Podcast
Questions and Answers
In data communications, how many modes of transmission are there?
In data communications, how many modes of transmission are there?
What are the types of media used in data communications?
What are the types of media used in data communications?
How are data communications topologies organized?
How are data communications topologies organized?
What may members of a network have in terms of relationships?
What may members of a network have in terms of relationships?
Signup and view all the answers
What is a digital signal defined as?
What is a digital signal defined as?
Signup and view all the answers
Which coding system is an example of text coding?
Which coding system is an example of text coding?
Signup and view all the answers
What did IBM design as one of the first digital communications codes?
What did IBM design as one of the first digital communications codes?
Signup and view all the answers
How many bits does ASCII use for its code?
How many bits does ASCII use for its code?
Signup and view all the answers
What was used for error detection in EBCDIC?
What was used for error detection in EBCDIC?
Signup and view all the answers
What is the purpose of the 84th character, the block parity character, in the data block?
What is the purpose of the 84th character, the block parity character, in the data block?
Signup and view all the answers
What is the main difference between a cyclic code and a checksum?
What is the main difference between a cyclic code and a checksum?
Signup and view all the answers
In Binary Synchronous Communication protocol, what does control depend on?
In Binary Synchronous Communication protocol, what does control depend on?
Signup and view all the answers
What is the primary function of bit patterns in bit-oriented protocols?
What is the primary function of bit patterns in bit-oriented protocols?
Signup and view all the answers
What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?
What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?
Signup and view all the answers
What was the primary focus of the first data transmission code mentioned in the text?
What was the primary focus of the first data transmission code mentioned in the text?
Signup and view all the answers
What is an example of a character-based protocol mentioned in the text?
What is an example of a character-based protocol mentioned in the text?
Signup and view all the answers
What is one distinguishing feature of Bi-Sync protocol?
What is one distinguishing feature of Bi-Sync protocol?
Signup and view all the answers
What is a characteristic of bit-oriented protocols?
What is a characteristic of bit-oriented protocols?
Signup and view all the answers
What distinguishes cyclic codes from linear codes?
What distinguishes cyclic codes from linear codes?
Signup and view all the answers
What was one reason cited in the text for duplex operation in Bi-Sync protocol?
What was one reason cited in the text for duplex operation in Bi-Sync protocol?
Signup and view all the answers
Data communications topologies are organized as ______, ______, or many-to-many
Data communications topologies are organized as ______, ______, or many-to-many
Signup and view all the answers
In data communications, there are three modes of transmission: ______, half-duplex, and duplex
In data communications, there are three modes of transmission: ______, half-duplex, and duplex
Signup and view all the answers
A communications channel may consist of a communications circuit, which can be either a hardware configuration or a “virtual” ______
A communications channel may consist of a communications circuit, which can be either a hardware configuration or a “virtual” ______
Signup and view all the answers
In this mode, communication occurs only in one direction—never in the opposite direction; in figure 1-2 it is from Station A to ______
In this mode, communication occurs only in one direction—never in the opposite direction; in figure 1-2 it is from Station A to ______
Signup and view all the answers
An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character
An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character
Signup and view all the answers
Many times the CRC-16 or CRC-CCITT is called a ______; however, they are actually cyclic codes, whereas a checksum was originally designed as a linear code
Many times the CRC-16 or CRC-CCITT is called a ______; however, they are actually cyclic codes, whereas a checksum was originally designed as a linear code
Signup and view all the answers
Some of these codes are cyclic, some are linear, some are quasi-cyclic, and some are ______
Some of these codes are cyclic, some are linear, some are quasi-cyclic, and some are ______
Signup and view all the answers
One example of a character-based protocol is Binary Synchronous Communication. The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
One example of a character-based protocol is Binary Synchronous Communication. The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
Signup and view all the answers
Bit-oriented protocols use a concept called framing, where there are ______ before and after the information frame
Bit-oriented protocols use a concept called framing, where there are ______ before and after the information frame
