Information and Communication Technologies T209-A Review Session Prepared By: Dr. Abdulrahman Awadhi B.Sc., Ph.D.

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

Intermediate TCP/IP TCP Operation.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
DIGITAL COMMUNICATIONS.  The modern world is dependent on digital communications.  Radio, television and telephone systems were essentially analog in.
Chapter 2 Network Models.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Signalling Systems System which allows various network components to exchange information –In particular, it supports call / connection control network.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
Protocols and the TCP/IP Suite
Chapter 2 Fundamentals of Data and Signals
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Introduction To Networking
Lecture 3 Data Encoding and Signal Modulation
Chapter 2: Fundamentals of Data and Signals. 2 Objectives After reading this chapter, you should be able to: Distinguish between data and signals, and.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Chapter 2 Network Models.
1 Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
COMPUTER NETWORKS.
Communications IB physics.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Data Communications & Computer Networks, Second Edition1 Chapter 2 Fundamentals of Data and Signals.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
3 SIGNALLING Analogue vs. digital signalling oRecap advantages and disadvantages of analogue and digital signalling oCalculate signal transmission rates.
Mukesh N. Tekwani Elphinstone College Mumbai
1 Version 3.0 Module 11 TCP Application and Transport.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Eighth Edition.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Computer Networks.  Which is the best definition of a circuit switched network?  An electric circuit where the connections get switched based on who.
Print ServerWeb ServerDatabase of Server It is a computer that Handle the data flows Between the printer and the users’ Computer. Is a computer that hold.
Two computers are joined by 300 metres of cable. If a packet travels along the cable at a speed of 1.77×10 8 m/s, how long will it take for a packet to.
Information and Communication Technologies T209-A Revision Session Prepared By: Dr. Abdulrahman Awadhi B.Sc., Ph.D. Tel:
Information and Communication Technologies T209-A Review Session Prepared By: Dr. Abdulrahman Awadhi B.Sc., Ph.D.
What is the database of a server. Web server. Print Server
Date: April. 13, Monday Evening.
Multiple Access Methods
Chapter Two Fundamentals of Data and Signals
1) By using hamming code (even – parity), Show the correct binary number that transmitted by the sender if the receiver received binary number.
The OSI Model and the TCP/IP Protocol Suite
Layered Architectures
Prepared By: Dr. Abdulrahman Awadhi
The OSI Model and the TCP/IP Protocol Suite
Multiple Access Methods
Analog Transmission Example 1
Multiple Access Methods
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

Information and Communication Technologies T209-A Review Session Prepared By: Dr. Abdulrahman Awadhi B.Sc., Ph.D.

Information and Communication Technologies Part 1: Answer the following True/False statements (put T or F answers in the brackets): 2.5G is an intermediate status between the second generation and the third generation mobile phone systems. Answer [T] A bridge divides a LAN into separate collision domains. Answer [T]

Information and Communication Technologies 8-bit binary equivalent of denary 68 is Answer [F] 3G cellular phone systems use FDMA technology. Answer [F] The RAD Action object is equivalent to the I/O symbol in the flowchart. Answer [F]

Information and Communication Technologies The term knowledge can be defined as information coded for subsequent processing, generally by a computer. Answer [F]

Information and Communication Technologies Part 2: Answer the following questions in the space given below each question. Compression is a process that is often used when files are transferred across the Internet (and sometimes when they are stored, as well). What is compression and what is meant by lossless compression and lossy compression methods. Give an example on each method. Lossless compression is a process which compresses the original binary data in such a way that it can be reconstructed exactly later on (e.g. ZIP compression). Lossy compression is a process which compresses the original binary data in such a way that it cannot be reconstructed exactly later on (e.g. MP3 coding)

Information and Communication Technologies In each country there are several companies all offering a mobile telephone system in the same physical region. Each of these companies uses radio signals to connect its subscribers’ mobile phones to its base stations. Explain how do these companies distinguish between the calls being made by their users and those being made by other users? The radio spectrum available for GSM telephony has been divided up into various bands, and each company has been allocated just some of these bands. Thus the companies distinguish between their subscribers and those of other companies by using different sets of frequencies for the calls.

