Serial Asynchronous Transmission -...

28
DCCT 4020 –BROADBAND COMMUNICATIONS FINAL ASSIGNMENT NAME: _____________________________ STUDENT #: _____________________________ Hyder khoja Page 1 2/17/2022 1

Transcript of Serial Asynchronous Transmission -...

Page 1: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

DCCT 4020 –BROADBAND COMMUNICATIONS

FINAL ASSIGNMENT

NAME: _____________________________

STUDENT #: _____________________________

Hyder Khoja P.Eng

Hyder khoja Page 1 5/10/20231

Page 2: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

1. When the input is running slower than the frame, the transmitter will:

(a) Invert D bits (b) Perform Negative justification (c) Inserts stuff byte after H3 (d) Decrement pointer value by one (e) None of the above

Fig below shows the contents of payload pointer for normal operation. Assuming that the input is running slower than the frame, show the contents of the H1,H2, H3 bytes and the location of the start of payload after the transmitter performs frequency justification.

N D F I D I D I D I D I D0 1 1 0 0 0 0 0 0 1 0 1 1 0 0 1

2. What is the duration of a frame in STS-9. ----------------------------------

3. A user needs to send data at 21 Mbps. Which VT (or combination of VTs can be used.------------------------------------------------------------------------------

4. A company wants to multiplex up to 260 digitized voices. Which VT (or combination of VTs )is suitable for this company

5. Draw a SONET network using all of the following devices. Label all lines, sections and paths(a) Three STS multiplexers (two as inputs and one as out put)(b) Four ADMs(c) Five regenerators

6. The ________ channel can be used for telemetry and alarms.

a. B b. C c. D d. H

Hyder khoja Page 2 5/10/20232

Page 3: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

7. The BRI is composed of ____________. a. two B channels b. one H channel c. one D channel d. a and c

8. Equipment that controls the physical and electrical termination of the ISDN at the user’s premises is called _________________.

a. NT1 b. NT2 c. NT3 d. NT4

9. __________ is a group of non-ISDN equipment.

a. TE1 b. TE2 c. TEx d. T3

10. Reference point R is the specification for connecting TE2 and __________________.

a. TE1 b. NT1 c. NT2 d. TA

11. Equipment that performs functions related to the OSI model’s layers 1, 2, and 3 is called _____________________.

a. NT1 b. NT2 c. NT3 d. NT4

12. The part of the address field in an LAPD frame that defines the upper-layer service is called _________________.

a. TEI b. SAPI c. CR d. none of the above

Hyder khoja Page 3 5/10/20233

Page 4: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

13. Which of the following ( in decimal ) is not a valid SAPI?

a. 56 b. 42 c. 64 d. 63

14. Which of the following ( in decimal) is not a valid TEI?

a. 56 b. 128 c. 64 d. 63

15. The network layer of the D channel is defined by the _______ protocol.

a. Q.931 b. I.430 c. I.431 d. neither a nor b

16. To initiate a call, which of the following messages is sent by the D channel?

a. setup b. connect c. progress d. none of the above

17. What is the physical layer of PRI?:________________________________

18.. The address of TE is 110 decimal and the D channel is used for signaling. Show the contents of the address field

_________________________________________________

Hyder khoja Page 4 5/10/20234

Page 5: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

19.. Encode the bit pattern 001001001011 in PSEUDOTERNARY. and 2B1Q schemes and state over which interfaces they are used

20. User A is calling User B over an ISDN Network. The Data Link Layer messages are exchanged over which channela. B1 b. B2 c. D d. H e. None of the above

21. User A is calling User B over an ISDN Network. List the first 2 layer 2 messages exchanged between the caller and the Callee______________________ ______________________________

22. User A is calling User B over an ISDN Network. List the 4 call set up messages exchanged over Layer 3.________ _______________ _______________ _______________

25. In WDM, separate wavelengths function like:

a) Digital signals at separate frequenciesb) Analog signals at separate frequenciesc) Pulse coded signalsd) Pulse Amplitude Modulated signalse) Pulse Width Modulated signals

