Serial Asynchronous Transmission -...
Transcript of Serial Asynchronous Transmission -...
DCCT 4020 –BROADBAND COMMUNICATIONS
FINAL ASSIGNMENT
NAME: _____________________________
STUDENT #: _____________________________
Hyder Khoja P.Eng
Hyder khoja Page 1 5/10/20231
1. When the input is running slower than the frame, the transmitter will:
(a) Invert D bits (b) Perform Negative justification (c) Inserts stuff byte after H3 (d) Decrement pointer value by one (e) None of the above
Fig below shows the contents of payload pointer for normal operation. Assuming that the input is running slower than the frame, show the contents of the H1,H2, H3 bytes and the location of the start of payload after the transmitter performs frequency justification.
N D F I D I D I D I D I D0 1 1 0 0 0 0 0 0 1 0 1 1 0 0 1
2. What is the duration of a frame in STS-9. ----------------------------------
3. A user needs to send data at 21 Mbps. Which VT (or combination of VTs can be used.------------------------------------------------------------------------------
4. A company wants to multiplex up to 260 digitized voices. Which VT (or combination of VTs )is suitable for this company
5. Draw a SONET network using all of the following devices. Label all lines, sections and paths(a) Three STS multiplexers (two as inputs and one as out put)(b) Four ADMs(c) Five regenerators
6. The ________ channel can be used for telemetry and alarms.
a. B b. C c. D d. H
Hyder khoja Page 2 5/10/20232
7. The BRI is composed of ____________. a. two B channels b. one H channel c. one D channel d. a and c
8. Equipment that controls the physical and electrical termination of the ISDN at the user’s premises is called _________________.
a. NT1 b. NT2 c. NT3 d. NT4
9. __________ is a group of non-ISDN equipment.
a. TE1 b. TE2 c. TEx d. T3
10. Reference point R is the specification for connecting TE2 and __________________.
a. TE1 b. NT1 c. NT2 d. TA
11. Equipment that performs functions related to the OSI model’s layers 1, 2, and 3 is called _____________________.
a. NT1 b. NT2 c. NT3 d. NT4
12. The part of the address field in an LAPD frame that defines the upper-layer service is called _________________.
a. TEI b. SAPI c. CR d. none of the above
Hyder khoja Page 3 5/10/20233
13. Which of the following ( in decimal ) is not a valid SAPI?
a. 56 b. 42 c. 64 d. 63
14. Which of the following ( in decimal) is not a valid TEI?
a. 56 b. 128 c. 64 d. 63
15. The network layer of the D channel is defined by the _______ protocol.
a. Q.931 b. I.430 c. I.431 d. neither a nor b
16. To initiate a call, which of the following messages is sent by the D channel?
a. setup b. connect c. progress d. none of the above
17. What is the physical layer of PRI?:________________________________
18.. The address of TE is 110 decimal and the D channel is used for signaling. Show the contents of the address field
_________________________________________________
Hyder khoja Page 4 5/10/20234
19.. Encode the bit pattern 001001001011 in PSEUDOTERNARY. and 2B1Q schemes and state over which interfaces they are used
20. User A is calling User B over an ISDN Network. The Data Link Layer messages are exchanged over which channela. B1 b. B2 c. D d. H e. None of the above
21. User A is calling User B over an ISDN Network. List the first 2 layer 2 messages exchanged between the caller and the Callee______________________ ______________________________
22. User A is calling User B over an ISDN Network. List the 4 call set up messages exchanged over Layer 3.________ _______________ _______________ _______________
25. In WDM, separate wavelengths function like:
a) Digital signals at separate frequenciesb) Analog signals at separate frequenciesc) Pulse coded signalsd) Pulse Amplitude Modulated signalse) Pulse Width Modulated signals
26. The typical length of an “EDFA“ fiber operating in the range of 1565 to 1625 nm range is:
a) 10 mb) 25 mc) 15 md) 100 me) 5 m
27. State the most important reason why EDFA is most suitable for DWDM systems.
28. For an EDFA to work, the Erbium ions must be excited by a high power LASER at :a) 1330 nmb) 1665 nmc) 980 nmd) 1565nme) 1480 nmf) c or e aboveg) None of the above
Hyder khoja Page 5 5/10/20235
30.List at least 4 components needed to construct a WDM system:
___________ _____________ ________________ __________________
31. Sketch a WDM System using 4 essential components:
32.____________ has a higher transmission rate in the downstream direction than in the upstream direction.
