CSE DEPARTMENT
IV YEAR ECE
COMPUTER NETWORKS
Mentors:
P.Sreedevi
S.MuraliChalam
UNIT I:
UNIT II:
Physical Layer: Transmission media copper, twisted pair wireless, switching and
encoding asynchronous communications: Narrow band, broad band ISDN and
ATM.
UNIT III:
UNIT IV:
Medium Access sub Layer: ALOHA, MAC addresses, Carrier sense multiple
access.IEEE 802.x Standard Ethernet, wireless LANS, Bridges.
UNIT V:
UNIT VI:
UNIT VII:
UNIT VIII:
Application Layer: Network Security, Domain name system, SNMP, Electronic
Mail: the World WEB, Multi Media.
Text Books:
Referenced Books:
Objective:
The student will be able to learn the basic concepts of communication, networks
and their models, examples of networks along with some history and background.
The student will be able to learn how many ways to connect the systems in the
network.
Outcome:
Point to Point
Provide dedicated link between two devices use actual length of wire or cable to connect the
two end including microwave & satellite link. Infrared remote control & tvs remote control.
Multipoint.
Also known as Multidrop line configuration one or more than two specific devices share a
single link capacity of the channel is shared.
The OSI model is a reference model which most IT professionals use to describe
networks and network applications.
The Physical Layer is responsible for bit-level transmission between network nodes.
The Data Link Layer is responsible for communications between adjacent network nodes.
Hubs and switches operate at the Data Link Layer.
The MAC Sub-layer is also responsible for determining when nodes on a Local Area
Network are allowed to transmit. In Ethernet, this is accomplished using the CSMA/CD
protocol.
The LLC Sub-layer The Network Layer is responsible for establishing paths for data
transfer through the network.
The Network Layer is also responsible for packet sequencing, congestion control, and
error handling. Routers operate at the Network Layer. Is responsible for synchronizing
frames, error checking, and flow control.
The Transport Layer is responsible for delivering messages between networked hosts.
the Transport Layer is also responsible for fragmentation and reassembly. In addition it is
also providing services to manage flow control and end-to-end error recovery.
The Session Layer is responsible for establishing process-to-process communications
between networked hosts.
The Presentation Layer is responsible for defining the syntax which two network hosts
use to communicate. Encryption and compression should be Presentation Layer
functions.
The Application Layer of the OSI model is responsible for providing end-user services,
such as file transfers, electronic messaging, e-mail, and virtual terminal access.
Atm model:
The physical layer provides for the transmission and reception of ATM cells across a
physical medium between two ATM devices.
The Physical Medium Dependent (PMD) sub layer is responsible for the transmission and
reception of individual bits on a physical medium. These responsibilities encompass bit
timing, signal encoding, interacting with the physical medium, and the cable or wire
itself.
The Transmission Convergence (TC) sub layer functions as a converter between the bit
stream of ATM cells and the Physical Medium Dependent sub layer. When transmitting,
the TC sub layer maps ATM cells onto the format of the Physical Medium Dependent sub
layer (such as DS-3 or SONET frames).
The ATM layer provides cell multiplexing, demultiplexing, and VPI/VCI routing
functions
The ATM Adaptation Layers (AAL) are responsible for the creation and reception of 48-
byte payloads through the lower layers of ATM on behalf of different types of
applications.
The five different AALs each provide a distinct class of service:
AAL0 AAL0 is user-defined, or No AAL, meaning that no AAL layer is used. In
AAL1 AAL1 provides circuit emulation over an ATM network.
AAL2 AAL2 is a mechanism that allows the transfer of high-speed, variable bit rate
information in an isochronous, connection-oriented manner
AAL3/4 AAL3/4 combines two once-separate AAL specifications. AAL3 was intended
for the framing of connection-oriented protocols, while AAL4 was intended for the
framing of connectionless protocols.
AAL5 AAL5 provides a way for non-isochronous, variable bit rate, connectionless
applications to send and receive data.
NetWare is a network operating system developed by Novell, Inc. It initially used
cooperative multitasking to run various services on a personal computer, and the network
protocols were based on the archetypal Xerox Network Systems stack.
The ARPANET (Advanced Research Projects Agency Network) created by the ARPA
of the United States Department of Defense during the Cold War, was the world's first
operational packet switching network, and the predecessor of the global Internet.
A LAN connects network devices over a relatively short distance. A networked office
building, school, or home usually contains a single LAN, though sometimes one building
will contain a few small LANs (perhaps one per room), and occasionally a LAN will span
a group of nearby buildings. In TCP/IP networking, a LAN is often but not always
implemented as a single IP subnet
A WAN is a geographically-dispersed collection of LANs
Other Types of Area Networks
Wireless Local Area Network - a LAN based on WiFi wireless network technology
Metropolitan Area Network - a network spanning a physical area larger than a LAN
but smaller than a WAN, such as a city. A MAN is typically owned an operated by a
single entity such as a government body or large corporation.
Campus Area Network - a network spanning multiple LANs but smaller than a MAN,
such as on a university or local business campus.
Storage Area Network - connects servers to data storage devices through a technology
like Fibre Channel.
Contribution to outcomes:
I. Assignments:
4. List two ways in which the OSI reference model and TCP/IP reference model
are the same. Now list 2 ways in which they differ?
a) Computer Network
b) Peer process
c) Protocol
d) Interface
5. What are the advantages of having layered architecture? Mention the layers of
ISO-OSI reference model?
a) Point-to-point
b) multipoint
c) Primary
d) Secondary
4. As the data packet moves from the lower to upper layers, headers are [ ]
d) None
12.The end -to- end delivery of the entire message is the responsibility of the
____layer.
ANSWERS:
1) b 2) a 3) c 4) b 5) b
6) b 7) a 8) a 9) d 10) c
11) Physical Layer 12) Transport 13) Protocols 14) Full Duplex 15) 53
16) protocol 17) message 18) ITU-T 19) Distributed processing 20) medium
UNIT II:
Objective:
The student will be able to learn the types of transmission media, types of
communication and switches, different types of digital networks.