26. The typical length of an “EDFA“ fiber operating in the range of 1565 to 1625 nm range is:

a) 10 mb) 25 mc) 15 md) 100 me) 5 m

27. State the most important reason why EDFA is most suitable for DWDM systems.

28. For an EDFA to work, the Erbium ions must be excited by a high power LASER at :a) 1330 nmb) 1665 nmc) 980 nmd) 1565nme) 1480 nmf) c or e aboveg) None of the above

Hyder khoja Page 5 5/10/20235

Page 6: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

30.List at least 4 components needed to construct a WDM system:

___________ _____________ ________________ __________________

31. Sketch a WDM System using 4 essential components:

32.____________ has a higher transmission rate in the downstream direction than in the upstream direction.

(a) VDSL(b) ADSL(c) SDSL(d) (a) and (b)

33. ____________is suitable for businesses that require comparable upstream and downstream data rates

(e) VDSL(f) ADSL(g) SDSL(h) (a) and (b)

35. DMT is a modulation scheme that combines elements of _______ and _______

(a) FDM; TDM(b) QDM;QAM(c) FDM;QAM(d) PSK; FSK

36. The largest portion of the bandwidth for ADSL carries______________(a) Voice communication(b) Upstream Data© Downstream data(d) Control Data

38 ____________ is a device at the Telephone company site that can packetize data to be sent to the ISP server

(a) A DSLAM(b) An ADSL Modem(c) A Filter(d) A Splitter

Hyder khoja Page 6 5/10/20236

Page 7: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

41. __________________ Encoded Data is more susceptible to attenuation than ________ encoded data

(a) An AMI ; a 2B2Q(b) A 2B1Q ; an AMI(c) An AMI ; a 2B1Q(d) None of the above

43.The practical upper limit of length of ADSL is ____________.a. 6,000 ftb. 12,000 ftc. 18,000 ftd. 36,000 ft

44. The Cable Modem technology uses __________technique for upstream transmission

a. FDMb. DMTc. QAMd. QPSKe. TDM

45. Cable Modem technology uses _____bits /Hz for downstream transmissiona. 5b. 6c. 4d. 2e. 3

46.The DSLs that target symmetric transmission applications include all but which of the following?

e. MSDSLf. HDSLg. ADSLh. SDSLi. ISDN

47.Which of the following statements about VDSL is not true?

j. VDSL is both symmetric and asymmetrick. VDSL has a longer range in the loopl. VDSL is nearly ten times faster than ADSLm. VDSL is over thirty times faster than HDSL

48. In ADSL, channels _______ to _________ are reserved for upstream transmission

Hyder khoja Page 7 5/10/20237

Page 8: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

f. 6 to 30g. 31 to 255h. 30 to 254i. 5 to 31j. 4 to 30

49. In ADSL, each sub channel can carry up to______________ data rate.

f. 4Kbpsg. 4.132Kbpsh. 60Kbpsi. 1.44Mbpsj. 13.4Mbps

51. The maximum theoretical downstream BW for Cable Modems is:a. 30MHZb. 6MHZc. 42MHZd. 60MHZ

54. List 3 functions performed by a Gateway: ___________________ __________________________ ______________________

55. A Gatekeeper performs which of the following functions:

a. Admission Controlb. Capability Negotiationsc. Call Setupd. Call Terminatione. User Location

56. Name a device needed to manage Multiparty conferences: ___________

57. Specify 3 most important QoS parameters for VOIP conversation.

_________________ ____________________ ______________________

58.Sketch a diagram showing how a VOIP system is constructed for a Phone –to Phone Call.

Hyder khoja Page 8 5/10/20238

Page 9: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

59. Sketch a diagram showing a PBX based practical implementation of of a VOIP network linking the Toronto branch of a major corporation to its Head office in Montreal

60.Sketch a Cisco based VOIP Network linking the branch office a major corporation with its head office.

61.Sketch a diagram showing the essential components of VOIP protocol Stack.

