Assignment 01 Computer Network
Assignment 01 Computer Network
Department of Computing
Subject: Computer Network
Submitted to:
Class:
th
BSSE 6
Aamish Ali
BSSE 6th
23925
Q. 1: What is Stop and Wait protocol? Describe the two types of
delays while sending the frames. Also mention the difference
between Efficiency and Throughput.
Stop-and-Wait Protocol:
The Stop-and-Wait protocol is a simple flow control protocol used in data
communication systems. It ensures reliable transmission by sending one frame at
a time and waiting for an acknowledgment (ACK) from the receiver before
sending the next frame.
If the sender does not receive an acknowledgment within a specified time, it
resends the frame. This ensures that no data is lost due to transmission errors .
2) Transmission Delay:
The time it takes to transmit all bits of a frame onto the communication
medium.
It depends on the size of the frame and the bandwidth of the channel.
Aamish Ali
BSSE 6th
23925
time spent on overheads like acknowledgments, retransmissions, or idle
periods.
Mathematically:
Efficiency = Time spent sending data / Total time (including
waiting and overhead)
2) Throughput:
Throughput is the actual rate of successful data delivery over the
communication channel, usually measured in bits per second (bps).
It accounts for the total amount of data transmitted, including
retransmissions and overhead.
Throughput is affected by factors like channel bandwidth, noise, and
protocol overhead.
Aamish Ali
BSSE 6th
23925
1. A device broadcasts an ARP request on the network asking, “Who has this
IP address? Tell me your MAC address.”
2. The device with the matching IP responds with an ARP reply, providing its
MAC address.
3. The requesting device caches the IP-to-MAC mapping for future use.
Aamish Ali
BSSE 6th
23925
3. When a host leaves the group, it sends a leave report, and routers update
their group membership records accordingly.
Aamish Ali
BSSE 6th
23925
1101
1001
1110
LRC (Column Parity): 1010
Limitation: More effective than VRC but cannot detect all error types (e.g., burst
errors).
(IV) Checksum
Purpose: To detect errors in data transmitted over networks.
Operation:
1. The data is divided into fixed-size blocks.
2. Each block is treated as a number, and all numbers are summed using
binary addition.
3. The sum is complemented (1’s complement) to form the checksum, which
is appended to the data.
4. At the receiver, the data blocks and checksum are summed:
o If the result is all 1s (no carry), the data is error-free.
o Otherwise, an error is detected.
Example:
Data Blocks: 1010, 0110, 1001
Aamish Ali
BSSE 6th
23925
Binary Sum: 11011
1’s Complement (Checksum): 00100
Transmitted Data: 1010 0110 1001 00100
Limitation: Less robust than CRC for burst errors.
Aamish Ali
BSSE 6th
23925
2. Asynchronous TDM (Statistical TDM): Time slots are dynamically assigned
based on demand.
Applications:
Digital telecommunication systems.
Computer networks.
Advantages:
More efficient than FDM for digital signals.
No need for separate frequency bands.
Disadvantages:
Delays can occur if demand exceeds channel capacity.
Time slots may be wasted if a channel is idle.
Aamish Ali
BSSE 6th
23925
Q. 5: A Multinational company requires its IPv4 private address range
192.168.0.0/16 to cover a minimum of 6 sites covering a minimum of
6012 devices/users per site.
For the first TWO subnets and the last TWO subnets detail the following
i. Network address;
ii. First host IP address;
iii. Final host IP address
iv. Broadcast address
v. Actual number of available hosts
Aamish Ali
BSSE 6th
23925
First Two Subnets
Subnet 1:
Network Address: 192.168.0.0
First Host IP: 192.168.0.1
Final Host IP: 192.168.31.254
Broadcast Address: 192.168.31.255
Available Hosts: 8190
Subnet 2:
Network Address: 192.168.32.0
First Host IP: 192.168.32.1
Final Host IP: 192.168.63.254
Broadcast Address: 192.168.63.255
Available Hosts: 8190
Aamish Ali
BSSE 6th
23925
Aamish Ali
BSSE 6th
23925