Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

B.E / B.Tech.

PRACTICAL END SEMESTER EXAMINATIONS, APRIL/MAY 2023


Fourth Semester

EC3401 – NETWORKS AND SECURITY

(Regulations 2021)

Time : 3 Hours Answer any one Question Max. Marks 100

Aim/Principle/Apparatus Tabulation/Circuit/ Calculation Viva-Voce Record Total


required/Procedure Program/Drawing & Results
20 30 30 10 10 100

1 Implementation the character stuffing and character destuffing program.

2. Write and execute program for insert single bit to byteto byte transmission

3. Implementation the data flow control using stop and wait protocol in c language with suitable
diagram.

4. Perform file transfer between different hosts in a LAN using star topology and also analyze the
performance when a node in the network is disconnected.

5. Implementation the hamming code technique for find the error detection

6. Write and execute Assume a sender sends 6 packets. The sender receives an ACK with ack No =
3. What is the interpretation if the system is using GBN or SR.

7. Perform the implementation of Selective Repeat Protocol using simulation/ programming

8. Implement link state algorithm by having at least 5 nodes and find the shortest path between any
two nodes

9. Develop an algorithm to implement RSA encryption and decryption of any message containing
alphabets and numbers only.

10. Simulate congestion control algorithm for simple data transmission between 7 nodes using NS2

Page 1 of 2
11. Apply link state routing algorithm for the following graph. Display the routing table
permanent lists at final stage of the graph. Write a program for implementing the same.

12. Simulate CSMA/CD protocol and CSMA/CA protocol and compare the protocols. Comment on
the reliability of the protocols

13. Implement the Stop and wait protocol and prove that it is efficient for low error rate and low end
to end delay scenarios

14. Write and execute the CRC program and verify the result manually.

15. With a suitable demonstration, Compare the performance of CSMA/CD and CSMA/CA
protocols. Assume necessary parameters.

16. Implement the sliding window protocol -Go back-N and prove that it is efficient even in high
end to end delay with large window size

17. Verify and demonstrate the Ring Topology for 7 nodes

18. Implement congestion control algorithm for simple data transmission between 9 nodes using
NS2

19. Write a program to encrypt the message "Have a nice day". Also show the message obtained
after decrypting the cipher text

Page 2 of 2

You might also like