Class lecture notes for third Year,sixth semester Computer Networks (Subject Code: EC) is available here in PDF formats for you to. In recent years, the network that is making significant impact in our day-to-day life is the Computer network. By computer network we mean an interconnected set. EC / EC62 / EC Computer Networks Complete Notes-Unit Wise ECE 6th Semester Regulation | BE Electronics and Communication.

Author: Faezuru Moshakar
Country: Liberia
Language: English (Spanish)
Genre: Automotive
Published (Last): 23 January 2018
Pages: 76
PDF File Size: 10.37 Mb
ePub File Size: 1.49 Mb
ISBN: 583-8-19112-961-4
Downloads: 89283
Price: Free* [*Free Regsitration Required]
Uploader: Tygozuru

What are the three fundamental characteristics determine the effectiveness of the data communication system? Each layer in the sending machine adds its own information to the message it receives from the layer just above it and passes the whole package to the layer just below it.

The xomputer uses this key and an encryption algorithm to encrypt data; the receiver uses the same key and the corresponding decryption algorithm to decrypt the data. Remove the restriction of nootes shared secret key between two entities. Like Ethernet, station communicates ecc2352 a common bus. Raghavendra Reddy Malapati Page 9 In distance vector routing, cost refer to hop count while in case of link state routing, cost is a weighted value based on a variety of factors such as security levels, traffic or the state of the link.

What is meant by Permanent virtual circuit?


What are the functions of a DTE? The sender can send before waiting for acknowledgment. What are the disadvantages of optical fiber as a transmission medium?

What is framing bits? The most common and least expensive mechanism for error detection is netwroks vertical redundancy check VRC often called a parity check.


Specific responsibilities of data link layer include the following. A trailer is added at layer2. What is meant by segment?

What is meant by hop count? At the receiving machine, each layer removes the data meant for it and passes the rest to the next layer. What is Token Bus? Raghavendra Reddy Malapati Page 14 Disadvantage: Why are standards needed?

A brouter is a single protocol or multiprotocol router that sometimes acts as a router and sometimes acts as a bridge. G e ne r ic domain: A character level encryption in which each character is replaced by another character in the set.

EC2352 Computer Networks MJ2014 Question Paper

Raghavendra Reddy Malapati Page 11 The size of the data unit belonging to a single session are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit. Otherwise, the received stream of bits is discarded and the dates are resent. How will the congestion be avoided?

It is the popular mechanism for continuous transmission error control. A Local Area Network LAN is a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic areaE There are 3 types of HDLC frames. The server has two components: Anna University – B. The mechanism that coordinates this rotation is called token passing. All the devices share the link equally. The third and most powerful of the redundancy checking techniques is the cyclic redundancy checks CRC CRC is based on binary division.

Anna University Department of Civil Engineering B. Each receiving device has a block of memory called a buffer, reserved for storing incoming data until they are processed. The dividing process is called segmentation.


EC COMPUTER NETWORKS lecture notes | for ECE – VII semester | by han

Distinguish between peer-to-peer relationship and a primary-secondary relationship. These allow interoperability among unrelated software system. This information is added in the form of headers or trailers. So it is not recommended for large amounts of text. If it dose not, a change is assumed to have occurred and the sending router then alerts the rest of the network in its next LSP.

The BECN bit warns the sender of congestion in network. Explain cross talk and what is needed to reduce it? For each connection, the user can request a particular attribute each service class is associated with a set of attributes. Write short notes on error correction.

EC2352 – Computer Networks Important Questions

They Route packets from one network to any of a number of potential destination networks on internet routers operate in the physical, data link and network layer of OSI model. In datagram approach, each packet is treated independently from all others. The data must be transmitted using NRZ-L encoding. What is the function of FECN? HTML is a computer language for specifying the contents and format of a web netwirks.

The primary station has the complete control of the link. The transport layer is responsible form source-to-destination delivery of the entire message.