Signup and view all the answers
The protocol only allows the frame to have this pattern at its start and ______
The protocol only allows the frame to have this pattern at its start and ______
Signup and view all the answers
In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______
In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______
Signup and view all the answers
The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that ______
The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that ______
Signup and view all the answers
The first data transmission code devoted more overhead to the error-detection scheme than to the data ______
The first data transmission code devoted more overhead to the error-detection scheme than to the data ______
Signup and view all the answers
The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______
The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______
Signup and view all the answers
The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
Signup and view all the answers
The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
Signup and view all the answers
ASCII is a ______ code
ASCII is a ______ code
Signup and view all the answers
IBM 4 of 8 Code allowed error detection on a ______ basis
IBM 4 of 8 Code allowed error detection on a ______ basis
Signup and view all the answers
The International Telegraphic Alphabet #5 is also known as ______
The International Telegraphic Alphabet #5 is also known as ______
Signup and view all the answers
The International Telegraphic Alphabet #5 does not make use of letter frequencies, as did the Morse code, the ITA2 Telegraph Code, and the IBM 4 of 8 Code. It does, however, use a numerically arranged code, in which the alphabet is in ascending order, which permits sorting operations and the like. ASCII is a ______ code.
The International Telegraphic Alphabet #5 does not make use of letter frequencies, as did the Morse code, the ITA2 Telegraph Code, and the IBM 4 of 8 Code. It does, however, use a numerically arranged code, in which the alphabet is in ascending order, which permits sorting operations and the like. ASCII is a ______ code.
Signup and view all the answers
The parity bit was used for a number of years; however, the technological advantages to using an 8-bit data byte eliminated the need to use the B7 bit for parity. Today when parity is used, another bit is added to the 8 bits as the parity bit, making the signal 9 bits in ______.
The parity bit was used for a number of years; however, the technological advantages to using an 8-bit data byte eliminated the need to use the B7 bit for parity. Today when parity is used, another bit is added to the 8 bits as the parity bit, making the signal 9 bits in ______.
Signup and view all the answers
Using 7 bits of an 8-bit structure, as ASCII does, will leave 1 bit extra and the parity bit is added to the 8-bit character, making it ______ bits.
Using 7 bits of an 8-bit structure, as ASCII does, will leave 1 bit extra and the parity bit is added to the 8-bit character, making it ______ bits.
Signup and view all the answers
The coding begins at U+0000 with standard ASCII characters, and then continues with Greek, Cyrillic, Hebrew, Arabic, Indic, and other ______.
The coding begins at U+0000 with standard ASCII characters, and then continues with Greek, Cyrillic, Hebrew, Arabic, Indic, and other ______.
Signup and view all the answers
Parity means to count the number of 1s in a ______.
Parity means to count the number of 1s in a ______.
Signup and view all the answers
The vertical character format mentioned previously is based on the punched cards used in early data entry and programming Because punched cards contained 80 columns and historically most data was on these cards, transmissions were in an 80-character ______.
The vertical character format mentioned previously is based on the punched cards used in early data entry and programming Because punched cards contained 80 columns and historically most data was on these cards, transmissions were in an 80-character ______.
Signup and view all the answers
Fixed-length character representations, of which ASCII and EBCDIC are examples, came about in the early 1960s and are still in wide use today. However ASCII was designed for English and, as communications are now global, there are many languages that require a larger number than 128 ______.
Fixed-length character representations, of which ASCII and EBCDIC are examples, came about in the early 1960s and are still in wide use today. However ASCII was designed for English and, as communications are now global, there are many languages that require a larger number than 128 ______.
Signup and view all the answers
Because punched cards contained 80 columns and historically most data was on these cards, transmissions were in an 80-character ______.
Because punched cards contained 80 columns and historically most data was on these cards, transmissions were in an 80-character ______.
Signup and view all the answers
Most computers using ASCII transmit 8 bits and use a ninth bit for parity, if ______ is used.
Most computers using ASCII transmit 8 bits and use a ninth bit for parity, if ______ is used.