62. In addition to digitization, list 5 vital functions required for a viable VOIP Network implementation.

___________________________

___________________________

____________________________

____________________________

___________________________

Hyder khoja Page 9 5/10/20239

Page 10: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

63. Which of the following protocols is used for Media transmissiona. IPb. RTPc. H.245d. H.225e. RTCP f. Both b&e

64. Which of the following protocol is used for actual transport of data packets

a. TCPb. IPc. UDPd. ICMPe. Q.931f. Both (a) & (c)

65. Which of the following protocols is used to carry the Signalling messages over VOIP Network

a. TCPb. RSVPc. UDPd. Q.931e. IPf. None of the above

66. ITU-T recommends which of the following CODEC for Video transmissiona. G.711b. H.261c. G.723d. G.729e. H.263f. (b) & (e)g. G.722

67. Which of the following CODEC can carry maximum number of calls in the available BW.

a. G.711b. G.722c. G.729d. G.723e. G.721

69. Maximum tolerable jitter for a VOIP call isa. 200 msb. 250msc. 300msd. 150mse. 100ms

Hyder khoja Page 10 5/10/202310

Page 11: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

70. What is a popular subjective measurement for determining the call quality _________? What should be its value for a good VOIP Call: ________________

71. For a VOIP call, jitter is defined as :

a. Time delay between the transmission and reception of a voice packetb. The number of packet lostc. The number of missequenced packetsd. Variation in the arrival time of VOIP packets at the receivere. None of the above

72. Excessive jitter manifests itself as : __________________________________

73.. Consider the RTP header:

a. Which field of the RTP header is used to compensate for the delay and jitter:_______________

b. Which field of the RTP Header describes the encoding of the media:_______________

c. Which field of the RTP Header is used to identify the originator of the data in a Multiparty session

d. Which field of the RTP header detects the lost packets:______________e. Which field of the RTP Header keeps track of the number of participants in a

multiparty session:_____________________f. Using RTP protocol, how many participants can join a multiparty

conference:____________________

74. SIP is a newer protocol proposed by:

a. ITU-Tb. ITEFc. ANSId. IEEEe. ISO

76. SIP is a _______________ Protocol

a. Signallingb. Media transmissionc. Transportd. Routinge. None of the above

77. SIP provides following functions:

Hyder khoja Page 11 5/10/202311

Page 12: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

a. Call Setupb. Call Managementc. Capability exchange mechanismd. User locatione. All of the above f. None of the above

78. SIP works in conjunction with: Name at least 3 additional protocols.

________________ ______________________ _________________________

79. SIP uses__________________ for media transmission

a. TCPb. RTPc. UDPd. IPe. ICMP

80. SIP is a text based protocol that uses a combination of ____________and _________ for VOIP call

a. HTTP, SNMPb. SNMP, SMTPc. SMTP, FTPd. HTTP, SMTPe. HTTP, FTP

81. Show, with the help of a sketch, the encapsulation of SIP data

82. SIP uses a _____________/_______________ Model with ___________/_________.

83. List 4 essential components of SIP Architecture.

_________________ _________________ ________________ ________________

Hyder khoja Page 12 5/10/202312

Page 13: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

84. SIP signaling messages are created by USER _________ Process and response are created by a USER _____________ Process.

84. SIP uses _________________ message to initiate a call

a. Registerb. Invitec. Ackd. Byee. Cancel

85. SIP uses ___________ message to inform the Redirect Server of the current location of the User

a. Inviteb. Registerc. ACKd. Byee. Cancel

86. Show, with the help of a Sketch, all SIP components involved in completing a SIP call

87. SIP messages consist of a ______________ and a Body

88. SIP addresses look like an ____________ address with the word __________ added in the front

89. Which of the following SIP component perform email address to IP Address translation.

a. User Agentb. Proxy Serverc. Redirect Serverd. Location Servere. Registration Server

