Assignment 1290
Assignment 1290
Assignment 1290
Your submission must be completely your own work. If it is suspected that you
have accessed or received assistance, e.g, from an electronic source or another
person, the matter can be investigated as an alleged breach of the UOW College
Academic Integrity and Student Conduct Policy, in accordance with the
Procedure for Managing Alleged Student Misconduct. Please note, as part of
this investigation, you may be required to undergo an oral examination to verify
your understanding of the assessment content.
2. Draw, in chart form, the voltage representation of the following bit sequence 10011011
using different digital encoding schemes; NRZ-L, NRZI, Manchester, differential
Manchester, and Bipolar AMI. (5 marks)
(Note: Please clearly identify the voltage levels for each scheme)
3. Multiplexing combines multiple analog and digital signals into one signal to forward
data over a shared medium. Moreover, time division multiplexing (TDM) divides the
transmission time on a medium among users and comes in two basic forms. Use
appropriate diagrams and illustrations to explain different forms of TDM. (5 marks)
4. A company has two offices located approximately one (1) mile apart. The company
requires data transfer between these two offices at speeds up to 100 Mbps. List as many
solutions as possible for interconnecting two offices. Justify the answers by showing
understanding of technical, financial, and political feasibilities. (5 marks)
5. Code division multiplexing allows multiple users to share a common set of frequencies
by assigning a unique digital code to each user. Let us consider an example of two (2)
mobile users A and B who use code division multiplexing. Mobile user A has been
assigned a binary code of 11110000, and Mobile user B has been assigned a binary
Page 1 of 3
DPIT127 Networks and Communications
Final Assessment (Spring Session 2020)
code 10101010. The mobile user A transmits a 1, while Mobile user B transmits a 0.
Show the sum of products that results and your calculations. (5 marks)
6. Using the flooding technique on the network graph shown in the figure, how many
packets will be created if a packet originates at node A and the network hop limit is set
to two? The cost of each path in the network is shown in figure below. (5 Marks)
7. System development life cycle is a methodology or a plan for a structured approach for
the development of a successful business plan. Explain the different phases of system
development life cycle (SDLC) in detail. (5 marks)
8. Explain different types of substitution-based ciphers used for data encryption with the
help of diagrams. (5 marks)
9. To protect data from catastrophic disk failure, disk drivers support one of the redundant
arrays of independent disks (RAID) techniques. What are some of the more common
RAID techniques used to store this information across multiple disks? (5 marks)
10. What are the main characteristics of a circuit switched and packet switched network?
Explain the advantages and disadvantages for each network. Justify your answer with
appropriate diagrams. (5 marks)
1. When designing or updating a computer network, the selection of one type of media
over another is an important issue to justify time, effort and cost invested. Please
explain these different media selection criteria. Provide two examples for each type of
(wireless/wired) media, using figures to justify your reason of choice.
(10 marks)
Page 2 of 3
DPIT127 Networks and Communications
Final Assessment (Spring Session 2020)
2. A company has 230 workstations in their head office and the IT manager would like to
assign a subnetwork address for each department. She wants to create 8 subnets using
the 172.56.42.0/24 block. How will she compute the subnetwork requirement? Clearly
identify the network ID, broadcast ID and host IDs for each subnet. (10 marks)
4. Medium access control protocols allow devices to “take turns” at transmitting data.
Two major types of medium access control protocols are: contention-based and round
robin protocols. Use a diagram/flowchart or otherwise explain how the carrier sense
multiple access with collision detection (CSMA/CD) and (CSMA/CA) work and how
they differentiate from each other. (10 marks)
5. Wireless communication transmits digital data using electromagnetic waves, where air
is the medium. Please discuss in detail the advantages and challenges faced by Wireless
Networks. (10 marks)
Page 3 of 3