(a) VDSL(b) ADSL(c) SDSL(d) (a) and (b)
33. ____________is suitable for businesses that require comparable upstream and downstream data rates
(e) VDSL(f) ADSL(g) SDSL(h) (a) and (b)
35. DMT is a modulation scheme that combines elements of _______ and _______
(a) FDM; TDM(b) QDM;QAM(c) FDM;QAM(d) PSK; FSK
36. The largest portion of the bandwidth for ADSL carries______________(a) Voice communication(b) Upstream Data© Downstream data(d) Control Data
38 ____________ is a device at the Telephone company site that can packetize data to be sent to the ISP server
(a) A DSLAM(b) An ADSL Modem(c) A Filter(d) A Splitter
Hyder khoja Page 6 5/10/20236
41. __________________ Encoded Data is more susceptible to attenuation than ________ encoded data
(a) An AMI ; a 2B2Q(b) A 2B1Q ; an AMI(c) An AMI ; a 2B1Q(d) None of the above
43.The practical upper limit of length of ADSL is ____________.a. 6,000 ftb. 12,000 ftc. 18,000 ftd. 36,000 ft
44. The Cable Modem technology uses __________technique for upstream transmission
a. FDMb. DMTc. QAMd. QPSKe. TDM
45. Cable Modem technology uses _____bits /Hz for downstream transmissiona. 5b. 6c. 4d. 2e. 3
46.The DSLs that target symmetric transmission applications include all but which of the following?
e. MSDSLf. HDSLg. ADSLh. SDSLi. ISDN
47.Which of the following statements about VDSL is not true?
j. VDSL is both symmetric and asymmetrick. VDSL has a longer range in the loopl. VDSL is nearly ten times faster than ADSLm. VDSL is over thirty times faster than HDSL
48. In ADSL, channels _______ to _________ are reserved for upstream transmission
Hyder khoja Page 7 5/10/20237
f. 6 to 30g. 31 to 255h. 30 to 254i. 5 to 31j. 4 to 30
49. In ADSL, each sub channel can carry up to______________ data rate.
f. 4Kbpsg. 4.132Kbpsh. 60Kbpsi. 1.44Mbpsj. 13.4Mbps
51. The maximum theoretical downstream BW for Cable Modems is:a. 30MHZb. 6MHZc. 42MHZd. 60MHZ
54. List 3 functions performed by a Gateway: ___________________ __________________________ ______________________
55. A Gatekeeper performs which of the following functions:
a. Admission Controlb. Capability Negotiationsc. Call Setupd. Call Terminatione. User Location
56. Name a device needed to manage Multiparty conferences: ___________
57. Specify 3 most important QoS parameters for VOIP conversation.
_________________ ____________________ ______________________
58.Sketch a diagram showing how a VOIP system is constructed for a Phone –to Phone Call.
Hyder khoja Page 8 5/10/20238
59. Sketch a diagram showing a PBX based practical implementation of of a VOIP network linking the Toronto branch of a major corporation to its Head office in Montreal
60.Sketch a Cisco based VOIP Network linking the branch office a major corporation with its head office.
61.Sketch a diagram showing the essential components of VOIP protocol Stack.
62. In addition to digitization, list 5 vital functions required for a viable VOIP Network implementation.
___________________________
___________________________
____________________________
____________________________
___________________________
Hyder khoja Page 9 5/10/20239
63. Which of the following protocols is used for Media transmissiona. IPb. RTPc. H.245d. H.225e. RTCP f. Both b&e
64. Which of the following protocol is used for actual transport of data packets
a. TCPb. IPc. UDPd. ICMPe. Q.931f. Both (a) & (c)
65. Which of the following protocols is used to carry the Signalling messages over VOIP Network
a. TCPb. RSVPc. UDPd. Q.931e. IPf. None of the above
66. ITU-T recommends which of the following CODEC for Video transmissiona. G.711b. H.261c. G.723d. G.729e. H.263f. (b) & (e)g. G.722
67. Which of the following CODEC can carry maximum number of calls in the available BW.
a. G.711b. G.722c. G.729d. G.723e. G.721
69. Maximum tolerable jitter for a VOIP call isa. 200 msb. 250msc. 300msd. 150mse. 100ms
Hyder khoja Page 10 5/10/202310
70. What is a popular subjective measurement for determining the call quality _________? What should be its value for a good VOIP Call: ________________
71. For a VOIP call, jitter is defined as :
a. Time delay between the transmission and reception of a voice packetb. The number of packet lostc. The number of missequenced packetsd. Variation in the arrival time of VOIP packets at the receivere. None of the above
72. Excessive jitter manifests itself as : __________________________________
73.. Consider the RTP header:
a. Which field of the RTP header is used to compensate for the delay and jitter:_______________
b. Which field of the RTP Header describes the encoding of the media:_______________
c. Which field of the RTP Header is used to identify the originator of the data in a Multiparty session
d. Which field of the RTP header detects the lost packets:______________e. Which field of the RTP Header keeps track of the number of participants in a
multiparty session:_____________________f. Using RTP protocol, how many participants can join a multiparty
conference:____________________
74. SIP is a newer protocol proposed by:
a. ITU-Tb. ITEFc. ANSId. IEEEe. ISO
76. SIP is a _______________ Protocol
a. Signallingb. Media transmissionc. Transportd. Routinge. None of the above
77. SIP provides following functions:
Hyder khoja Page 11 5/10/202311
a. Call Setupb. Call Managementc. Capability exchange mechanismd. User locatione. All of the above f. None of the above
