multiplexed into several
parallel streams, each of which is sent from one transmit antenna element. The channel mixes up
these data streams so that each of the receive antenna elements sees a combination of them.
14. State the importance of spatial multiplexing.
The basic premise of spatial multiplexing is to send Mt independent symbols per symbol period
using the dimensions of space and time. To obtain full diversity order, an encoded bit stream
must be transmitted over all Mt transmit antennas. This can be done through serial encoding.
side.Transmit diversity is used to reduce the effect of fading. In transmit diversity the same
information is transmitted from two different antennas. Data from the second antenna is encoded
differently to differentiate it from the first antenna. This can be done to able the user equipment
on the receiver side to identify that the information is coming from the different locations and
properly decode it. Space-time coding is used to create redundant signals.
A MIMO system consists of several antenna elements, plus adaptive signal processing at both
transmitter and receiver, the combination of which exploits the spatial dimension of the mobile
radio channel. A smart antenna system is a system that has multiple antenna elements only at one
link end.
17. What is array gain?
Array gain is defined as the average increase in the SNR and depends on the number of
transmit
and receive antennas. Transmit/Receive array gain needs channel information in the transmitter
and receiver respectively. Channel information is typically available in the receiver whereas the
channel state information in the transmitter is more difficult to maintain in general.
18. What is diversity gain?
Diversity is a powerful technique to reduce fading effect in wireless communications. Diversity
gain is
defined as the reduction in the probability of error due to multiple independent paths produced
between the transmitter and receiver. In other words if there are M transmits, N receive antennas,
the order of diversity is M.N. There is no diversity gain if the medium is line of sight channel.
19. What is multiplexing gain?
ultiplexing gain is defined as the increase in the data rate; since independent data streams are
send through independent paths between multiple transmitters and multiple receivers. In other
words if there are M (> 1) transmit antennas and N (> 1) receive antennas, the increase in
the data rate is min (M, N)-fold
20. What is meant by co-phasing?
“Co-phase the signals” means that we need to multiply signals by ejɸi for some constant
phase angle ɸi on channel i, so that the (otherwise random) phases of the signals on the
different channels line up. If wdon’t
co-phase the signals before combining them, we end up with the multipath fading problem
signals sometimes add together destructively. Without co-phasing, the branch signals would not
add up coherently in the combiner, so the resulting output could still exhibit significant fading
due to constructive and destructive addition of the signals in all the branches.
Selection combining for systems that transmit continuously may require a dedicated receiver on
each branch to continuously monitor branch SNR. A simpler type of combining, called threshold
combining,
avoids the need for a dedicated receiver on each branch by scanning each of the branches in
sequential order and outputting the first signal whose SNR is above a given threshold γT .
As in SC, co-phasing is not
required because only one branch output is used at a time. Hence this technique can be used with
either coherent or differential modulation.
A very important factor for the profitability of a wireless networks is its capacity. MIMO system
provides high capacity by using multiple antennas at both the transmitter and receiver end of the
radio link. Multiple antennas are used to improve the capacity over SISO system when operated
in multi-path environment. MIMO system capacity is me sured in bits per second per hertz and is
bounded by Shannon Hartley capacity. But it has become app rent that MIMO system can exceed
the Shannon Hartley limit of SISO depending on the channel properties and the number of
antennas.
23. What is Precoding.
multiple receive antennas, so in that case pre-coding is used for multi-layer beamforming to
increase the throughput performance of a multiple receive antennas. In pre-coding the transmit
antennas transmit the multiple streams with independent and suitable weighting per ach ante a
such that higher link throughput is obtained at the receiver output
24. What is Alamouti’s scheme?
Alamouti’s scheme is designed for a digital communication system with two-antenna.Trasmit
diversity. The scheme works over two symbol periods and it is assumed that the Channel gain is
constant over his time. Over the first symbol period, two different symbolsS1 and S2 (each with
energy Es/2) are
transmitted simultaneously from antennas 1 and 2, respectively. Over the next symbol period,
symbol −S*2 is
transmitted from antenna 1 and symbol S*1 is transmitted from antenna 2, each again with
symbol energy Es/2.