Information and Communication Technologies In the context of computers, what are (a) a bit, (b) a byte, and (c) an octet and how are they related to each other? A bit is a binary digit. That is, it is either 1 or 0. A byte is a group of 8 bits. An octet is another name for a byte.

Information and Communication Technologies What is meant by error detection and error correction in the context of manipulating and transmitting binary data? Error detection is a process whereby pieces of binary data are checked while they are being manipulated or transmitted, in order to discover whether an error has occurred. If an error is detected, a special action usually follows: for example a request for retransmission of the binary data, or the display of an error message. Error correction is a process whereby pieces of binary data are checked while they are being manipulated or transmitted, in order to discover whether an error has occurred. If an error is detected, it is corrected.

Information and Communication Technologies Briefly explain the beauty or usefulness of spectrogram for speech recognition. The power of spectrogram for speech recognition lies in the fact that it helps in tracking the shift of the formant frequencies with time – that is, the variation in the resonant frequency of the vocal tract during an utterance of speech. Since each utterance has its own distinct set of formant contours, hence this provides another acoustical characteristic to help recognize individual phonemes, and hence words.

Information and Communication Technologies What are the main duties of the TCP and IP layers in the TCP/IP protocol stack? In OSI terms, TCP is the transport layer protocol and is concerned with end-to-end issues rather than routing messages. It provides a reliable service in the sense that it guarantees error-free transportation of messages between source and destination. In OSI terms, IP is the network layer protocol and is concerned with routing messages across the network. It provides no guarantee that it will succeed, although it tries its best i.e. it provides a "best- effort" service.

Information and Communication Technologies Briefly discuss 2 main features of the air interface of the 2G GSM phone system. What does GPRS stand for? How does GPRS make GSM a 2.5G system? The air interface of the GSM phone system uses the TDMA technology. It uses 8 time slots instead of 6 as used by the North American TDMA system. GPRS stands for General Packet Radio System. It makes GSM a 2.5G system by providing it limited Data Communication capability such as the SMS data feature.

Information and Communication Technologies Radio signals are modulated onto carriers. Explain the terms ‘carrier’ and ‘modulation’ in this context. In the context of this question, the carrier will be a radio wave. Modulation is the variation of some characteristic of this radio wave (such as its amplitude, or its frequency) in accordance with the value at each instant of another signal (called the message signal) in order to make the message signal more suitable for transmission. For example, the message signal may have only component frequencies which are much lower than radio frequencies, but may need to be sent as a radio signal. Modulation makes this possible.

Information and Communication Technologies Part 3: Answer 2 out of 3 of the following questions in the space given below each question. Consider the following diagram: Idealized frequency spectrum of an analogue signal with cut-off frequencies f1 and f2 Let f1=10KHz and f2=5KHz. What is the bandwidth of the above signal? Bandwidth= f1 – f2 =10KHz-5KHz=5KHz What is the minimum sampling frequency in order to convert the above signal into digtail form? minimum sampling frequency=2*Bandwidth=2*5KHz=10KHz;

Information and Communication Technologies Given a propagation velocity of 1.77x10 8 m/s and a delay of 3.5 µS introduced by each repeater, what is the round trip delay for two computers at either end of a 2500 m link that includes three repeaters? The time travel between two computers is equal to the sum of the time required to travel along the cable and the delay introduced by the three repeaters. This is given by: One-way time (t)= (d/v) + (number of repeaters x delay) = (2500/1.77x10 8 ) + (3x3.5x10 -6 )=24.6 µS The round trip delay is twice this value: 49.2 µ S.