90.The media capability information is carried in the:

a. Body of the Invite Message

Hyder khoja Page 13 5/10/202313

Page 14: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

b. RTP packetc. SAP packetd. RSVP packete. None of the above

91. A PS determines the IP address of the callee( if it is logged on to the current site) using which protocol?

a. RIPb. ARPc. GLPd. SDPe. ICMPf. SAP

92. A PS determines the IP address of the alternate location using_________ Protocol

a. RIPb. GLPc. DNSd. SDPe. SAP

93. GLP is very similar to:

a. BGPb. OSPFc. ARPd. RIPe. RARP

94. The LS contain the:

a. The Callee Adressb. The Caller Addressc. The address of a Gateway closest to the PSTN or Cellular Network to which the

called host is attachedd. The address of the closest Redirect Servere. The Address of the closest Registration Server

VPN SECTION

1. Which Protocol is used most frequently for remote access to the Internet?

Hyder khoja Page 14 5/10/202314

Page 15: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

(a) L2F(b) PPTP(c) L2TP(d) PPP(e) IPSec

2. Which of the following is the preferred encryption protocol for VPN(a) PPP(b) PPTP(c) L2TP(d) L2F(e) IP Sec

3. What are the four major functions of a VPN____________ _____________ ____________ _________________

4. Which of the following is a description of an Access VPN:(a) provides secure links between corporate sites using shared

infrastructure but dedicated links(b) Connects users to corporate Network using shared facilities

but dedicated connections(c) Provides a dedicated connection between corporate users(d) Provides secure shared access to corporate sites over analog,

ISDN, DSL or Cable Network(e) All of the above

5. Which of the 5 statements above in Q#3 describes an Intranet? _______6. Which of the 5 statement above describes an Extranet?_______________7. Describe the essential difference between a Voluntary Tunnel and a

compulsory Tunnel: __________________________________________8. Tunneling requires which 3 types of Protocols?____________ _______________ __________________________9. List 3 major tunneling protocols_____________________ _______________ ___________________10. Fig below shows a tunneled packet. Fill in the missing fields

11. Sketch a diagram showing an INTRANET, EXTRANET and an Access VPN.

Hyder khoja Page 15 5/10/202315

Page 16: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

12. List 5 types of VPN Hardware;__________ __________ ___________ ____________ _____________

13. Describe at least 2 types of packet filtering techniques used in Firewalls

14. List 3 Data link Layer tunneling protocols______________ __________________ _____________________15.List 5 major features of IPSec.

VPN is a network that is _______ but ________.

A) private; public

B) private; virtual

C) public; virtual

D) none of the above

6 A VPN is physically ________ but virtually ________.

A) public; private

B) private; public

C) public; hybrid

D) none of the above

7 VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.

A) SSL; tunneling

B) IPSec; SSL

C) IPSec; tunneling

D) none of the above

8 ____________ means that each IP datagram destined for private use in the organization must

Hyder khoja Page 16 5/10/202316

Page 17: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

be encapsulated in another datagram.

A) Multicasting

B) Broadcasting

C) Tunneling

D) none of the above

15 A VPN can use _______ to guarantee privacy.

A) IPSec

B) tunneling

C) both a and b

D) none of the above

16 Tunneling is a technique in which the IP datagram is first _______ and then _______.

A) encapsulated in another datagram; encrypted

B) encrypted; encapsulated in another datagram

C) authenticated; encrypted

D) encrypted; authenticated

MPLS SECTION:

15. List 3 Applications of MPLS

_________________ _______________ ____________

16. MPLS converts(a) L2 routing into L3 Switching(b) L3 switching into L2 Routing(c) L3 Routing onto L2 Switching(d) L4 transport into L2 routing(e) None of the above

17. List 4 parameters used to determine the FEC

_____________ _______________ _______________ ____________

18. State 3 steps that must be taken by an InGress LSR to route a packet, before the actual transmission begins

Hyder khoja Page 17 5/10/202317

Page 18: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

19. With the Static Explicit Routing in MPLS:

(a) Each LSR determines the route independently(b) Routes are manually configured(c) Routes are pre-configured for all FECs(d) Routes are dynamically determined by the INGRESS LSR at the time of

arrival of the packet(e) None of the above

20. The Label is placed:

(a) Before the L2 Header(b) After the L2 Header(c) After the L3 header(d) Between the L2 and L3 headers