78. SIP works in conjunction with: Name at least 3 additional protocols.
________________ ______________________ _________________________
79. SIP uses__________________ for media transmission
a. TCPb. RTPc. UDPd. IPe. ICMP
80. SIP is a text based protocol that uses a combination of ____________and _________ for VOIP call
a. HTTP, SNMPb. SNMP, SMTPc. SMTP, FTPd. HTTP, SMTPe. HTTP, FTP
81. Show, with the help of a sketch, the encapsulation of SIP data
82. SIP uses a _____________/_______________ Model with ___________/_________.
83. List 4 essential components of SIP Architecture.
_________________ _________________ ________________ ________________
Hyder khoja Page 12 5/10/202312
84. SIP signaling messages are created by USER _________ Process and response are created by a USER _____________ Process.
84. SIP uses _________________ message to initiate a call
a. Registerb. Invitec. Ackd. Byee. Cancel
85. SIP uses ___________ message to inform the Redirect Server of the current location of the User
a. Inviteb. Registerc. ACKd. Byee. Cancel
86. Show, with the help of a Sketch, all SIP components involved in completing a SIP call
87. SIP messages consist of a ______________ and a Body
88. SIP addresses look like an ____________ address with the word __________ added in the front
89. Which of the following SIP component perform email address to IP Address translation.
a. User Agentb. Proxy Serverc. Redirect Serverd. Location Servere. Registration Server
90.The media capability information is carried in the:
a. Body of the Invite Message
Hyder khoja Page 13 5/10/202313
b. RTP packetc. SAP packetd. RSVP packete. None of the above
91. A PS determines the IP address of the callee( if it is logged on to the current site) using which protocol?
a. RIPb. ARPc. GLPd. SDPe. ICMPf. SAP
92. A PS determines the IP address of the alternate location using_________ Protocol
a. RIPb. GLPc. DNSd. SDPe. SAP
93. GLP is very similar to:
a. BGPb. OSPFc. ARPd. RIPe. RARP
94. The LS contain the:
a. The Callee Adressb. The Caller Addressc. The address of a Gateway closest to the PSTN or Cellular Network to which the
called host is attachedd. The address of the closest Redirect Servere. The Address of the closest Registration Server
VPN SECTION
1. Which Protocol is used most frequently for remote access to the Internet?
Hyder khoja Page 14 5/10/202314
(a) L2F(b) PPTP(c) L2TP(d) PPP(e) IPSec
2. Which of the following is the preferred encryption protocol for VPN(a) PPP(b) PPTP(c) L2TP(d) L2F(e) IP Sec
3. What are the four major functions of a VPN____________ _____________ ____________ _________________
4. Which of the following is a description of an Access VPN:(a) provides secure links between corporate sites using shared
infrastructure but dedicated links(b) Connects users to corporate Network using shared facilities
but dedicated connections(c) Provides a dedicated connection between corporate users(d) Provides secure shared access to corporate sites over analog,
ISDN, DSL or Cable Network(e) All of the above
5. Which of the 5 statements above in Q#3 describes an Intranet? _______6. Which of the 5 statement above describes an Extranet?_______________7. Describe the essential difference between a Voluntary Tunnel and a
compulsory Tunnel: __________________________________________8. Tunneling requires which 3 types of Protocols?____________ _______________ __________________________9. List 3 major tunneling protocols_____________________ _______________ ___________________10. Fig below shows a tunneled packet. Fill in the missing fields
11. Sketch a diagram showing an INTRANET, EXTRANET and an Access VPN.
Hyder khoja Page 15 5/10/202315
12. List 5 types of VPN Hardware;__________ __________ ___________ ____________ _____________
13. Describe at least 2 types of packet filtering techniques used in Firewalls
14. List 3 Data link Layer tunneling protocols______________ __________________ _____________________15.List 5 major features of IPSec.
VPN is a network that is _______ but ________.
A) private; public
B) private; virtual
C) public; virtual
D) none of the above
6 A VPN is physically ________ but virtually ________.
A) public; private
B) private; public
C) public; hybrid
D) none of the above
7 VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
A) SSL; tunneling
B) IPSec; SSL
C) IPSec; tunneling
D) none of the above
8 ____________ means that each IP datagram destined for private use in the organization must
Hyder khoja Page 16 5/10/202316
be encapsulated in another datagram.
