0% found this document useful (0 votes)
6 views

Assignment 3 CN

The document outlines the assignment details for the Computer Networks course at Vasavi College of Engineering for the academic year 2024-25. It includes a list of questions assigned to specific roll numbers, along with instructions for group submissions and individual assignments. Additionally, it specifies case-based assignments that require group collaboration and various programming and design tasks related to networking and security.

Uploaded by

nishanthreddy094
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Assignment 3 CN

The document outlines the assignment details for the Computer Networks course at Vasavi College of Engineering for the academic year 2024-25. It includes a list of questions assigned to specific roll numbers, along with instructions for group submissions and individual assignments. Additionally, it specifies case-based assignments that require group collaboration and various programming and design tasks related to networking and security.

Uploaded by

nishanthreddy094
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

VASAVI COLLEGE OF ENGINEERING

(AUTONOMOUS)
DEPARTMENT OF ELECTRONICS AND
COMMUNICATION ENGINEERING
Staff: Dr.Kilari Veera Swamy
Course Name : COMPUTER NETWORKS (U22PC630EC)
Academic Year: 2024– 25 Semester – VI, III YEAR -ECE
Assignment-3
Last date for submission:18/04/2025
Question No Roll-nos-Section A
1. 1,2,3,4
2. 5,6,7,8
3. 9, 10,11,12
4. 13,14,15,16
5. 17,18,19,20
6. 21, 22,23
7. 25,26,28,29
8. 31,32,61,62
9. 33,35, 63,27
10. 37,38,39
11. 41,42,43,44
12. 45,46,47,48
13. 49,50,51,52
14. 53,54,55,56
15. 57,58,59,60
16. 301,302,303,30
17. 305,306,307,304

Whoever submits the case- b a s e d assignment as a group


(2 members) they need not submit individual assignment.

Individual Assignments
Q.No Details M BTL CO PO PSO
1a Discuss about TCP Tahoe- Congestion Control 3 2 4 1 2
b Compare TCP and UDP 2 2 4 1 2
2a Discuss about TCP Reno- Congestion Control 3 2 4 1 2
b Write applications of TCP and UDP 2 2 4 1 2
3 a Explain TCP header 3 2 4 1 2
b Consider the bandwidth as 50 Kbps, one way transit 2 3 4 2 2
time=240 msec and the segment size is 1000 bit. Consider
the event of a segment transmission and the corresponding
ACK reception. Find the maximum number of segments
that can be outstanding during this duration.
4 a Describe flow of TCP sliding window using one example 2 2 4 1 2
b Consider the effect of using slow start on a line with a 10- 3 3 4 2 2
msec round-trip time and no congestion. The receive
window is 24 KB and the maximum segment size is 2 KB.
How long does it take before the first full window can be
sent?
5a Explain UDP header 2 2 4 1 2
b Suppose that the TCP congestion window is set to 18 KB 3 3 4 2 2
and a timeout occurs. Assume that the maximum segment
size is 1 KB.
a. How big will the window be if the next four
transmission bursts are all successful?
b. After another four transmission bursts, how big will the
window be?
6a Explain various Elements of Transport Protocols 3 2 4 1 2
b Discuss fundamentals of Digital Signatures 2 2 5 1 2
7a What is silly window syndrome problem and discuss two 2 2 4 1 2
solutions
b If the TCP round-trip time, RTT, is currently 30 msec and 3 3 4 2 2
the following acknowledgements come in after 26, 32, and
24 msec, respectively, what is the new RTT estimate. Use α
= 0.9.
8a Explain Timers in TCP 3 2 4 1 2
b Why do you need Firewall 2 2 5 1 2
9a Explain DES 3 2 5 1 2
b Discuss about one-time pads 2 2 5 1 2
10 a Explain triple DES. 3 2 5 1 2
b Discuss about POP3 and IMAP 2 2 5 1 2
11 a Explain RSA algorithm. 3 2 5 1 2
b How does MIME enhance SMTP? 2 2 4 1 2
12 a Explain Various techniques of digital signatures 3 2 5 1 2
b Discuss about web documents 2 2 4 1 2
13 a Describe various methods of authentication protocols. 3 2 5 1 2
b Illustrate usage of UDP in DNS 2 2 4 1 2
14 a Discuss about the functional areas of the network 2 2 4 1 2
management.
b Compare UDP with TCP protocol. Why is TCP 3 3 4 2 2
appropriate for text data and UDP for Voice and Video ?
Justify with characteristics of Data
15 a Explain DNS 2 2 4 2 2
b Illustrate usage of TCP in WWW access 3 3 4 2 2
16 a Differentiate Symmetric and Asymmetric cryptography 2 2 5 1 2
b What is the difference between a UA and MTA 3 2 4 1 2
17 a Explain WWW 2 2 4 1 2
b Write about HTML tags and create static web page for 3 3 4 2 2
the page given below.
Title is VCE-ECE:

Welcome to ECE home Page


We are so happy that you have chosen to visit ECE.
Contact:
• 04023146002
• 04023146003

Case based Assignments: Group of 2 students can submit one case-


b a s e d assignment.

1. Design a Web page for 3 ECE-A section, VCE students.


[5M BTL3 CO4 PO2 PO3 and PSO1]
2. Write a Program to implement ‘PRESENT-80’ with 2 levels.
Transfer 1 Lakh to SBI 102020202
Note: Each letter represents 8 bit. Represent Space also with 8
bit.
[5M BTL3 CO5 PO2 PO3 and PSO2]
3. Demonstrate “Conduct of online exam for 4 users using 4
Laptops and one laptop as Server”.
[5M BTL3 CO4 PO2 PO3 and PSO2]
4. Design detailed Security Algorithm using 02 iterations. Four
steps are involved in each iteration. These are 1. Substitution
2. Shift Rows 3.Mix Columns 4. Key .
[5M BTL3 CO5 PO2 PO3 and PSO2]
5. Demonstrate the internet connectivity by considering 4 laptops,
one switch and one router.
[5M BTL3 CO4 PO2 PO3 and PSO2]

You might also like