_______ can detect burst error of length less
than or equal to degree of the polynomial
and detects burst errors that affect odd
number of bits.
a. Hamming Code
b. CRC
c. VRC
d. None of the above

1 Answer

Answer :

b. CRC

Related questions

Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms

Last Answer : c. 1+x is a factor of G(x)

Description : Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be: (1) (1+x) is factor of G(x) (2) (1-x) is factor of G(x) (3) (1+x2) is factor of G(x) (4) x is factor of G(x)

Last Answer : (1+x) is factor of G(x)

Description : The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is: a. 11001001000 b. 11001001011 c. 11001010 d. 110010010011

Last Answer : b. 11001001011

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : A simple parity-check code can detect __________ errors A. an even-number of B. two C. no errors D. an odd-number of

Last Answer : D. an odd-number of

Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above

Last Answer : Hamming distance

Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above

Last Answer : B. Hamming distance

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : A burst error means that two or more bits in the dataunit havechanged. A) double-bit B) burst C) single-bit D) none of the above

Last Answer : burst

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called _____ a. random error b. burst error c. inverted error d. double error

Last Answer : b. burst error

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ A. random error B. burst error C. inverted error D. double error

Last Answer : B. burst error

Description : Which method is used to detect double errors and pinpoint erroneous bits. a. Even parity method b. Odd parity method c. Check sum method. d. All of these

Last Answer : c. Check sum method.

Description : The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is (A) 110010011001 (B) 11001001 (C) 110010011001001 (D) 11001001011

Last Answer : (D) 11001001011

Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001

Last Answer : c. 11010110111110

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : A simpleparity-check code can detect__________ errors. A) an even-number of B) two C) no errors D) an odd-number of

Last Answer : an odd-number of

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : The _______ of a polynomial is the highest power in the polynomial. A) range B) degree C) power D) none of the above

Last Answer : degree

Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above

Last Answer : CRC

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : Write short notes on VRC and LRC.

Last Answer : Error detection - vertical redundancy check (VRC) often called a parity check. In V R C , a redundant bit called a parity bit, is appended to every data unit so that the total number of 0's in the ... , a block of bits is divided into rows and a redundant row of bits is added to the whole block.

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : Thus hamming code for the ASCII character “a” is given as ……………… A. 10111001111 B. 10111001000 C. 10111001001 D. 10111001

Last Answer : C. 10111001001

Description : Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error. a. t + 1 b. t c. t - 2 d. t / 2

Last Answer : b. t

Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check

Last Answer : a. cyclic redundancy check

Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check

Last Answer : A. cyclic redundancy check

Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above

Last Answer : 0

Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above

Last Answer : one bit more than

Description : Avalanche photodiode receivers can detect bits of transmitted data by receiving a. 100 photons b. 200 photons c. 2000 photons d. 300 photons

Last Answer : 200 photons

Description : The VPIof an NNI is _______ bits in length. A) 8 B) 12 C) 16 D) 24

Last Answer : 12

Description : The VPIof a UNI is _______ bits in length. A) 8 B) 12 C) 16 D) 24

Last Answer : 8

Description : Of the following statements, which best distinguishes ordinary negligence from gross negligence? a. The more material the undetected error the greater the likelihood of ordinary negligence. ... care denotes ordinary negligence, whereas failure to exercise minimal care indicates gross negligence

Last Answer : Failure to exercise reasonable care denotes ordinary negligence, whereas failure to exercise minimal care indicates gross negligence

Description : How many bytes of data can be sent in 15 seconds over a serial link with baud rate of 9600 in asynchronous mode with odd parity and two stop bits in the frame? a. 10,000 bytes b. 12,000 bytes c. 15,000 bytes d. 27,000 bytes

Last Answer : b. 12,000 bytes

Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above

Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used

Description : Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is (A) 5 (B) 10 (C) 8 (D) 9

Last Answer : Answer: Marks to all

Description : In a binary Hamming code the number of check digits is r then number of message digits is equal to: (A) 2r-1 (B) 2r-r-1 (C) 2r-r+1 (D) 2r+r-1

Last Answer : (B) 2r-r-1

Description : Find the transmitted code if the frame is (MSB) 1101011011 (LSB) and generator polynomial is x4 + x + 1. A. 1101011011 1110 B. 1101011111 1110 C. 1101011011 1111 D. 1101011011

Last Answer : A. 1101011011 1110

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : Define Error Detection and Correction. Mention the types of errors.

Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above

Last Answer : 2

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : . ________ is the process in which the receiver tries to guess the message by using redundant bits A. Connection-Oriented Service B. Forward error correction C. both a and b D. Confirm

Last Answer : B. Forward error correction

Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC

Last Answer : DDCMP does not need special hardware to final the beginning of a message

Description : In the Ethernet, the _______field is actually added at the physical layer and isnot (formally)part of the frame. A) CRC B) preamble C) address D) none of the above

Last Answer : preamble

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field