A) Multicasting
B) Broadcasting
C) Tunneling
D) none of the above
15 A VPN can use _______ to guarantee privacy.
A) IPSec
B) tunneling
C) both a and b
D) none of the above
16 Tunneling is a technique in which the IP datagram is first _______ and then _______.
A) encapsulated in another datagram; encrypted
B) encrypted; encapsulated in another datagram
C) authenticated; encrypted
D) encrypted; authenticated
MPLS SECTION:
15. List 3 Applications of MPLS
_________________ _______________ ____________
16. MPLS converts(a) L2 routing into L3 Switching(b) L3 switching into L2 Routing(c) L3 Routing onto L2 Switching(d) L4 transport into L2 routing(e) None of the above
17. List 4 parameters used to determine the FEC
_____________ _______________ _______________ ____________
18. State 3 steps that must be taken by an InGress LSR to route a packet, before the actual transmission begins
Hyder khoja Page 17 5/10/202317
19. With the Static Explicit Routing in MPLS:
(a) Each LSR determines the route independently(b) Routes are manually configured(c) Routes are pre-configured for all FECs(d) Routes are dynamically determined by the INGRESS LSR at the time of
arrival of the packet(e) None of the above
20. The Label is placed:
(a) Before the L2 Header(b) After the L2 Header(c) After the L3 header(d) Between the L2 and L3 headers
21. The labels are:(a) Carried end to end(b) Removed at LSR and replaced with a new label(c) Small identifiers that contain the Ip address of the next hop(d) Stuck between L3 and L4 header(e) All of the above
22. In MPLS, LSPS are:(a) Manually configured by the Network Administrator(b) Switched paths calculated based on the L3 address.(c) Communicated in the forward direction from the Ingress LSR
to the Egress LSR(d) Pre-established based on the FEC requirements of the
customer.(e) Established using RIP protocol
23. MPLS uses______,_______ protocols to establish LSPS(a) UDP, TCP(b) RTP, RSVP(c) RSVP, RTCP(d) OSPF, SIP(e) LDP, RSVP
24. Which of the following is NOT a consideration in binding a Label to a specific FEC
(a) Destination port Numbers(b) Protocol ID(c) Network Management(d) QoS requirements
Hyder khoja Page 18 5/10/202318
(e) Differentiated Service25. A Routing Algorithm that accounts for the traffic requirements of various
flows and he resources available along various hops and through various nodes is called:
(a) OSPF Routing(b) Constrained Based Routing(c) BGP Routing(d) Router RIP(e) SIP based routing
26. LDP gathers information regarding______________, to calculate the Route along the LSP: List 3 parameters.______________ ___________________ __________________.
27. Which of the following is not a function of the LDP?(a) Assigns a Label to LSP to be used to recognized incoming
packets that belong to a given FEC(b) Inform all potential upstream nodes of the Label assigned to
this FEC(c) Learns the next hop for this LSP(d) Learn the Label that the downstream node has assigned to
this FEC.(e) Allows LSRS to learn each others capabilities(f) All of the above
28. MPLS sticks a ________bits Label:(a) 32 (b) 20(c) 24(d) 16(e) None of the above
29. MPLS COS field, sometimes copies the IP header________ field(a) Protocol ID(b) TOS(c) Length(d) TTL(e) FLAGS
30. Which of the following is NOT a feature of the MPLS Label Stacking Technique:
(a) Unlimited stacking(b) Tunnelling(c) VPN(d) First in Last out(e) Last in first out
31. Sketch a diagram showing the MPLS Protocol stack architecture.
Hyder khoja Page 19 5/10/202319
32. The LDP uses _________ for the reliable transfer of data from one LSR to another
(a) UDP(b) RTP(c) RTCP(d) TCP(e) None of the above
33. The LDP uses __________ during the discovery phase of its operation.(a) UDP(b) TCP(c) RTP(d) RTCP(e) RSVP
34. The LDP uses ___________ message to announce and maintain the presence of an LSR in a Network
(a) The Notification Message(b) The Advertisement message(c) The Session Message(d) The Invite message(e) None of the above
35. The LDP uses ___________ message to provide advisory and signal error information
(a) The advertisement(b) The notification(c) The session(d) The discovery(e) The Invite
36. The LDP uses __________ message to create, change, modify and delete labels based on a given FEC
(a) The Discovery(b) The Session(c) The invite(d) The Notification
Hyder khoja Page 20 5/10/202320
(e) The advertisement.37. List 5 steps that must be taken for data to travel through an MPLS
Network38. Draw a sketch, showing the creation of a tunnel through an MPLS
Network using Label stack39. What does FEC stands for:________________________________
Hyder khoja Page 21 5/10/202321