Information and Communication Technologies Consider a sinusoidal signal. Answer the following questions in this regard: What is the general equation for a sinusoidal and a cosinusoidal signal? X(t)=A sin(wt) is a sinusoidal signal Z(t)=B cos(wt) is a cosinusoidal signal Write the general equation for a sinusoidal signal with 0.75 the amplitude of the signal in part a). Y(t)=0.75A sin(wt). Write the general equation for a sinusoidal signal with half the angular frequency of the signal in part a). Y(t)=A sin(ω/2t). Write the general equation for a sinusoidal signal with an advance of π/4 radians. Y(t)=A sin(wt + π/4)

Information and Communication Technologies Quiz 2: Part 1: Read all the answers and circle the most correct statement: The ______ attempts to explore the physical aspect of ICT system to enable users to manipulate them in ways that are more similar to the ways in which we interact with one another and with the objects in the real world A.virtual reality B.augmented reality C.visual reality D.physical reality E.none of the above Answer B

Information and Communication Technologies the CSLU Toolkit is classed as a ___________ recognition system A.continuous-speech B.speaker-dependent C.speaker-enrolment D.speaker-independent E.none of the above Answer D

Information and Communication Technologies suppose that we have a signal with amplitude = 2.5 and the frequency = 30 Hz. Then the sinewave expression of this signal is : A.x = 5 sin (20 л t) B.x = 2.5 sin (30 л t) C.x = 2.5 sin (60 л t) D.x = 5 sin (40 л t) E.none of the above Answer C

Information and Communication Technologies __________ RAD object provides a means to execute program code directly A.generic B.action C.media D.start E.none of the above Answer B

Information and Communication Technologies The maximum Ethernet frame size is: A.1518 bytes B.1518 bits C.64 bytes D.512 bytes E.None of the above Answer A

Information and Communication Technologies The minimum Ethernet frame size is: A.1518 bytes B.64 bits C.64 bytes D.512 bytes E.None of the above Answer C

Information and Communication Technologies The repeater is related to ___________ layer A.physical B.data link C.network D.transport E.None of the above Answer A

Information and Communication Technologies The bridge is related to ______________ layer physical data link Network transport None of the above Answer B

Information and Communication Technologies The Gateway is related to _________________ layer A.physical B.data link C.network D.transport E.None of the above Answer C

Information and Communication Technologies The SNMP protocol is related to _____________________ layer A.physical B.data link C.application D.transport E.None of the above Answer C

Information and Communication Technologies Part 2: Fill the spaces that related to the following questions: 1- interfacing is a type of human interface architecture that uses more than one modaloty of communication between user and system. 2- recognition system recognizes larger vocabulary than ______ recognition system. 3- the time-domain and frequency-domain representation can be combined into a. 4- the black ( or dark grey) bands in the spectrogram are called. 5- the diagrams convey the sequential relationship between tasks. Answer 1(9), 2(6)&(4), 3(5), 4(10), 5(2) (1) Line spectrum (2) Flow chart (3) Speech-based (4) speaker- independent (5) Spectrogram (6) Speaker-enrolment (7) Frames (8) HTD (9) Multimodal (10) Formants

Information and Communication Technologies 1- The (2) is defined in (3), rather than (10), because Ethernet can operate at different (8). 2- (6) provides a (9). 3- (11) not provides a (7). 4- (14) provides a (13). 5- Whereas (1) provides (12), the (15), provides (4). 6- Whereas (5) provides reliable service, the 15), provides (13). (1) TCP (2) slot time (3) bits (4) connection less service (5) TCP (6) IP (7) best effort service (8) bit-rates (9) best effort service (10) Time (11) TCP (12) connection oriented service (13) best effort service (14) CSMA/CD (15) UDP

Information and Communication Technologies Part 3: Answer the following questions: what are the main conditions that yield problems in automatic speech recognition? Speech style Extraneous noise list two of the HTI system ? GUI Virtual reality

Information and Communication Technologies what is an ultimate goal of HTC? The primary goal of HTC is to design and develop interfaces that enable natural and straightforward ways of communication between users and machines such as speech- based interfacing

Information and Communication Technologies Briefly show the three main stages of the isolated-word recognition system? a)Stage 1 consist of capturing a digital representation of the spoken word, this representation is referred to as the waveform. b)Stage 2 (spectrogram) converts the waveform into a series of elemental sound units, referred to as phonemes. so as to classify the words prior to recognition c)Stage 3 (time-aligned phoneme categorization graph) uses various forms of mathematical analysis to estimate the most likely word consistent with the series of recognized phonemes

