Computer Networks Year Question bank. Uploaded by . Check the answer (10) b. Bit stuff the . ec computer networks question bank. Uploaded by. PART-A(10 × 2 = 20). (Answer all the Questions). 1. Define a computer network. 2 . What is the similarity between transport layer and data link layer? 3. Define. ECCOMPUTER NETWORKS. ALL UNITS – QUESTION BANK answer. 28 . List out four differences between circuit-switched networks and packet-.
|Genre:||Health and Food|
|Published (Last):||28 March 2013|
|PDF File Size:||19.48 Mb|
|ePub File Size:||18.52 Mb|
|Price:||Free* [*Free Regsitration Required]|
Write down the three types of WWW documents.
Write short notes on VRC. What is meant by segment? Anna University – B. There are 2 methods have been developed to control flow of data across communication links. A token is passed among stations. Specific responsibilities of data link layer include the following. Why are standards needed?
What is the purpose of hamming code? These bannk interoperability among unrelated software system. What is meant by Permanent virtual circuit? List out the user related attributes?
One connection is used for data transfer, netwkrks other for control information. Effect of one wire on another is called as cross talk. The three basic techniques of multiplexing are, Frequency-division multiplexing Time-division multiplexing Wave-division multiplexing 9.
Raghavendra Reddy Malapati Page 9 In distance vector hank, cost refer to hop count while in case of link state routing, cost is a weighted value based on a variety of factors such as security levels, traffic or the state of the link. How the packet cost referred in distance vector and link state routing?
EC Computer Networks – Question Bank and Important Questions – Edition
The sender and receiver are communicating with each other and are using some types of flow control at a higher level. E Civil 5th Semester Question The specific responsibilities of network layer include the following: The four aspects are, Error control Sequence control Loss control Duplication control 5.
Write short notes on error correction. The receiver must follow these steps a The unit is banj into k section each of n bits.
Creating a connection involves three steps: So it is not recommended for large amounts of text. A hamming code can be designed to correct burst errors of certain lengths.
EC2352 Computer Networks MJ2014 Question Paper
What is a buffer? The documents in the WWW can be grouped into three broad categories: Security issues include protecting data from unauthorized access and viruses. After receiving the data appended with the CRC it does the same modulo-2 division.
The network support layers are Physical layer, Data link layer and Bznk layer. Permanent virtual circuits are comparable to leased lines in circuit switching. The sender and the receiver expect confidentiality.
Raghavendra Reddy Malapati Page 2 9. What are the steps followed in checksum generator?
EC Computer Networks MJ Question Paper | Knowledge Adda
The phenomenon related to the bending of light when it passes from one medium to another. The BECN bit warns the sender of congestion in network. P e e r -t o-peer relationship: If you use large numbers the method to be effective.