Signup and view all the answers
Data communications topologies are organized as ______, ______, or many-to-many
Data communications topologies are organized as ______, ______, or many-to-many
Signup and view all the answers
Members of a network may have defined relationships: they may have no ranking or they may be ______
Members of a network may have defined relationships: they may have no ranking or they may be ______
Signup and view all the answers
There are three modes of transmission: ______, half-duplex, and duplex
There are three modes of transmission: ______, half-duplex, and duplex
Signup and view all the answers
A communications channel may consist of a communications circuit, which can be either a hardware configuration or a “virtual” ______
A communications channel may consist of a communications circuit, which can be either a hardware configuration or a “virtual” ______
Signup and view all the answers
ASCII is a 7-bit code. Its arrangement is well thought out; particularly in light of the technology available at the time it was designed. It was usually transmitted as an ______-bit signal with the “Most Significant Bit” reserved for parity—an error detection scheme
ASCII is a 7-bit code. Its arrangement is well thought out; particularly in light of the technology available at the time it was designed. It was usually transmitted as an ______-bit signal with the “Most Significant Bit” reserved for parity—an error detection scheme
Signup and view all the answers
The difference between uppercase and lowercase is ______
The difference between uppercase and lowercase is ______
Signup and view all the answers
ASCII was designed for English and, as communications are now global, there are many languages that require a larger number than 128 ______
ASCII was designed for English and, as communications are now global, there are many languages that require a larger number than 128 ______
Signup and view all the answers
An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character
An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character
Signup and view all the answers
In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______
In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______
Signup and view all the answers
The International Telegraphic Alphabet #5 does not make use of letter frequencies, as did the Morse code, the ITA2 Telegraph Code, and the IBM 4 of 8 Code. It does, however, use a numerically arranged code, in which the alphabet is in ascending order, which permits sorting operations and the like. ASCII is a ______ code
The International Telegraphic Alphabet #5 does not make use of letter frequencies, as did the Morse code, the ITA2 Telegraph Code, and the IBM 4 of 8 Code. It does, however, use a numerically arranged code, in which the alphabet is in ascending order, which permits sorting operations and the like. ASCII is a ______ code
Signup and view all the answers
How are data communications topologies organized?
How are data communications topologies organized?
Signup and view all the answers
What is a characteristic of bit-oriented protocols?
What is a characteristic of bit-oriented protocols?
Signup and view all the answers
In data communications, there are three modes of transmission: ______, half-duplex, and duplex
In data communications, there are three modes of transmission: ______, half-duplex, and duplex
Signup and view all the answers
The coding begins at U+0000 with standard ASCII characters, and then continues with Greek, Cyrillic, Hebrew, Arabic, Indic, and other ______ scripts
The coding begins at U+0000 with standard ASCII characters, and then continues with Greek, Cyrillic, Hebrew, Arabic, Indic, and other ______ scripts
Signup and view all the answers
What is a digital signal defined as?
What is a digital signal defined as?
Signup and view all the answers
Parity means to count the number of 1s in a ______.
Parity means to count the number of 1s in a ______.
Signup and view all the answers
An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character
An 84th character, called the block parity character, was added to the end of the transmitted block to determine if parity was met for all the characters in the block, parity was determined horizontally for the ______ row by counting the 1s in the 83 counted columns and the result was compared to the vertical parity bit for the block parity character
Signup and view all the answers
The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______
The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______
Signup and view all the answers
In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______
In framing, there is a binary pattern that is the start delimiter. There are also binary patterns that indicate the addressing and what type of frame it is, as well as some method of sequence numbering followed by the ______
Signup and view all the answers
Bit-oriented protocols use a concept called framing, where there are ______ before and after the information frame
Bit-oriented protocols use a concept called framing, where there are ______ before and after the information frame
Signup and view all the answers
The protocol only allows the frame to have this pattern at its start and ______
The protocol only allows the frame to have this pattern at its start and ______
Signup and view all the answers
The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that ______
The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that ______
Signup and view all the answers
The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
The IBM Bi-Sync protocol, one of the first and most widely used of the proprietary protocols, was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner. The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
Signup and view all the answers
In data communications, there are three modes of transmission: ______, half-duplex, and duplex
In data communications, there are three modes of transmission: ______, half-duplex, and duplex
Signup and view all the answers
The first data transmission code devoted more overhead to the error-detection scheme than to the data ______
The first data transmission code devoted more overhead to the error-detection scheme than to the data ______
Signup and view all the answers
The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
The Bi-Sync protocol is character-based; control depends on certain character combinations, rather than on ______
Signup and view all the answers
The protocol only allows the frame to have this pattern at its start and ______
The protocol only allows the frame to have this pattern at its start and ______
Signup and view all the answers
The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______
The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less ______
Signup and view all the answers
What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?
