0 Comment

Computer Networks Year Question bank. Uploaded by . Check the answer (10) b. Bit stuff the . ec computer networks question bank. Uploaded by. PART-A(10 × 2 = 20). (Answer all the Questions). 1. Define a computer network. 2 . What is the similarity between transport layer and data link layer? 3. Define. ECCOMPUTER NETWORKS. ALL UNITS – QUESTION BANK answer. 28 . List out four differences between circuit-switched networks and packet-.

Author: Brarg Tugar
Country: Bolivia
Language: English (Spanish)
Genre: Science
Published (Last): 6 April 2016
Pages: 83
PDF File Size: 17.85 Mb
ePub File Size: 14.26 Mb
ISBN: 261-2-97158-401-9
Downloads: 4107
Price: Free* [*Free Regsitration Required]
Uploader: Mazukazahn

What is meant by congestion? The server has two components: Piggy backing means combining data to sent and acknowledgement of the frame received in one single frame.

What are the three criteria necessary for an effective and efficient network? Flow control refers to a set of procedures used to restrict the amount of data.

What are the rules of boundary-level masking? In selective reject ARQ only the specific damaged or lost frame is retransmitted. After receiving the data appended with the CRC it does the same modulo-2 division. The control connection uses very simple rules of communication. Security issues include protecting data from unauthorized access and viruses.

It is connected to a network through a DCE. What is the difference between a passive and an active hub? A logical circuit made between the sending and receiving computers. Means that 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1. What is meant by segmentation? What are the functions of a DCE? Physical, data link and network layers are the network support layers; they deal with the physical aspects of moving data from one device to another.

  TEA1532A PDF

So it is used to encrypt or decrypt long messages. Session layer, Presentation layer, Application layer. The specific responsibilities of network layer include the following: HTML is a computer language for specifying the contents and format of a web document. Write short notes on VRC. Why are protocols needed? MAC sub layer resolves the contention for the shared media.

EC Computer Networks – Question Bank and Important Questions – Edition

What are the four aspects related to the reliable delivery of data? Mention the categories of flow control. One device controls traffic and the others must transmit through it. Write short notes on FDDI.

If a frame is corrupted in transit, a NAK is returned and the frame is resent out of sequence. Permanent virtual circuits are comparable to leased lines in circuit switching. What are the two types of implementation formats in virtual circuits?

Computer Networks EC notes – Annauniversity lastest info

What is mean by data communication? The sender follows these steps a The units are divided into k sections each of n bits. Token Bus is a physical bus that operates as a logical ring using tokens. At the receiving machine, each layer removes the data meant for it and passes the rest to the next iwth. Here each entity can create a pair of keys, keep the computr one, and publicly distribute the other one.


The control connection is made between the control processes. Raghavendra Reddy Malapati Page 8 6. In networks, communication occurs between the entities in different systems.

If it dose not, a change is assumed to have occurred and the sending router then alerts the rest of the network in its cmputer LSP. What are the duties of the transport layer? The transport layer creates a communication between the source and destination. Mention the types of frames in HDLC.


A token is passed among stations. It allows additional text to include codes that define fonts, layouts, embedded graphics and hypertext links. The four aspects are, Error control Sequence control Loss control Duplication control 5.

Fixed-content documents that are created and stored in a server. Write short notes on CRC generator. Fiber distributed data interface is a local areas. There are 2 methods have been developed to control flow of data across communication links.

Name four factors needed for a secure network.

What is meant by Permanent virtual circuit? Two entities cannot just send bit streams to each other and expect to be understood.

In the NRZ-L sequence, positive and negative voltages have specific meanings: What are the steps followed in checksum generator?