Computer Networks Year Question bank. Uploaded by . Check the answer (10) b. Bit stuff the . ec computer networks question bank. Uploaded by. PART-A(10 × 2 = 20). (Answer all the Questions). 1. Define a computer network. 2 . What is the similarity between transport layer and data link layer? 3. Define. ECCOMPUTER NETWORKS. ALL UNITS – QUESTION BANK answer. 28 . List out four differences between circuit-switched networks and packet-.

Author: Malar Nasida
Country: France
Language: English (Spanish)
Genre: Photos
Published (Last): 1 January 2009
Pages: 62
PDF File Size: 7.55 Mb
ePub File Size: 14.39 Mb
ISBN: 898-3-49888-594-6
Downloads: 3694
Price: Free* [*Free Regsitration Required]
Uploader: Akinohn

P e e r -t o-peer relationship: Mention the types of errorsE There are 2 types of errors a Single-bit error. The client has three components: A brouter is a single protocol or multiprotocol router that sometimes acts as a router and sometimes acts as a bridge. Switched virtual circuit format is comparable conceptually to dial-up line in circuit switching.

EC Computer Networks MJ Question Paper | Knowledge Adda

The receiver must able to prove that a received message came from a specific sender. Questionn the basic model of FTP. It is the mechanism to correct the errors and it networjs be handled in 2 ways. At the sending and receiving end of the transmission, TCP divides long transmissions into smaller data units and packages each into a frame called a segment. Uses two characters to identify a country as the last suffix. What is meant by quality of service? The seven layers of the OSI model belonging to three subgroups.

How the packet cost referred in distance vector and link state routing? The private key is kept by the receiver. What are the functions of LLC? Fiber with extremely small diameter that limits beams to a few angles, resulting in an almost horizontal beam. What are the responsibilities of network layer?


This information is added in the form of headers ec235 trailers. At the receiving machine, the headers or trailers attached to the data unit at the corresponding sending layers are commputer, and actions appropriate to that layer are taken.


One connection is used for data transfer, the other for control information. What is the purpose of HTML? What is a digital signature?

What are the criteria used to evaluate transmission medium?

What is the purpose of Domain Name System? Write down the three types of WWW documents. Mention the types of frames in HDLC. So it is not recommended for large amounts of text.

Computsr is a system for sending messages to other computer users based on e- mail addresses. In datagram approach, each packet is treated independently from all others. What are the duties of the transport layer?

There are 4 types of redundancy checks are used in data communication. Virtual circuit transmission is implemented in 2 formats.

Why is an application such as POP needed for electronic messaging? After receiving the data appended with the CRC it does the same modulo-2 division. Headers are added to the message at the layers 6,5,4,3, and 2. The time-to-live determines the lifetime of a packet.

EC2352 Computer Networks MJ2014 Question Paper

What is a virtual circuit? A trailer is added at layer2. What is the function of SMTP?

The data must arrive at the receiver exactly as it was sent. What are data grams?


EC Computer Networks – Question Bank and Important Questions – Edition

If there are no standards, difficulties arise. Raghavendra Reddy Malapati Page 12 Discuss the mode for propagating light along optical channels There are two modes for propagating light along optical channels, multimode and single mode. Discuss the three main division of the domain name space.

S frames — used only to transport control information, primarily data link layer and error controls. Ec252 pathway requiring the smallest number of relays, it is called hop-count routing, in which every link is considered to be of equal length and given the value one.

The compkter of service defines a set of attributes related to the performance of the connection.

The sender uses this key and an encryption algorithm to encrypt data; the receiver uses the same key and the corresponding decryption algorithm to decrypt the data. As the time-to-live field is generated, each packet is marked with a lifetime; usually the number of hops that are allowed before auestion packet is considered lost and accordingly, destroyed. The data connection is made between the data transfer processes.

Combined station sends both commands and responses For one million people to communicate, a half-billion secret keys are needed.