If the frame to be transmitted is 1101011011
and the CRC polynomial to be used for
generating checksum is x
4+ x + 1, then what
is the transmitted frame?
a. 11010110111011
b. 11010110111101
c. 11010110111110
d. 11010110111001

1 Answer

Answer :

c. 11010110111110

Related questions

Description : Find the transmitted code if the frame is (MSB) 1101011011 (LSB) and generator polynomial is x4 + x + 1. A. 1101011011 1110 B. 1101011111 1110 C. 1101011011 1111 D. 1101011011

Last Answer : A. 1101011011 1110

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is: a. 11001001000 b. 11001001011 c. 11001010 d. 110010010011

Last Answer : b. 11001001011

Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms

Last Answer : c. 1+x is a factor of G(x)

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is (A) 110010011001 (B) 11001001 (C) 110010011001001 (D) 11001001011

Last Answer : (D) 11001001011

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above

Last Answer : CRC

Description : In the Ethernet, the _______field is actually added at the physical layer and isnot (formally)part of the frame. A) CRC B) preamble C) address D) none of the above

Last Answer : preamble

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be: (1) (1+x) is factor of G(x) (2) (1-x) is factor of G(x) (3) (1+x2) is factor of G(x) (4) x is factor of G(x)

Last Answer : (1+x) is factor of G(x)

Description : In CRC if the data unit is 100111001 and the divisor is 1011 then what is dividend at the receiver? a. 100111001101 b. 100111001011 c. 100111001 d. 100111001110

Last Answer : b. 100111001011

Description : In SONET, for each frame, the bytes are transmitted __________. A) from left to the right, top to bottom B) from right to theleft, bottom to top C) from left to the right, bottom to top D) from right to the left, top to bottom

Last Answer : from left to the right, bottom to top

Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC

Last Answer : DDCMP does not need special hardware to final the beginning of a message

Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above

Last Answer : one bit more than

Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check

Last Answer : a. cyclic redundancy check

Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check

Last Answer : A. cyclic redundancy check

Description : Write short notes on CRC checker.

Last Answer : After receiving the data appended with the CRC it does the same modulo-2 division. If the remainder is all 0’s the CRC is dropped and the data accepted. Otherwise, the received stream of bits is discarded and the data are resent.

Description : In a frame transmission, CRC stands for (A) Code Renewable Check (B) Cyclic Redundancy Check (C) Control and Refresh Code (D) Cyclic Refreshing of CPU

Last Answer : (B) Cyclic Redundancy Check

Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 0111

Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 1110

Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above

Last Answer : differentiatedservices

Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation

Last Answer : Checksum

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length

Last Answer : b. Source address

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : Define checksum. What are the steps followedinchecksumgenerator?

Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.

Description : The _______ of a polynomial is the highest power in the polynomial. A) range B) degree C) power D) none of the above

Last Answer : degree

Description : In which layer of OSI session is first check and then data is transmitted a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : Inthe ________method, a stationthat has a frame tosend senses the line. If the line is idle, it sends immediately. If theline is not idle, it waits a random amount of time and then senses the line again. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : nonpersistent

Description : Inthe _____ Protocol, the sender sends one frame, stops until it receives confirmation from the receiver, and then sends the next frame. A) Stop-and-Wait B) Simplest C) Go-Back-N ARQ D) Selective-Repeat ARQ

Last Answer : Stop-and-Wait

Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove

Last Answer : ATM

Description : ______ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T. A) X.25 B) Frame Relay C) ATM D) none of the above

Last Answer : ATM

Description : ________ is a virtual-circuit wide-area network that was designed in response to demands fora new type of WAN in thelate1980s and early 1990s. A) X.25 B) Frame Relay C) ATM D) none of the above

Last Answer : Frame Relay

Description : A 8-Mbps tokenring has atoken holding timer value of 10 msec. What is the longest frame (assumeheader bits are negligible) that canbe sent on this ring? A. 8000 B frame B. 80,000 B frame C. 8 x 105 bit frame D. 10,000 B frame

Last Answer : 10,000 B frame

Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above

Last Answer : d. All the above

Description : Avalanche photodiode receivers can detect bits of transmitted data by receiving a. 100 photons b. 200 photons c. 2000 photons d. 300 photons

Last Answer : 200 photons

Description : ______ can be applied whenthe bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted. A) TDM B) FDM C) Both (a)or (b) D) Neither (a) or (b)

Last Answer : FDM

Description : Before data can be transmitted, they must be transformed to________. A) periodic signals B) electromagnetic signals C) aperiodic signals D) low-frequency sine waves

Last Answer : electromagnetic signals

Description : In SONET, for each byte, the bitsare transmitted ____________. A) from least significant to the most significant B) from most significant tothe least significant C) two at atime D) three at atime

Last Answer : from least significant to the most significant

Description : What is the usualnumber of bits transmitted simultaneously inparalleldata transmission used by microcomputers? A. 16 B. 9 C. 8 D. 4 E. None of the above

Last Answer : 9

Description : Avalanche photodiode receivers candetect hits of transmitted databy receiving A. 100 photons B. 200 photons C. 300 photons D. 400 photons E. None of the above

Last Answer : 200 photons