EC2352 COMPUTER NETWORKS QUESTION BANK WITH ANSWERS PDF

Computer Networks Year Question bank. Uploaded by . Check the answer (10) b. Bit stuff the . ec computer networks question bank. Uploaded by. PART-A(10 × 2 = 20). (Answer all the Questions). 1. Define a computer network. 2 . What is the similarity between transport layer and data link layer? 3. Define. ECCOMPUTER NETWORKS. ALL UNITS – QUESTION BANK answer. 28 . List out four differences between circuit-switched networks and packet-.

Author: Nazil Mukree
Country: India
Language: English (Spanish)
Genre: Spiritual
Published (Last): 21 November 2017
Pages: 65
PDF File Size: 11.36 Mb
ePub File Size: 14.80 Mb
ISBN: 833-7-34602-974-1
Downloads: 49000
Price: Free* [*Free Regsitration Required]
Uploader: JoJojinn

Why is an application such as POP needed for electronic messaging? The network layer is netwoks for the source-to-destination delivery of packet across multiple network links. Define registered hosts according to their generic behavior, uses generic suffixes.

Raghavendra Reddy Malapati Page 11 The size of the data unit belonging to a single session are so small that several can fit together into a single datagram or frame, the cojputer protocol combines them into a single data unit. Write short notes on VRC. In network transactions, you can create an equivalent of an electronic or digital signature by the way you send data. The private key is kept by the receiver.

A token is passed among stations. If it dose not, a change is assumed to have occurred and the sending router then alerts the rest of the network in its next LSP. A hamming code can be designed to correct burst errors of certain lengths.

The UA prepares the message, creates the envelope, and puts the message in the envelope. The server has two components: What is meant by switched virtual circuit? Security issues include protecting data from unauthorized access and viruses.

  KOMUNIKACIJA TEORIJA IR PRAKTIKA PDF

What are the two types of implementation formats in virtual circuits? If you use large netwprks the method to be effective.

EC2352 Computer Networks MJ2014 Question Paper

Remove the restriction of a shared secret key between two entities. In longitudinal redundancy check LRCa block of bits is divided into rows and a redundant row of bits is added to the whole block. It is used in crating dynamic documents.

Domain name space is divided into three different sections: Effect of one wire on another is called as cross talk. What is time-to-live or packet lifetime? Creating a connection involves three steps: The BECN bit warns the sender of congestion in network. As the time-to-live field is generated, each packet is marked with a lifetime; usually the number of hops that are allowed before a packet is considered lost and accordingly, destroyed.

What is the purpose of Domain Name System? What is the difference between a passive and an active hub? The transport layer ensures end-to-end reliable data transmission.

EC Computer Networks MJ Question Paper | Knowledge Adda

Instead, the receiver looks for changes from one level to another as its basis for recognition of 1s. The protocol in the transport layer takes care in the delivery of data from one application program on one device to an application program on another device.

What are the responsibilities of data link layer? Write short notes on FDDI. What is Token Bus? Fixed-content documents that are created and stored in a server.

  ASA 5540 DATASHEET PDF

This information is added in the form of headers or trailers. What are the duties of the transport layer? What are the rules of boundary-level masking? Token Bus is a physical bus that operates as a logical ring using tokens. Data communication is the exchange of data in the form of 1s and 0s between two devices via some form of transmission medium such as a wire cable.

What is meant by hop count? A CRC generator uses a modulo-2 division. Name four factors needed for a secure network. In public key, there are two keys: In secret key, the same key is used by both parties.

An active hub contains a repeater that regenerates the received bit patterns before sending them out. Mention the types of errorsE There are 2 types of errors a Single-bit error. Permutation is transposition in bit level.

What is meant by quality of service?

What is a buffer? SMTP provides mail exchange between users on the same or different computers. These allow interoperability among unrelated software system. What are the three fundamental characteristics determine the effectiveness of the data communication system? The seven layers of the OSI model belonging to three subgroups.