0% found this document useful (0 votes)
51 views

Computer Network KCA-303 (Assignment 2)

This document is an assignment for a Computer Networks course. It contains 16 questions about various topics in computer networking including error detection techniques, Hamming codes, TCP vs UDP reliability, ARQ protocols, CSMA/CD, CRC, multiple access protocols, Aloha, and sliding window protocols. Students are asked to answer each question demonstrating their understanding of key concepts covered in class.

Uploaded by

Caption Star
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Computer Network KCA-303 (Assignment 2)

This document is an assignment for a Computer Networks course. It contains 16 questions about various topics in computer networking including error detection techniques, Hamming codes, TCP vs UDP reliability, ARQ protocols, CSMA/CD, CRC, multiple access protocols, Aloha, and sliding window protocols. Students are asked to answer each question demonstrating their understanding of key concepts covered in class.

Uploaded by

Caption Star
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

MCA

Assignment -2
Semester-III (Odd), Session: 2023-24
KCA 303: COMPUTER NETWORK
Unit 2 Course Outcome: CO2 – Describe
communication model TCP/IP,OSI, network
topologies along with communicating devices.
Date of Distribution: 22/12/2023 Faculty Name: ANKITA TIWARI/Mr. AYUSH

Sr. MANDATORY QUESTIONS BL


1 Discuss about Error Detection methods. Describe any one technique used for error K1

detection with suitable example.

2 What is the purpose of Hamming code? K2

3 Justify the statement TCP is reliable than UDP K1

4 Explain Go –Back-N ARQ and Selective Repeat with reference to sliding window K1

protocol.
5 Discuss CSMA/CD. K1

6 A bit stream 10011101 is transmitted using the standard CRC method. The K2

generator polynomial is X^3+1. Show the actual bit string transmitted. Suppose the
third bit from the left is inverted during transmission show that this error is
detected at the receiver’s end.

7 Explain Multiple Access Protocol. In detail. K2

8 Write a short note on : K2

a. FDMA b. TDMA c. CDMA

9 Discuss Aloha. K1

10 Explain the types of Aloha. Why slotted Aloha is better than pure Aloha? K2

11 Explain any two transport layer protocol: K2

a. Stop & Wait b. Go –Back-N ARQ C. Selective Repeat

12 What do you understand by Sliding window protocol? K2,K3


13 A bit word 1011 is to be transmitted construct the even parity 7-bit hamming code for this K2,K3
data.
14 Sender’s data D=11010, CRC generator polynomial = x3+x+1. Apply CRC algorithm and K2,K3
perform calculations both sender and receiver end.
15 Explain CSMA in detail. K2
16 What do you understand by sliding window protocol? Explain. K2

IQAC/ASU/F/2023-24/2.1 Page 1 of 2
IQAC/ASU/F/2023-24/2.1 Page 2 of 2

You might also like