“CS Computer Networks (CN) Notes, Previous Years Question Papers” Department: Electronics & Communication Engineering (ECE). Year: Third Year . COMPUTER NETWORKS. Lecture Notes. DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING. SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN. ECE-VII-COMPUTER COMMUNICATIONÂ_NETWORK tvnovellas.info - Download as PDF Computer Communication Networks 06EC71 PART A Unit 1: Network .
|Language:||English, Spanish, Arabic|
|Genre:||Academic & Education|
|ePub File Size:||25.88 MB|
|PDF File Size:||13.35 MB|
|Distribution:||Free* [*Sign up for free]|
DEPARTMENT OF ECE in the notes below. We will first list the layers as . A network topology is the basic design of a computer network. It is very much like a . Lecture Notes Introduction to Computer Networks (ppt, pdf, web); Physical Layer (ppt, pdf, web); Direct Link Networks (ppt, pdf, web); Reliable Communication. COMPUTER COMMUNICATION. NETWORKS NOTES. Prepared by: SHIVANAND GOWDA K R. Asst. Prof., Dept of ECE,. Alpha College Of Engineering.
Add to Wishlist Install LectureNotes is a platform for Peer-to-Peer Notes sharing, where faculties, toppers, and institutes share their class notes with other students. LectureNotes aims to remove dictation from Classroom and bind the students and teachers educators community worldwide into a single platform where they can Learn, Share and Educate each other. Students can find notes for all their subjects relevant to their syllabus prepared by faculties of their own university. They can connect with the faculty, get their doubts cleared and prepare well for both universities, placements, competitive exams and improve their knowledge and understanding of the concept. Seminar presentations, project reports and much more are planned to be added soon.
This process is called automatic repeat request ARQ. What is Stop-and-Wait Protocol? In Stop and wait protocol, sender sends one frame, waits until it receives confirmation from the receiver okay to go ahead , and then sends the next frame.
Error correction in Stop-and-Wait ARQ is done by keeping a copy of the sent frame and retransmitting of the frame when the timer expires.
What is usage of Sequence Number in Relaible Transmission? The protocol specifies that frames need to be numbered. This is done by using sequence numbers. A field is added to the data frame to hold the sequence number of that frame. Since we want to minimize the frame size, the smallest range that provides unambiguous communication.
The sequence numbers can wrap around. What is Pipelining? In networking and in other areas, a task is often begun before the previous task has ended. This is known as pipelining. What is Sliding Window? The sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the sender and receiver. In other words, he sender and receiver need to deal with only part of the possible sequence numbers.
What is Piggy Backing? A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also carry control information about arrived or lost frames from B; when a frame is carrying data from B to A, it can also carry control information about the arrived or lost frames from A.
What are the two types of transmission technology available? What is subnet? A generic term for section of a large networks usually separated by a bridge or router. Difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc.
Communication means the meaning full exchange of information between two communication media. What are the possible ways of data exchange? What is SAP? Series of interface points that allow other computers to communicate with the other layers of network protocol stack. The standard protocol has been defined between the terminal and the PAD, called X.
What is frame relay, in which layer it comes? Frame relay is a packet switching technology. It will operate in the data link layer. What is terminal emulation, in which layer it comes?
Telnet is also called as terminal emulation. It belongs to application layer. What is Beaconing? The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions.
What is redirector? This comes under presentation layer. A transport protocol designed by microsoft and IBM for the use on small subnets.
What is RAID?
A method for providing fault tolerance by using multiple hard disk drives. What is passive topology? Example for passive topology -linear bus. What is Brouter? Hybrid devices that combine the features of both bridges and routers. What is cladding? A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable. Q 38 How a Switch is different from a Hub?
Ans Below are the differences between a Switch and a Hub, Below given snapshot clearly, explains the difference between a switch and a hub, Q 39 Define Round Trip Time?
Ans The time taken for a signal to reach the destination and travel back to the sender with the acknowledgment is termed as Round Trip time RTT.
Q 40 Define Brouter? Ans Brouter or Bridge Router is a device which acts as both bridge and a router. As a bridge, it forwards data between the networks. And as a router, it routes the data to specified systems within a network.
It is assigned by the Internet Service Provider as a permanent address. Dynamic IP is the temporary IP address assigned by the network to a computing device. Dynamic IP is automatically assigned by the server to the network device. Q 42 How VPN is used in the corporate world?
Corporate companies, educational institutions, government offices etc use this VPN. Q 43 What is the difference between Firewall and Antivirus? Ans Firewall and Antivirus are two different security applications used in networking.
A firewall acts as a gatekeeper which prevents unauthorized users to access the private networks as intranets. A firewall examines each message and blocks the same which are unsecured. Antivirus is a software program that protects a computer from any malicious software, any virus, spyware, adware etc. Note: A Firewall cannot protect the system from virus, spyware, adware etc.
Q 44 Explain Beaconing? Ans If a network self-repair its problem then it is termed as Beaconing.
If a device in the network is facing any problem, then it notifies the other devices that they are not receiving any signal. Likewise, the problem gets repaired within the network. Q 45 Why the standard of an OSI model is termed as Ans OSI model was started in the month of February in So it is standardized as When a new device is added to the network, it broadcasts a message stating that it is new to the network. Then the message is transmitted to all the devices of the network.
Q 47 How can a network be certified as an effective network? What are the factors affecting them? The factors affecting the performance of a network are hardware, software, transmission medium types and the number of users using the network.
Reliability: Reliability is nothing but measuring the probability of failures occurred in a network and the time taken by it to recover from it. The factors affecting the same are the frequency of failure and recovery time from failure. Security: Protecting the data from viruses and unauthorized users. The factors affecting the security are viruses and users who do not have permission to access the network.
Q 48 Explain DNS? DNS acts as a translator between domain names and IP address. As humans remember names, the computer understands only numbers. Generally, we assign names to websites and computers like gmail. When we type such names the DNS translates it into numbers and execute our requests. Translating the names into numbers or IP address is named as a Forward lookup. Translating the IP address to names is named as a Reverse lookup. This is used to design or develop standards that are used for networking.
Q 50 What is the use of encryption and decryption? Ans Encryption is the process of converting the transmission data into another form that is not read by any other device other than the intended receiver. Decryption is the process of converting back the encrypted data to its normal form.
An algorithm called cipher is used in this conversion process. Q 51 Brief Ethernet? For example, if we connect a computer and laptop to a printer, then we can call it as an Ethernet network. Ethernet acts as the carrier for internet within short distance networks like a network in a building. The main difference between Internet and Ethernet is security.
Ethernet is safer than the internet as Ethernet is a closed loop and has only limited access. Q 52 Explain Data Encapsulation? Ans Encapsulation means adding one thing on top of the other thing. When a message or a packet is passed through the communication network OSI layers , every layer adds its header information to the actual packet.
This process is termed as Data Encapsulation. Note: Decapsulation is exactly the opposite of encapsulation. Question Banks. Thank you for visiting my thread. Hope this post is helpful to you.
Have a great day!
Kindly share this post with your friends to make this exclusive release more useful. Notify me of follow-up comments by email.
Notify me of new posts by email. Leave this field empty. Welcome to EasyEngineering, One of the trusted educational blog. Check your Email after Joining and Confirm your mail id to get updates alerts. Lecture Notes. Part A — 2 Marks. Part B — 16 Marks. Other Useful Links.
Your Comments About This Post. Is our service is satisfied, Anything want to say? Cancel reply.