Professional Documents
Culture Documents
Computer Networks
Due date 26-12-22 (Late submission marks will be calculated from 50% of total points)
Points 30
Find these problems there and solve with help of book and internet. It is further
recommended that do these excercise by yourself.
P10-3. Exclusive-OR (XOR) is one of the most used operations in the calculation of
codewords. Apply the exclusive-OR operation on the following pairs of patterns.
Interpret the results.
P10-4. In Table 10.1, the sender sends dataword 10. A 3-bit burst error corrupts the
codeword. Can the receiver detect the error? Defend your answer.
P10-5. Using the code in Table 10.2, what is the data word if each of the following
codewords is received?
P10-6. What is the Hamming distance for each of the following code words?
a. d (10000, 00000) b. d (10101, 10000)
c. d (00000, 11111) d. d (00000, 00000)
P10-6 Assuming even parity, find the parity bit for each of the following data
units.
P10-7 Assuming odd parity, find the parity bit for each of the following data
units.
Q11-2. Explain why flags are needed when we use variable-size frames.
Q11-3. Assume a new character-oriented protocol is using the 16-bit Unicode as the character
set. What should the size of the flag be in this protocol?
Q11-6. In a byte-oriented protocol, should we first unstuff the extra bytes and then remove the
flags or reverse the process?
Q11-7. In a bit-oriented protocol, should we first unstuff the extra bits and then remove the flags
or reverse the process?
NETWORK LAYER