Computor science
-
Upload
rochana-ramanayaka -
Category
Documents
-
view
216 -
download
2
description
Transcript of Computor science
![Page 1: Computor science](https://reader031.fdocuments.in/reader031/viewer/2022020518/577c81ca1a28abe054ae2378/html5/thumbnails/1.jpg)
N EXNoii;
ii'i:,
. ;,..1 .)' i- SEMESTER I g'2005
.t
UNIVERSITY OF COLO.l
FACULTY OE
SECOND YEAR. EXAMINATION IN
Non-programmsble
1i"ff:rt,'t,. '
#ii ,
![Page 2: Computor science](https://reader031.fdocuments.in/reader031/viewer/2022020518/577c81ca1a28abe054ae2378/html5/thumbnails/2.jpg)
ils,f,
i:t'
Qucstion B1
Psrt A -Qr
Ilriefly discuss the usc of
State error contol aPProac
II\ L,' I-Z\
Tcchnologies01 snd 02
I.;
I{.
't
Vl. If rqceived codeword inerror ness bil and write
Tabi! given below has
lluffrnan encoding tree
iit. "Two bit errors are notii: Elaborate on this.
lV. What is the use of
V. The following code ha3
Calculate the codeword us
*,:.*i1ii.:
to
" itl
\1:.
,4
n and correction in data cornmunication'
by data communication.
detect in single parity bit checkingl''
in data communication?' t
the data bits (information word).
'*'' !
't:,.1011010'.
.r.1.. \S
',:ilft
insT/4 mechanism.
714 mechanism is "1q190119011"' find thc 'icrrect codeword. t' "- ';
.t.'q't"
a statistical approach. It is obviotrs thrtcharacters.If we can encode
storage sPace. _ ^. ,i,.Itt*a are analyzed and their reletii.cl
ich is an unbalanced biriary irce is sreatcd?...;iwith their respective probabilities. Butitd tbS
down the code for each character. .r ' i.L
r.Ta
?>o /4--(s
![Page 3: Computor science](https://reader031.fdocuments.in/reader031/viewer/2022020518/577c81ca1a28abe054ae2378/html5/thumbnails/3.jpg)
.'-i'lijr
I
:
What is 802.1i in the context ofrecomrnend to use this? brirLo,ra
II. In each of the following cases
a. I 19.17."13. 155
b, t7 .255.255.0c. 121.9.13.151
, d. t20.17.255.255' e., ,235.5.8.171
.- IV. Describe the importance of
Consider crcating 6 usable
0-2ss)
broadcast IP of each suSriet.n each subnet.
of the subnet #3 (3'd subneQ:arrangement.of setting up variable sized subneti?
P
a.
b.
c.
d.
e.
Writc down the networkHorv many useable host IWhat is the iP address ofFind the subnet mask ofWhat are rhe altemative
tcl 2, I 6 g,
rin lSS r J-)-s I
tlir:
l4),1{'€-4 ' '.'i '
-" I <-=--.;;:l :-r
\
n\
W1
a
![Page 4: Computor science](https://reader031.fdocuments.in/reader031/viewer/2022020518/577c81ca1a28abe054ae2378/html5/thumbnails/4.jpg)
.::!i'*i 'i
1:/*Outprit {iclcl nlnrls us rri!rlI
rl-q.C 1-.1;.e. .. (Hr..A'rr... !...
/ kOutprrt lli rccrlrds+/
!,,{..'.Ir. (.. fu.t.;.q.q. .-... i'.. .'.:.!.=/.s:!:
/sCf r:;in;j proccrll.rrt s*/
I
t'oi: