Class lecture notes for third Year,sixth semester Computer Networks (Subject Code: EC) is available here in PDF formats for you to. In recent years, the network that is making significant impact in our day-to-day life is the Computer network. By computer network we mean an interconnected set. EC / EC62 / EC Computer Networks Complete Notes-Unit Wise ECE 6th Semester Regulation | BE Electronics and Communication.
|Published (Last):||1 March 2016|
|PDF File Size:||20.33 Mb|
|ePub File Size:||8.17 Mb|
|Price:||Free* [*Free Regsitration Required]|
What is mean by data communication? What are the criteria used to evaluate transmission medium? The sender and receiver are communicating with each other and are using some types of flow control at a higher level.
In networks, communication occurs between the entities in different systems. Why is an application such as POP network for electronic messaging? The network support layers are Physical layer, Data link layer and Network layer. The services provided by the transport layer End-to- end delivery Addressing Reliable delivery Flow control Multiplexing 3.
The BECN bit warns the sender of congestion in ec23552. The connection is made after both computers do handshaking. SMTP provides mail exchange between users on the same or different computers. It is used in crating dynamic documents. What are the rules of boundary-level masking? Here a sequence of redundant bits, called the CRC remainder is appended to the end of data unit. Each layer in the sending machine adds its own information to the message it receives from the layer just above it and passes the whole package to the layer just below it.
Write short notes on CRC generator. IP address is the 3-bit number for representing a host netwoks system in the network. These allow interoperability among unrelated software system. Discuss the mode for propagating light along optical channels There are two modes for propagating light along optical channels, multimode and single mode. Each station may transmit only during its turn and may send only one frame during each turn.
In secret key, the same key is used by both parties.
Anna University ECE Computer Networks EC Notes
The combining process is called concatenation. The receiver must able to prove that a received message computwr from a specific sender. This redundancy may create delays of indeterminable length if the traffic is heavy. Routers relay packets among multiple interconnected networks.
EC – Computer Networks Important Questions | JPR Notes
G e ne r ic domain: For one million users to communicate, only two million keys are needed. MAC sub compuer resolves the contention for the shared media. If you use large numbers the method to be effective. In network transactions, you can create an equivalent of an electronic or digital signature by the way you send data.
In selective reject ARQ only the specific damaged or lost frame is retransmitted.
What is meant by switched virtual circuit? Write short notes on CRC checker. What is meant by quality of service? So it is not recommended for large amounts of text.
For communication, the entities must agree on a protocol. The protocol in the transport layer takes care in the delivery of data from one application program on one device to an application program on another device.
Remove the restriction of a shared secret key between netaorks entities. The sender and the receiver expect confidentiality. Instead, the receiver looks for changes from one level to another as its computeer for recognition of 1s. The effectiveness of the data communication system depends on three fundamental characteristics: In datagram approach, each packet is treated independently from all others. U frames — reserved for systems management.
What is selective reject ARQ? What are the three fundamental characteristics determine the effectiveness of the data communication system? It is the mechanism to correct the errors and it can be handled in 2 ways. The specific responsibilities of network layer include the following: S frames — used only to transport control information, nottes data link layer and error controls.
EC2352 – Computer Networks Important Questions
What is time-to-live or packet lifetime? The data must be transmitted using NRZ-L encoding. Secret Key algorithms are efficient: What does the electrical specification of EIA describe?