Antenna Diversity or Space Diversity or Spatial Diversity can be given as the diversity scheme
followed in wireless communications to overcome multipath fading. More than one antenna are
used for transmission and reception, and the main concept behind this method is the signals
transmitted by different antennas undergo different fading and there is at least one robust version
of the signal being received. This method requires more sophisticated hardware for
synchronisation.
PART B
13. Determine the capacity of frequency selective fading and explain the concept of water
filling/water pouring models.(Dec 2015).
14. Explain with relevant diagrams the layered space time structure with respect to MIMO
systems.(May 2016).
IT6503-WEB PROGRAMMING
UNIT 1- SCRIPTING
1. What is HTML?
HTML is a language for describing web pages.
HTML stands for Hyper Text Markup Language
HTML is not a programming language, it is a markup language
A markup language is a set of markup tags
HTML uses markup tags to describe web pages
15. What is the purpose of CSS Box Model and mention its parts also.
The CSS box model is essentially a box that wraps around HTML elements, and it
Consists of: margins, borders, padding, and the actual content.
The different parts are:
Margin
Border
Padding
Content
24. What are the style precedence rules when using multiple approaches?
Inline styles override both linked style sheets and style information stored in the document head
with <STYLE> tag.
Styles defined in the document head override linked style sheets.
Linked style sheets override browser defaults.
25. Give the syntax to specify a characteristic in linked style sheet.
{Characteristic: value}
Multiple characteristic/value pairs should be separated by semicolons.
26. List down font characteristics permitted in style sheets.
1.font-family
2.font-size
3.font-weight
4.font-style
5.font-variant
What is HTML?
HTML Tags
HTML Documents
HTML Elements
HTML Element Syntax
Nested HTML Elements
HTML Document Example
EMPTY HTML ELEMENTS
HTML Attributes
HTML HEADINGS
HTML Formatting Tags
2. Explain the various methodologies by which you can retrieve data from Internet.
Internet Search Engine
Protocols used to retrieve the Data
i)FTP –Concepts
Commands &Semantics
Anonymous FTP
ii)TELNET
Network Virtual Terminal
Commands *Control Functions
Negotiable Options
iii)HTTP
iv)TFTP
6. Types of CSS.
There are three ways of inserting a style sheet:
External style sheet
Internal style sheet
Inline style
2.What is a Class?
Class is a template for a set of objects that share a common structure and a common
behaviour.
3. What is an Object?
Object is an instance of a class. It has state,behaviour and identity. It is also called as an
instance of a class.
4. What is an Instance?
An instance has state, behaviour and identity. The structure and behaviour of similar
classes are defined in their common class. An instance is also called as an object.
Encapsulation is the mechanism that binds together code and data it manipulates and
keeps both safe from outside interference and misuse. Inheritance is the process by which
one object acquires the properties of another object. Polymorphism is the feature that
allows one interface to be used for general class actions.
Methods are functions that operate on instances of classes in which they are defined.
Objects can communicate with each other using methods and can call methods in other
classes. Method definition has four parts. They are name of the method, type of object or
primitive type the method returns, a list of parameters and the body of the method. A
method’s signature is a combination of the first three parts mentioned above.
Object is an instance of a class and it is a software unit that combines a structured set of
data with a set of operations for inspecting and manipulating that data. When an object is created
using new operator, memory is allocated to it.
14. What gives java it’s “write once and run anywhere” nature?
All Java programs are compiled into class files that contain bytecodes. These byte codes
can be run in any platform and hence java is said to be platform independent.
static variable is a class variable which value remains constant for the entire class
static method is the one which can be called with the class itself and can hold only the staic
variables.
A package is a collection of classes and interfaces that provides a high-level layer of access
protection and name space management.
A super class is a class that is inherited whereas sub class is a class that does the inheriting.
