Class lecture notes for third Year,sixth semester Computer Networks (Subject Code: EC) is available here in PDF formats for you to. In recent years, the network that is making significant impact in our day-to-day life is the Computer network. By computer network we mean an interconnected set. EC / EC62 / EC Computer Networks Complete Notes-Unit Wise ECE 6th Semester Regulation | BE Electronics and Communication.

Author: Dubar Nejora
Country: Samoa
Language: English (Spanish)
Genre: Video
Published (Last): 16 January 2014
Pages: 158
PDF File Size: 16.46 Mb
ePub File Size: 4.54 Mb
ISBN: 625-4-29993-438-6
Downloads: 89029
Price: Free* [*Free Regsitration Required]
Uploader: Tulabar

EC2352 Computer Networks MJ2014 Question Paper

For one million users to communicate, only two million keys are needed. Anna University Department of Civil Engineering B.

Like Ethernet, station communicates via a common bus. How will the congestion be avoided?

So it is not recommended for large amounts of text. The FECN bit is used to warn the computsr of congestion in the network.

One or more synchronization bits are usually added to the beginning of each frame. Write short notes on CRC generator. A character level encryption in which each character is replaced by another character in the set. What are the functions of LLC? Specific responsibilities of data link layer include the following. A Character level encryption in which the characters retain their plaintext but the position of the character changes Raghavendra Reddy Malapati Page Raghavendra Reddy Malapati Page 11 The size of the data unit belonging to a single session are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit.


Discuss the basic model of FTP. One connection is used for data transfer, the other for control information. What are the three fundamental characteristics determine the effectiveness of the data communication system?

EC Computer Networks – Unit 1 PPT Lecture Notes – Vijay Edition

We can use the shielded twisted pair cable or coaxial cable for transmission, which contains metal foil to reduce cross talk. These bits are called framing bits.

What is framing bits? I frames — used to transport user data and control information relating to user data. In network transactions, you can create an equivalent of an electronic or digital signature by the way you send data.

Instead, the receiver looks for changes from one level to another as its basis for recognition of 1s. The time-to-live determines the lifetime of a packet. P e e r -t o-peer relationship: The control nohes is made between the control processes.

It contains synchronization, flag, flow and error control specifications necessary to move information from one place to another, as well as the physical address of the next station to receive and route a packet. Security issues include protecting data from unauthorized access and viruses.

  ACS754LCB-050 - PDF

How the packet cost referred in distance vector and link state routing?


Fixed-content documents that are created and stored in a server. Virtual circuit transmission is implemented in 2 formats. The transport layer is responsible form source-to-destination delivery of the entire message.

The client has three components: What is the difference between a passive and an active hub? Write down the three types of WWW documents. There are 4 types of redundancy checks are used in data communication. In networks, communication occurs between the entities in different systems. Define a standard This information is added in the form of headers or trailers.

G e ne r ic domain: Multiple beams from a light source move through the core in different paths. Means notew 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1. Mention the types of errorsE There are 2 types of errors a Single-bit error. The system must deliver data in a timely manner.