21. The labels are:(a) Carried end to end(b) Removed at LSR and replaced with a new label(c) Small identifiers that contain the Ip address of the next hop(d) Stuck between L3 and L4 header(e) All of the above

22. In MPLS, LSPS are:(a) Manually configured by the Network Administrator(b) Switched paths calculated based on the L3 address.(c) Communicated in the forward direction from the Ingress LSR

to the Egress LSR(d) Pre-established based on the FEC requirements of the

customer.(e) Established using RIP protocol

23. MPLS uses______,_______ protocols to establish LSPS(a) UDP, TCP(b) RTP, RSVP(c) RSVP, RTCP(d) OSPF, SIP(e) LDP, RSVP

24. Which of the following is NOT a consideration in binding a Label to a specific FEC

(a) Destination port Numbers(b) Protocol ID(c) Network Management(d) QoS requirements

Hyder khoja Page 18 5/10/202318

Page 19: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

(e) Differentiated Service25. A Routing Algorithm that accounts for the traffic requirements of various

flows and he resources available along various hops and through various nodes is called:

(a) OSPF Routing(b) Constrained Based Routing(c) BGP Routing(d) Router RIP(e) SIP based routing

26. LDP gathers information regarding______________, to calculate the Route along the LSP: List 3 parameters.______________ ___________________ __________________.

27. Which of the following is not a function of the LDP?(a) Assigns a Label to LSP to be used to recognized incoming

packets that belong to a given FEC(b) Inform all potential upstream nodes of the Label assigned to

this FEC(c) Learns the next hop for this LSP(d) Learn the Label that the downstream node has assigned to

this FEC.(e) Allows LSRS to learn each others capabilities(f) All of the above

28. MPLS sticks a ________bits Label:(a) 32 (b) 20(c) 24(d) 16(e) None of the above

29. MPLS COS field, sometimes copies the IP header________ field(a) Protocol ID(b) TOS(c) Length(d) TTL(e) FLAGS

30. Which of the following is NOT a feature of the MPLS Label Stacking Technique:

(a) Unlimited stacking(b) Tunnelling(c) VPN(d) First in Last out(e) Last in first out

31. Sketch a diagram showing the MPLS Protocol stack architecture.

Hyder khoja Page 19 5/10/202319

Page 20: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

32. The LDP uses _________ for the reliable transfer of data from one LSR to another

(a) UDP(b) RTP(c) RTCP(d) TCP(e) None of the above

33. The LDP uses __________ during the discovery phase of its operation.(a) UDP(b) TCP(c) RTP(d) RTCP(e) RSVP

34. The LDP uses ___________ message to announce and maintain the presence of an LSR in a Network

(a) The Notification Message(b) The Advertisement message(c) The Session Message(d) The Invite message(e) None of the above

35. The LDP uses ___________ message to provide advisory and signal error information

(a) The advertisement(b) The notification(c) The session(d) The discovery(e) The Invite

36. The LDP uses __________ message to create, change, modify and delete labels based on a given FEC

(a) The Discovery(b) The Session(c) The invite(d) The Notification

Hyder khoja Page 20 5/10/202320

Page 21: Serial Asynchronous Transmission - munro.humber.camunro.humber.ca/~khoja/TCOM505/Week13/Notes.doc · Web viewFINAL ASSIGNMENT. NAME: _____ STUDENT #: _____ Hyder Khoja P.Eng. 1. When

(e) The advertisement.37. List 5 steps that must be taken for data to travel through an MPLS

Network38. Draw a sketch, showing the creation of a tunnel through an MPLS

Network using Label stack39. What does FEC stands for:________________________________

Hyder khoja Page 21 5/10/202321