1. Simple
2. Object-Oriented
3. Platform independent
4. Secured
5. Robust
6. Architecture neutral
7. Portable
8. Dynamic
9. Interpreted
10. High Performance
11. Multithreaded
12. Distributed
Java has very flexible three looping mechanisms. You can use one of the following three loops:
while Loop
do...while Loop
for Loop
Creating a package:
The package statement should be the first line in the source file. There can be only one package
statement in each source file, and it applies to all types in the file.
package animals;
interface Animal {
package animals;
System.out.println("Mammal eats");
}
public void travel(){
System.out.println("Mammal travels");
return 0;
m.eat();
m.travel();
Now, you compile these two files and put them in a sub-directory called animals and try to run
as follows:
$ mkdir animals
$ java animals/MammalInt
Mammal eats
Mammal travels
An interface is implicitly abstract. You do not need to use the abstract keyword when
declaring an interface.
Each method in an interface is also implicitly abstract, so the abstract keyword is not
needed.
Methods in an interface are implicitly public.
An exception is a problem that arises during the execution of a program. An exception can occur
for many different reasons, including the following:
Java String is a powerful concept because everything is treated as a string if you submit any form
in window based, web based or mobile application.
1. String s="Sachin";
2. System.out.println(s.toUpperCase());//SACHIN
3. System.out.println(s.toLowerCase());//sachin
4. System.out.println(s);//Sachin(no change in original)
10.Describe about the different input and output streams and their classes.
A stream is a sequence of data.In Java a stream is composed of bytes. It's called a stream because
it's like a stream of water that continues to flow.
In java, 3 streams are created for us automatically. All these streams are attached with console.
UNIT –3 JDBC
2.Define ODBC.
Quick Response means better service and availability of a wider range of products.
4. How the database connectivity is established in Java?
Class.forName(“sun.jdbc.odbc.JdbcOdbcDriver”)
Connection c1=RegisterDriver.getConnection(“jdbc:odbc:DSN”);
b) Purchase system
c) License Lookup
HTTPServlet used to create HTTP Servlets, which accepts 2 arguments to favor the request &
response cycle namely, HTTPServletRequest & HTTPServletResponse. And this can be
handled by doGet() & doPost() methods.
It has 4 categories
a) JDBC-ODBC Bridge
Use of the JDBC-ODBC bridge from an untrusted applet running in a browser, such as
Netscape Navigator, isn't allowed. The JDBC-ODBC bridge doesn't allow untrusted code to call
it for security reasons. ODBC is native code, so once ODBC is called the Java programming
language can't guarantee that a security violation won't occur. On the other hand, Pure Java
JDBC drivers work well with applets. They are fully downloadable and do not require any
client-side configuration.
"No suitable driver" is an error that usually occurs during a call to the
DriverManager.getConnection method. The cause can be failing to load the appropriate JDBC
drivers before calling the getConnection method, or it can be specifying an invalid JDBC URL--
one that isn't recognized by your JDBC driver. Your best bet is to check the documentation for
your JDBC driver or contact your JDBC driver vendor if you suspect that the URL you are
specifying is not being recognized by your JDBC driver.
No. The JDBC-ODBC Bridge does not support concurrent access from different threads. The
JDBC-ODBC Bridge uses synchronized methods to serialize all of the calls that it makes to
ODBC. Multi-threaded Java programs may use the Bridge, but they won't get the advantages of
multi-threading. In addition, deadlocks can occur between locks held in the database and the
semaphore used by the Bridge. We are thinking about removing the synchronized methods in
the future. They were added originally to make things simple for folks writing Java programs
that use a single-threaded ODBC driver.
The JDBC API classes are supported by the java package java.sql.Import java.sql.*
statement.JDBC –ODBC bridge is created by the following statements.
Class.forName(“sun.jdbc.odbc.JdbcOdbcDriver”)
DriverManager.getConnection(“jdbc:odbc:My_database”,” “ ,” “ );
The JDBC API is defined in the java.sql package. To use JDBC classes and interfaces the
java.sql is imported in the java program.
13.What is prepared statement in JDBC?
The prepared statement in JDBC is a precompiled SQL statement. It is specified using the
placeholder?.
There are special type setter methods that assign the values to the placeholders before the SQL
statements get executed.
The Callable Statement is used to represent the stored procedures. In this type of statements we
can assign the methods for the type of output arguments.
15.Waht is ResultSet?
The SQL statements that read data from a database query return the data in a result set. The
resultset object maintains a cursor that points to the current row in the database.
