Error detection ata data link level is achieved by
A.
bit stuffing
B.
cyclic redundancy codes
C.
Hamming codes
D.
equalization

1 Answer

Answer :

cyclic redundancy codes

Related questions

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : Is the cyclic redundancy check better than hamming code?

Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.

Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above

Last Answer : one bit more than

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above

Last Answer : generator

Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check

Last Answer : a. cyclic redundancy check

Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check

Last Answer : A. cyclic redundancy check

Description : The probability thata singlebit will be inerror on a typical public telephone lineusing 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error ratefor a communicationline using 9-bit frames is ... to A. 0.003 B. 0.009 C. 0.991 D. 0.999 E. None of the above

Last Answer : 0.009

Description : Bit stuffing refers to a. inserting a 0 in user stream to differentiate it with a flag b. inserting a 0 in flag stream to avoid ambiguity c. appending a nipple to the flag sequence d. appending a nipple to the use data stream

Last Answer : a. inserting a 0 in user stream to differentiate it with a flag

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : The ________ modeprovides synchronizationfor the entire stream of bits must. In other words, it guarantees that the data arrive ata fixed rate. A) synchronous B) asynchronous C) isochronous D) none of the above

Last Answer : isochronous

Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above

Last Answer : can do one way data transmission only

Description : A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is a. 0111110100 b. 0111110101 c. 0111111101 d. 0111111111

Last Answer : b. 0111110101

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above

Last Answer : Cyclic

Description : The ............layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : The............ layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above

Last Answer : CRC

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)

Last Answer : (a) and (b)

Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above

Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : Define Error Detection and Correction. Mention the types of errors.

Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.

Description : Which of the following function is useful in system requiring error detection and correction codes ? (A) AND-OR (B) OR (C) AND (D) Exclusive -OR

Last Answer : Which of the following function is useful in system requiring error detection and correction codes ? (A) AND-OR (B) OR (C) AND (D) Exclusive -OR

Description : In a frame transmission, CRC stands for (A) Code Renewable Check (B) Cyclic Redundancy Check (C) Control and Refresh Code (D) Cyclic Refreshing of CPU

Last Answer : (B) Cyclic Redundancy Check

Description : In_______transmission, bits aretransmittedover asingle wire, one ata time. A) asynchronous serial B) synchronous serial C) parallel D) (a) and (b)

Last Answer : (a) and (b)

Description : How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits, and one parity bit ? a. 600 b. 800 c. 876 d. 1200

Last Answer : b. 800

Description : The layer that transmits data in the form of bit streams using electrical and mechanicalsystems is in the OSI model. a. Physical layer b. Transport Layer c. Network Layer d. Data Link Layer

Last Answer : a. Physical layer

Description : In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL

Last Answer : SCO

Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)

Last Answer : neither (a) nor (b)

Description : Which among the following represents the objectives/requirements of Data Link Layer? a. Frame Synchronization b. Error & Flow Control c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer

Last Answer : b. media access control sublayer

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

Last Answer : B. media access control sublayer

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above

Last Answer : 2

Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above

Last Answer : 0

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above

Last Answer : Hamming distance

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : Thus hamming code for the ASCII character “a” is given as ……………… A. 10111001111 B. 10111001000 C. 10111001001 D. 10111001

Last Answer : C. 10111001001