Information and Communication Technologies What are the advantages to organizations of using computer networks? A- More efficient use of resources through sharing network elements such as printers and scanners B- Purchasing networked application software, which may be more economical than buying individual software packages C- Access to multiple sources of information D- Ability to transfer information across the network E- Opportunity for collaborative work using and conferencing facilities and to keep employees informed of the organization’s business through an intranet F- Remote access to the organization by customers, suppliers and field workers through an extranet

Information and Communication Technologies Briefly discuss the round trip delay?? The worst case scenario occurs when a frame transmitted at one end of a collision domain collides with another frame at the farthest end This is the worst case because this is the longest period of time for a collision to be detected by the transmitting computer, which has to wait for notice of the collision to propagate back. This time period is called the round trip delay, because it is the time it takes for a frame to take a ‘round trip’ to the furthest limit of the network

Information and Communication Technologies Why is it that, once a computer has monitored for the slot time, and detected no collisions, it can transmit the rest of its frame without risk of collision? If no collision has been detected in the slot time, then no other computer, even the one at the furthest limits of the collision domain, has tried to transmit. Once this point is reached, then all other computers will detected the transmitting computer’s frame through the carrier-sense (CS) part of the protocol, as by this time the frame will have reached all nodes within the same collision domain

Information and Communication Technologies Why does separating the attempts to transmit, of two computers, by at least one slot time ensure they do not collide? The slot time is chosen to allow a frame to propagate across the extremes of a collision domain and back again; called the round trip delay. Therefore, if one computer waits for one slot time before beginning to transmit, it is certain to detect if another computer had started to transmit one slot time earlier

Information and Communication Technologies Briefly discuss the SNMP protocol? Simple Network Management Protocol (SNMP), a standard protocol that specifies how information is carried between the agent and the network management software.

Information and Communication Technologies mention the two functions that related to RAD generic object? First they can generate spoken prompts using either a text-to-speech synthesizer or by playing pre-recorded speech waveforms Second they can be used to recognize spoken words …

Information and Communication Technologies Part 4: Answer the following problems: (you should show all the steps required to solve the questions) suppose that we have an analogue signal covers the frequency range from 3 kHz to 11.5 kHz what is the bandwidth of the signal ? bandwidth = 11.5 – 3 = 8.5 kHz = 8500 Hz what is the minimum sampling rate required for a signal ? sampling rate = 2 x bandwidth = 2 x 8500 = Hz = 17 kHz

Information and Communication Technologies What is the maximum round trip delay for an Ethernet frame operating at 10 Mbit/s? Delay = number of bits sent / bit rate = 512 / 10 × 10 6 seconds = 1.2 µs

Information and Communication Technologies an analogue-to-digital converter has an input voltage range of V. if the resolution of the converter is 5 bits. What is the quantization interval? quantization interval = 11 / 2 5 = 11 / 32 = 0.34 volt What is the peak level of quantization noise produced by the converter defined above? peak quantization noise = 0.34 / 2 = 0.17

Information and Communication Technologies suppose that we have hotels reservation system. this system deals with four famous hotels. the different types of hotels the client wishes to be available (with the price of single room per night ) are: Meridian 55 KD Sheraton 50 KD Safir International 45 KD Crown Plaza 40 KD Whereas the Safir Iternational and Crown Plaza hotels have only a single room, Meridian and Sheraton hotels can have both single room or suite. The suites prices are as following: Meridian 70 KD Sheraton 65 KD The voice recognition interface of this hotels reservation system will provide the following functions: Be friendly and welcoming Ask the user to enter the hotel type Check if they want a single room or suite in case if they choose Meridian or Sheraton hotels Confirm that the hotel reservation is correct Tell the user the price of this hotel If the user agree, then the system print the reservation voucher of this hotel and finish this transaction in a friendly manner Now you should do the following : Clearly draw the flowchart of this hotels reservation system ? Clearly label the symbols of this flowchart ? Shows how errors are handled