Class lecture notes for third Year,sixth semester Computer Networks (Subject Code: EC) is available here in PDF formats for you to. In recent years, the network that is making significant impact in our day-to-day life is the Computer network. By computer network we mean an interconnected set. EC / EC62 / EC Computer Networks Complete Notes-Unit Wise ECE 6th Semester Regulation | BE Electronics and Communication.
|Published (Last):||28 December 2014|
|PDF File Size:||4.80 Mb|
|ePub File Size:||20.96 Mb|
|Price:||Free* [*Free Regsitration Required]|
It is the popular mechanism for continuous transmission error control. Raghavendra Reddy Malapati Page 14 Disadvantage: Anna University Department of Civil Engineering B.
S frames — used only to transport control information, primarily data link layer and error controls. What is the function of SMTP?
EC2352 – Computer Networks Important Questions
Write short notes on FDDI. The third and most powerful of the redundancy checking techniques is the cyclic redundancy checks CRC CRC is based on binary division. The sender can send before waiting for acknowledgment. At the sending and receiving end of the transmission, TCP divides long transmissions into smaller data units and packages each into a frame called a segment. Mention the different kinds of Ethernet networks. The network support layers are Physical layer, Data link layer and Network layer.
Computter logical circuit made between the sending and receiving computers. The FECN bit is used to warn the receiver of congestion in the network.
Why is an application such as POP needed for electronic netwoks For one million people to communicate, a half-billion secret keys are needed.
It is connected to a network through a DCE. What are the network support layers and the user support layers? How the routers get the information about neighbor? The public key is announced to the public.
A router gets its information about its neighbors by periodically sending them short greeting packets. What are the three events involved in a connection?
What is the purpose of hamming code? The phenomenon related to the bending of light when it passes from one medium to another.
What are the functions of a DCE? It is similar to that of signing transactions documents when you do business with a bank. A protocol is a set of rules that govern data communication 6.
EC Computer Networks MJ Question Paper | Knowledge Adda
In selective reject ARQ only the specific damaged or lost frame is retransmitted. The server has two components: The sender follows these steps a The units are divided into k sections each of n bits. The nehworks is made after both computers do handshaking. Mention the function of go-back N-ARQ.
A Character level encryption in which the characters retain their plaintext but the position of the character changes Raghavendra Reddy Malapati Page A character level encryption in which each character is replaced by another character in the set.
What are the techniques used in multiplexing? What are the disadvantages of optical fiber as a transmission medium?
The system must deliver data in a timely manner. List out the user related attributes? The protocol in the transport layer takes care in the delivery of data from one application program on one device to an application program on another device. What are the four aspects related to the reliable delivery of data?
G e ne r ic domain: The transport layer creates a communication between the source ckmputer destination. It is the error detecting mechanism, which means a shorter group of bits or extra bits may be appended at the destination coputer each unit.
Raghavendra Reddy Malapati Page 2 9. What is a buffer?
After receiving the data appended with the CRC it does the same modulo-2 division. A frame consists of one complete cycle of time slots, including one or more slot dedicated to each sending device.
EC2352 Computer Networks MJ2014 Question Paper
It allows additional text to include codes that define fonts, layouts, embedded graphics and hypertext links. What is mean by data communication? What is framing bits? Raghavendra Reddy Malapati Page 9 In distance vector routing, cost refer to hop count while in case of link state routing, cost is a weighted value based on a variety of factors such as security levels, traffic or the state of the link.
Raghavendra Reddy Malapati Page 3 Why are protocols needed? Raghavendra Reddy Malapati Page 11 The size of the data unit belonging to a single session are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit.