You are on page 1of 2

Assignment 2 19-12-22

Computer Networks

Due date 26-12-22 (Late submission marks will be calculated from 50% of total points)
Points 30

Find these problems there and solve with help of book and internet. It is further
recommended that do these excercise by yourself.

Chapter 10.7.3 Problems (B A Forozan) Exercises

P10-3. Exclusive-OR (XOR) is one of the most used operations in the calculation of
codewords. Apply the exclusive-OR operation on the following pairs of patterns.
Interpret the results.

a. (10001) ⊕ (10001) b. (11100) ⊕ (00000) c. (10011) ⊕ (11111)

P10-4. In Table 10.1, the sender sends dataword 10. A 3-bit burst error corrupts the
codeword. Can the receiver detect the error? Defend your answer.

P10-5. Using the code in Table 10.2, what is the data word if each of the following
codewords is received?

a. 01011 b. 11111 c. 00000 d. 11011

P10-6. What is the Hamming distance for each of the following code words?
a. d (10000, 00000) b. d (10101, 10000)
c. d (00000, 11111) d. d (00000, 00000)

P10-6 Assuming even parity, find the parity bit for each of the following data
units.

a. 1001011 b. 0001100 c. 1000000 d. 1110111

P10-7 Assuming odd parity, find the parity bit for each of the following data
units.

a. 1001011 b. 0001100 c. 1000000 d. 1110111


P10-8 A simple parity-check bit, which is normally added at the end of the word (changing a 7-
bit ASCII character to a byte), cannot detect even numbers of errors. For example, two, four, six,
or eight errors cannot be detected in this way. A better solution is to organize the characters in a
table and create row
and column parities. Kindly Explain Two Dimensional Parity Check with examples clearly
make table and add redundant bit with Red pen in rows and columns

Chapter 11.6.2 Questions, 11.6.4 Problems (B A Forozan) Exercices

Q11-2. Explain why flags are needed when we use variable-size frames.

Q11-3. Assume a new character-oriented protocol is using the 16-bit Unicode as the character
set. What should the size of the flag be in this protocol?

Q11-4. Compare and contrast byte-oriented and bit-oriented protocols.

Q11-5. Compare and contrast byte-stuffing and bit-stuffing.

Q11-6. In a byte-oriented protocol, should we first unstuff the extra bytes and then remove the
flags or reverse the process?

Q11-7. In a bit-oriented protocol, should we first unstuff the extra bits and then remove the flags
or reverse the process?

NETWORK LAYER

a. Elaborate in Detail Classless IP Addressing, why we use Classless addressing though we


have Class full addressing. Give example of Classless addressing to justify your answer.
You may Give IP of Classless network to further clarify your example.

b. Comparison of Classful Vs Classless Addressing

You might also like