The connection class in JDBC is used to represent the connectivity with the data sources. The
code a call to the DriverManager objects getconnection() method to establish actual database
connection.
17. Give the syntax for getconnection() method to establish actual database connection.
Datagram is a type of packet that represents an entire communication. Datagram packet is the
class, which acts as the data container, and datagram socket is a mechanism used to send or
receive datagram packets
Methods:
Java networking is done using TCP /IP protocol. Some of the different kinds of protocols
available are
HTTP (Hyper Text Transfer Protocol enables interaction with the internet), FTP (File Transfer
Protocol enables transfer of files between computers), SMTP (Simple Mail Transfer Protocol
provides e-mail facility) and NNTP (Network News Transfer Protocol acts as a bulletin board for
sharing news)
Algorithms –these are methods that perform computation on objects that implement the
interfaces.
23.Define socket.
A socket is a connection between two hosts. It can perform following basic operations:
b.Send data
c.Receive data
d.Close a connection
e.Bind to a port
24.Define TCP.
TCP is designed for reliable transmission of data. If data is lost or damaged in transmission,
TCP ensures that the data is resent; if packets of data arrive out of order, TCP puts them back in
the correct order; if the data is coming too fast for the connection, TCP throttles the speed back
so tht packets will not be lost.
DatagramPacket has five methods that retrieve different parts of a datagram: the actual data plus
several fields from its header. These methods are mostly used for data grams we receive from the
network.
The RMI provides remote communication between the applications using two objects stub and
skeleton.
connection = DriverManager.getConnection("jdbc:odbc:Lab3.accdb");
System.out.println("Database connected");
statement = connection.createStatement();
ResultSet resultSet = statement.executeQuery("");
while (resultSet.next()) {
output.write("<p>" + resultSet.getString(1) + "\t" +
resultSet.getString(2) + "\t" + resultSet.getString(3) +
"</p>");
UNIT 4 APPLETS
1. What is a Servlet?
Servlets are modules of Java code that run in a server application (hence the name "Servlets",
similar to "Applets" on the client side) to answer client requests. Servlets are not tied to a
specific client-server protocol but they are most commonly used with HTTP and the word
"Servlet" is often used in the meaning of "HTTP Servlet".
8. Explain ServletContext
ServletContext interface is a window for a servlet to view it\'s environment. A servlet can use
this interface to get information such as initialization parameters for the web applicationor
servlet container\'s version. Every web application has one and only one ServletContext and is
accessible to all active resource of that application.
12.What is the relationship between the Canvas class and the Graphics class?
A Canvas object provides access to a Graphics object via its paint() method.
22. What is an event and what are the models available for event handling?
An event is an event object that describes a state of change in a source. In other words, event
occurs when an action is generated, like pressing button, clicking mouse, selecting a list, etc.
There are two types of models for handling events and they are: a) event-inheritance model and
b) event-delegation model
25. What is meant by controls and what are different types of controls in AWT?
Controls are components that allow a user to interact with your application and the AWT
supports the following types of controls: Labels, Push Buttons, Check Boxes, Choice Lists,
Lists, Scrollbars, and Text Components. These controls are subclasses of Component.
A Choice is displayed in a compact form that requires you to pull it down to see the list
of available choices. Only one item may be selected from a Choice. A List may be displayed in
such a way that several List items are visible. A List supports the selection of one or more List
items.
The enableEvents() method is used to enable an event for a particular object. Normally,an
event is enabled when a listener is added to an object for a particular event. The enableEvents()
method is used by objects that handle events by overriding their eventdispatch methods.
28. What is the difference between the File and RandomAccessFile classes?
The File class encapsulates the files and directories of the local file system. The
RandomAccessFile class provides the methods needed to directly access data contained in any
part of a file.
init() method - Can be called when an applet is first loaded start() method - Can be called each
time an applet is started. paint() method - Can be called when the applet is minimized or
maximized. stop() method - Can be used when the browser moves off the applet’s page.
destroy() method - Can be called when the browser is finished with the applet.
