EC2352 COMPUTER NETWORKS NOTES PDF

Class lecture notes for third Year,sixth semester Computer Networks (Subject Code: EC) is available here in PDF formats for you to. In recent years, the network that is making significant impact in our day-to-day life is the Computer network. By computer network we mean an interconnected set. EC / EC62 / EC Computer Networks Complete Notes-Unit Wise ECE 6th Semester Regulation | BE Electronics and Communication.

Author: Daizahn Malagore
Country: Papua New Guinea
Language: English (Spanish)
Genre: Literature
Published (Last): 25 December 2005
Pages: 477
PDF File Size: 16.19 Mb
ePub File Size: 2.21 Mb
ISBN: 141-5-34656-236-4
Downloads: 20872
Price: Free* [*Free Regsitration Required]
Uploader: Vudorr

EC Computer Networks Lecture Notes – SEC Edition

One or more synchronization bits are usually added to the beginning of each frame. In this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange.

A notew level encryption in which each character is replaced by another character in the set. At the receiving machine, each layer removes the data meant for it and passes the rest to the next layer. Otherwise, the received stream of bits is discarded and the dates are resent. How the packet cost referred in distance vector and link state routing?

EC COMPUTER NETWORKS Lecture Notes for BME – Seventh (7th) semester -by han

So the simple strategy used by the hamming code to correct single note errors must be redesigned to be applicable for multiple bit correction. Define a standard What is meant by brouter? Why is an application such as POP needed for electronic messaging?

  ARI FLEISCHER TRANSCRIPT PDF

Headers are added to the message at the layers 6,5,4,3, and 2. What is function of transport layer?

I frames — used to transport user data and control information relating to user data. If the neighborhood responds to the greeting as expected, it is assumed to be alive and functioning. networos

If a frame is corrupted in transit, a NAK is returned and the frame is resent out of sequence. For each connection, the user can request a particular attribute each service class is associated with a set of attributes.

Mention the types of errorsE There are 2 types of errors a Single-bit error. The BECN bit warns the sender of congestion in network. The control data added to the end of a data is called trailers. G e ne r ic domain: Finds the domain name given the IP address.

EC2352 – Computer Networks Important Questions

It is the mechanism to correct the errors and it can be handled in 2 ways. Domain Name System can map a name to an address and conversely an address to name. What is meant by segment? One connection is used for data transfer, the other for control information. The documents in the WWW can be grouped into three broad categories: Where is the Menu? Discuss the basic model of FTP. The control connection uses very simple rules of communication.

  ANATOMIA DE CABEZA Y CUELLO PARA ODONTOLOGOS NETTER PDF

So it is used to encrypt or decrypt long messages.

Newer Post Older Post Home. Mention the types of frames in HDLC. Write down the three types of WWW documents. Switched virtual circuit format is comparable conceptually to dial-up line in circuit switching. The combined station is one which acts either as a primary or a Secondary, depending upon the nature and direction ed2352 the transmission.

We can use the shielded twisted pair cable or coaxial cable for transmission, which contains metal foil to reduce cross talk. What are the four aspects related to the reliable delivery ev2352 data? Why are standards needed? The phenomenon related to the bending of light when it passes from one medium to another. In this method, the same virtual circuit is provided between two uses on a continuous basis. What are the rules of boundary-level masking? What are the three events involved in a connection?

An active hub contains a repeater that regenerates the received bit patterns before sending them out. Token Bus is a physical bus that operates as a logical ring using tokens. List the various ways of station configuration. It is connected to a network through a DCE.