KONERU LAKSHMAIAH EDUCATION FOUNDATION
(Deemed to be University estd, u/s, 3 of the UGC Act, 1956)
(NAAC Accredited “A++” Grade University)
Green Fields, Guntur District, A.P., India – 522502
Department of Computer Science & Engineering
B.Tech. II
A.Y.2024-25; ODD Semester
23EC2210R - Network Protocols and Security
Assignment Questions
1. Discuss in detail the uses of computer networks.
2. With a neat sketch, describe the following:
a. LAN
b. MAN
c. WAN
d. Internet
3. Discuss about the functionalities of each layer of OSI Model
4. Give the difference between OSI and TCP/IP reference models.
5. The following character encoding is used in a data link protocol:
A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000;
Show the bit sequence transmitted (in binary) for the four-character frame
“A FLAG B ESC” when each of the following framing methods is used:
(a) Byte count. (b) Flag bytes with byte stuffing.
(c) Starting and ending flag bytes with bit stuffing.
6. Alice wants to send a message “1000010111” to this friend Bob. To ensure error
control Raju wants to use CRC mechanism with generator polynomial as x^3+x+1.
Help Raju to compute CRC and show the final codeword that Raju sends to Ramu.
7. A receiver received a 7-bit hamming code as 1011101, assume Even parity and
state whether received data is correct or not. If not locate the error bit?
8. Mention the drawback of Go-back-N sliding window protocol and discuss how it
can be prevented by Selective Repeat protocol.
9. Suppose that the sender wants to send 4 frames each of 8 bits, where the frames are
11001100, 10101010, 11110000 and 11000011. For ensuring data reliability,
sender wants to use checksum error detection method. Compute checksum and
show the final codeword. For the codeword generated compute CRC using the
generator polynomial x^4+x^2+1. Show the final codeword.
10. The window size of the sender is lesser than 2m i.e (2m – 1) in case of go-Back-N
ARQ. Justify your answer with proper diagram.