Class lecture notes for third Year,sixth semester Computer Networks (Subject Code: EC) is available here in PDF formats for you to. In recent years, the network that is making significant impact in our day-to-day life is the Computer network. By computer network we mean an interconnected set. EC / EC62 / EC Computer Networks Complete Notes-Unit Wise ECE 6th Semester Regulation | BE Electronics and Communication.
|Published (Last):||14 May 2007|
|PDF File Size:||6.66 Mb|
|ePub File Size:||5.81 Mb|
|Price:||Free* [*Free Regsitration Required]|
Raghavendra Reddy Malapati Page 3 The user support layers are: The stations are configured in 3 ways a Unbalanced configuration b Symmetrical configuration c Balanced configuration What are the functions of a DCE?
Permanent virtual circuits are comparable to leased lines in circuit switching.
Anna University – B. Mention the categories of flow control. Session, presentation and application layers are the user support layers; they networs interoperability among unrelated software systems. If a frame is corrupted in transit, a NAK is returned and the frame is resent out of sequence. Mention the types of frames in HDLC.
Permutation is transposition in bit level.
EC COMPUTER NETWORKS SYLLABUS | Online Engineering
When the size of the data unit received from the entworks layer is too long for the network layer datagram or data link layer frame to handle, the transport protocol divides it into smaller usable blocks.
Token Bus is a physical bus that operates as a logical ring using tokens.
What are the responsibilities of data link layer? It is connected to a network through a DCE. Multiple beams from a light source move through the core in different paths.
What are the advantages of distributed processing? Why are protocols needed? What is meant by segmentation?
Piggy backing means combining data to sent and acknowledgement of the frame received in one single frame. What is mean by data communication? The data connection needs more complex rules due to the variety of data types transferred.
P r i m ary-secondary relationship: So it is not recommended for large amounts of text. As the time-to-live field is generated, each packet is marked with a lifetime; usually the number of hops that are allowed before a packet is considered lost and accordingly, destroyed. The server betworks two components: Group the OSI layers by function.
The services provided by the transport layer End-to- end delivery Addressing Reliable delivery Flow control Multiplexing 3. At the sending machine, when the message passes through the layers each layer adds the headers or trailers. If it dose not, a change is assumed to have occurred and the sending router then alerts the rest of the network in its next LSP. Two entities cannot just send bit streams to each other and expect to be understood.
They Route packets from one network to any of a number of potential destination networks on internet routers operate in the physical, data link and network layer of OSI model. There are 3 coomputer of HDLC frames.
EC Computer Networks – Unit 1 PPT Lecture Notes – Vijay Edition
What is meant ec352 Permanent virtual circuit? What are the functions of a DTE? An active hub contains a repeater that regenerates the received bit patterns before sending them out. A protocol is a set of rules that govern data communication 6. Session layer, Presentation layer, Application layer. The sender and receiver are communicating with each other and are using some types of flow control at a higher level.
What are the steps followed in checksum generator? One or more synchronization bits are usually added to the beginning of each frame. P e e r -t o-peer relationship: What is meant by switched virtual circuit?
The control connection is made between the control processes. The reason is that the key is usually smaller. What is framing bits?
IP address is the 3-bit number for representing a host or system in the network.
EC2352 – Computer Networks Important Questions
Netdorks, the receiver looks for changes from one level to another as its basis for recognition of 1s. Secret Key algorithms are efficient: In this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange.
Fiber with extremely small diameter that limits beams to a few angles, resulting in an almost horizontal beam. Anna University Department of Civil Engineering B.
What are noted and trailers and how do they get added and removed? What is piggy backing? In network transactions, you can create an equivalent of an electronic or digital signature by the way you send data.