What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?
Signup and view all the answers
In data communications, how many modes of transmission are there?
In data communications, how many modes of transmission are there?
Signup and view all the answers
What types of media are used in data communications?
What types of media are used in data communications?
Signup and view all the answers
What are the organized topologies in data communications?
What are the organized topologies in data communications?
Signup and view all the answers
What does the Bi-Sync protocol control depend on?
What does the Bi-Sync protocol control depend on?
Signup and view all the answers
What type of error-detection code may be called a checksum?
What type of error-detection code may be called a checksum?
Signup and view all the answers
How is the efficiency of a checksum in detecting errors compared to a cyclic code?
How is the efficiency of a checksum in detecting errors compared to a cyclic code?
Signup and view all the answers
What distinguishes CRC-16 or CRC-CCITT from a checksum?
What distinguishes CRC-16 or CRC-CCITT from a checksum?
Signup and view all the answers
What is one distinguishing feature of Bi-Sync protocol?
What is one distinguishing feature of Bi-Sync protocol?
Signup and view all the answers
What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?
What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?
Signup and view all the answers
What is the purpose of the 84th character, the block parity character, in the data block?
What is the purpose of the 84th character, the block parity character, in the data block?
Signup and view all the answers
What is the International Telegraphic Alphabet #5 also known as?
What is the International Telegraphic Alphabet #5 also known as?
Signup and view all the answers
How many bits does ASCII use for its code?
How many bits does ASCII use for its code?
Signup and view all the answers
What is the purpose of the 84th character, the block parity character, in the data block?
What is the purpose of the 84th character, the block parity character, in the data block?
Signup and view all the answers
What distinguishes cyclic codes from linear codes?
What distinguishes cyclic codes from linear codes?
Signup and view all the answers
What is the primary function of bit patterns in bit-oriented protocols?
What is the primary function of bit patterns in bit-oriented protocols?
Signup and view all the answers
What is a characteristic of bit-oriented protocols?
What is a characteristic of bit-oriented protocols?
Signup and view all the answers
What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?
What does the receiver protocol do upon detection of five consecutive 1s in a bit-oriented protocol?
Signup and view all the answers
What is a digital signal defined as?
What is a digital signal defined as?
Signup and view all the answers
What was one reason cited in the text for duplex operation in Bi-Sync protocol?
What was one reason cited in the text for duplex operation in Bi-Sync protocol?
Signup and view all the answers
The difference between uppercase and lowercase is ______.
The difference between uppercase and lowercase is ______.
Signup and view all the answers
Data communications topologies are organized as one-to-one, one-to-many, or many-to-many
Data communications topologies are organized as one-to-one, one-to-many, or many-to-many
Signup and view all the answers
The differences between a 'mode' and a 'circuit' are rather arbitrary
The differences between a 'mode' and a 'circuit' are rather arbitrary
Signup and view all the answers
The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less
The efficiency of a checksum in detecting errors is not as high as with a cyclic code, yet the circuitry to produce the checksum is less
Signup and view all the answers
The purpose of communication is to transmit data from the source to the destination
The purpose of communication is to transmit data from the source to the destination
Signup and view all the answers
ASCII was designed for English and is not suitable for global communications.