PART – B
public void init(): is used to initialized the Applet. It is invoked only once.
public void start(): is invoked after the init() method or browser is maximized. It is used
to start the Applet.
public void stop(): is used to stop the Applet. It is invoked when Applet is stop or
browser is minimized.
public void destroy(): is used to destroy the Applet. It is invoked only once.
Clears the specified rectangle by filling it with the background color of the current drawing
surface.
abstract void copyArea(int x, int y, int width, int height, int dx, int dy)
void drawPolygon(Polygon p)
Draws the text given by the specified string, using this graphics context's current font and color.
5. Show it.
frame.setVisible(true);
Source - The source is an object on which event occurs. Source is responsible for
providing information of the occurred event to it's handler. Java provide as with classes
for source object.
Listener - It is also known as event handler.Listener is responsible for generating
response to an event. From java implementation point of view the listener is also an
object. Listener waits until it receives an event. Once the event is received , the listener
process the event an then returns.
int rect1xco,rect1yco,rect1width,rect1height;
boolean rect1Active;
rect1xco = 20;
rect1yco = 20;
rect1width =100;
rect1height= 50;
addMouseMotionListener(this);
}
g.fillRect(rect1xco,rect1yco,rect1width,rect1height);
g.setColor(Color.blue);
g.drawString("("+xpos+","+ypos+")",xpos,ypos);
6.What is XSLT?
XSLT stands for XSL Transformations
XSLT is the most important part of XSL
XSLT transforms an XML document into another XML document
XSLT uses XPath to navigate in XML documents
XSLT is a W3C Recommendation
Web services encompass a set of related standards that can enable two computer
The data is passed back and forth using standard protocols such as HTTP, the same
protocol used to transfer ordinary web pages.
Web services operate using open, text-based standards that enable components written in
different languages and on different platforms to communicate.
They are ready to use pieces of software on the Internet. XML, SOAP, Web Services
Description Language (WSDL) and Universal Description, Discovery and Integration
(UDDI) are the standards on which web services rely.
UDDI is another XML based format that enables developers and business to publish and
locate Web services on a network.
It is a standard for accessing different database systems. There are interfaces for Visual
Basic, Visual C++, SQL and the ODBC driver pack contains drivers for the Access,
Paradox, dBase, Text, Excel and Retrieve databases.
XML,
SOAP,
WSDL
Extensible markup language. It offer a standard, flexible and inherently extensible data format,
XML significantly reduces the burden of deploying the many technologies needed to ensure the
success of Web services.
24. What is SOAP?
It provides a standard, extensible, composable framework for packaging and exchanging XML
messages. In the context of this architecture, SOAP also provides a convenient mechanism for
referencing capabilities (typically by use of headers).
WSDL is a language for describing Web services. WSDL describes Web services starting with
the messages that are exchanged between the requester and provider agents. The messages
themselves are described abstractly and then bound to a concrete network protocol and message
format.
XML provides a language which can be used between different platforms and programming
languages and still express complex messages and functions.
29. What are the types of web services and its uses?
Reusable application-components.
There are things applications need very often. So why make these over and over again?
Web services can offer application-components like: currency conversion, weather reports, or
even language translation as services.
Web services can help to solve the interoperability problem by giving different applications a
way to link their data. With Web services you can exchange data between different applications
and different platforms.
WSDL describes Web services starting with the messages that are exchanged between the
requester and provider agents. The messages themselves are described abstractly and then bound
to a concrete network protocol and message format.
Universal Description, Discovery, and Integration (UDDI) The directory shown in the above
figure could be a UDDI registry. The UDDI registry is intended to eventually serve as a means of
"discovering" Web Services described using WSDL . The idea is that the UDDI registry can be
searched in various ways to obtain contact information and the Web
Services available for various organizations. How much "discovery" will be used in the early
days of Web Services is open to discussion. Nevertheless, even without the discovery portion,
the UDDI registry is a way to keep up-to-date on the Web Services your organization currently
uses. More on Universal Description, Discovery, and Integration (new window).
SOAP once stood for 'Simple Object Access Protocol' but this acronym was dropped with
Version 1.2 of the standard.
Version 1.2 became a W3C recommendation on June 24, 2003. The acronym is sometimes
confused with SOA, which stands for Service-oriented architecture; however SOAP is different
from SOA.