ASCII was designed for English and is not suitable for global communications.
Signup and view all the answers
The International Telegraphic Alphabet #5 uses a numerically arranged code, allowing for sorting operations.
The International Telegraphic Alphabet #5 uses a numerically arranged code, allowing for sorting operations.
Signup and view all the answers
The IBM 4 of 8 Code and EBCDIC are both examples of text coding.
The IBM 4 of 8 Code and EBCDIC are both examples of text coding.
Signup and view all the answers
The parity bit in ASCII is used for error detection.
The parity bit in ASCII is used for error detection.
Signup and view all the answers
The 8-bit ASCII code is transmitted with an additional parity bit, making the signal 9 bits in length.
The 8-bit ASCII code is transmitted with an additional parity bit, making the signal 9 bits in length.
Signup and view all the answers
Unicode includes scripts such as Greek, Cyrillic, Hebrew, and Arabic.
Unicode includes scripts such as Greek, Cyrillic, Hebrew, and Arabic.
Signup and view all the answers
The Bi-Sync protocol was developed for asynchronous communication.
The Bi-Sync protocol was developed for asynchronous communication.
Signup and view all the answers
The IBM 4 of 8 Code allowed error detection on a character-by-character basis.
The IBM 4 of 8 Code allowed error detection on a character-by-character basis.
Signup and view all the answers
EBCDIC requires a parity bit for error detection.
EBCDIC requires a parity bit for error detection.
Signup and view all the answers
ASCII and EBCDIC are examples of fixed-length character representations.
ASCII and EBCDIC are examples of fixed-length character representations.
Signup and view all the answers
The IBM Bi-Sync protocol was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner.
The IBM Bi-Sync protocol was developed to link the IBM 3270 line of terminals to IBM computers in a synchronous manner.
Signup and view all the answers
The IBM 4 of 8 Code is an example of a digital communication code that used letter frequencies for efficiency.
The IBM 4 of 8 Code is an example of a digital communication code that used letter frequencies for efficiency.
Signup and view all the answers
Binary Synchronous Communication uses bit-oriented protocol
Binary Synchronous Communication uses bit-oriented protocol
Signup and view all the answers
The Bi-Sync protocol is an example of a character-based protocol
The Bi-Sync protocol is an example of a character-based protocol
Signup and view all the answers
The efficiency of a checksum in detecting errors is higher than with a cyclic code
The efficiency of a checksum in detecting errors is higher than with a cyclic code
Signup and view all the answers
The IBM Bi-Sync protocol was developed to link the IBM 3270 line of terminals to IBM computers in an asynchronous manner
The IBM Bi-Sync protocol was developed to link the IBM 3270 line of terminals to IBM computers in an asynchronous manner
Signup and view all the answers
The block parity character is used to determine if parity was met for all the characters in the block
The block parity character is used to determine if parity was met for all the characters in the block
Signup and view all the answers
The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that follows
The receiver protocol, upon detection of five consecutive 1s, knows to remove the 0 that follows
Signup and view all the answers
The first data transmission code devoted more overhead to the data transmitted than to the error-detection scheme
The first data transmission code devoted more overhead to the data transmitted than to the error-detection scheme
Signup and view all the answers
High Level Data Link Control is an example of a bit-oriented protocol
High Level Data Link Control is an example of a bit-oriented protocol
Signup and view all the answers
The International Telegraphic Alphabet #5 makes use of letter frequencies for error detection
The International Telegraphic Alphabet #5 makes use of letter frequencies for error detection
Signup and view all the answers
ASCII uses 8 bits for its code
ASCII uses 8 bits for its code
Signup and view all the answers
The Bi-Sync protocol uses duplex transmission
The Bi-Sync protocol uses duplex transmission
Signup and view all the answers
The receiver protocol, upon detection of five consecutive 1s, knows to remove the 1 that follows
The receiver protocol, upon detection of five consecutive 1s, knows to remove the 1 that follows
Signup and view all the answers