Outcome:
Physical Layer: Transmission media copper, twisted pair wireless, switching and
encoding asynchronous communications: Narrow band, broad band ISDN and
ATM.
All communications media can be divided into two categories: physical or
conducted media, such as wires, and radiated or wireless media, which use radio
waves.
Conducted media include twisted pair wire, coaxial cable, and fiber optic cable.
In wireless transmission, various types of electromagnetic waves, such as radio
waves, are used to transmit signals.
Terrestrial microwave transmissions, satellite transmissions, cellular radio
systems, personal communication systems, pagers, infrared transmissions, and
multichannel multipoint distribution service.
A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN).
Packet switching is the approach used by some computer network protocols to
deliver data across a local or long distance connection. Examples of packet
switching protocols are Frame Relay, IP and X.25.
a circuit switching network is one that establishes a circuit (or channel) between
nodes and terminals before the users may communicate, as if the nodes were
physically connected with an electrical circuit.
message switching was the precursor of packet switching, where messages were
routed in their entirety, one hop at a time
Contribution to Outcomes:
I. Assignments:
3. How does a virtual Circuit differ from a physical Circuit? What advantages
would a virtual circuit provide?
4. How do guided media differ from unguided media? Why coaxial cable is
superior to twisted- pair cable?
4. With a neat diagram explain ISDN system with a PBX for use in large
businesses?
5. How does a virtual circuit differ from a physical circuit? What advantages
would a virtual circuit provide?
c) Satellite communications
d) Radio broadcasting
a) Twisted pairs
b) Coaxial cables
c) Optical fibers
a) The troposphere
b) The ionosphere
c) Space
10. The physical layer, in reference to the OSI model, defines the interface
between the X.25 network and the Packet mode device.
a) True b) False
12. In _____each packet of a message follows the same path from sender to
receiver.
13.____ AAl type is designed to support a data stream that has a constant bit
rate.
18. ____ layer decides which physical pathway the data should take.
ANSWERS:
1) d 2) b 3) b 4) b 5) d 6) d 7) d 8) d 9) a 10) a
11) Terminal Adapter 12) virtual Circuit switching 13) AAl1
14) 3 KHz to 300GH 15) UN guided media 18) Physical
19) Circuit switched 20) Packet switched
UNIT III:
Objective:
The student will be able to learn the concepts of framing data, mechanisms of
error detection and correction of a message, Elementary protocols in data link
layer. Applications of data link layer.
Outcome:
The student knows the responsibilities of data link layer, how to do the framing of
data, how to detect the errors and how to correct the errors. He/she can know the
main responsibility i.e. node to-node delivery of a message.
Content:
o Flow control, in addition to the one provided on the Transport layer. Data link layer error
control is not used in LAN protocols such as Ethernet, but in modems and wireless
networks.
Contribution to outcomes:
I. Assignments:
1. Discuss the use of a hamming code to correct burst errors?
3. Explain in detail the two data link protocols widely used in the internet?
4. Discuss the services provided by the data link layer to the network layer?
5. Explain one bit sliding window protocol. Give the advantages and
disadvantages of one bit sliding window protocol?
a) 2 b) 3 c) 4 d) 8
d) None
4. In stop - and -wait ARQ, if data1 has an error, the receiver sends a ____
frame. []
6. Which layer is responsible for flow control with sliding windows and
reliability with sequence numbers and acknowledgments?
a) Transport b) Application c) Internet d) Network Interface
7. IEEE subdivided the data link layer to provide for environments that need
connectionless or connection-oriented services. What are the two layers
called?
a) Physical b) MAC, LLC c) Session d) IP
a) True b) False
9. In stop and wait ARQ, if data1 has an error, the receiver sends a
_______frame.
13.In sliding flow control, if the window size is 63 ____ is the range of
sequence numbers.
16.What is SLIP
17. Poll/select line discipline requires ________ to identify the packet recipient.
19. The HDLC _________field defines the beginning and end of a frame.
20.The Address field of a frame in HDLC protocol contains the address of the
________station.
Answers:
11) Bit oriented protocol 12) Automatic Repeat Request 13) 0 to 63 14) Error
Correction 15) Zero 17) dedicated line 18)line discipline, flow control and
error control 19) flag 20) secondary.
UNIT IV:
Objective:
The student will be able to learn the media access sub layer, multiple access
protocols, IEEE standards 802.x, wireless LANs, types of bridges.
Outcome:
The student now knows the purpose of media access sub layer, problems of
multi-access channels, how to avoid the type of problems. He/she can knows the
applicability of protocols pertaining to specific situations functionality of wireless
LANS. Student can know the functionalities of bridges.
Medium Access sub Layer: ALOHA, MAC addresses, Carrier sense multiple
access.IEEE 802.x Standard Ethernet, wireless LANS, Bridges.
Multiple access protocols for channel-access control, for example CSMA/CD protocols for
collision detection and retransmission in Ethernet bus networks and hub networks,
or the CSMA/CA protocol for collision avoidance in wireless networks.
Physical addressing (MAC addressing)
LAN switching (packet switching) including MAC filtering and spanning tree protocol
10BASE5: original standard uses a single coaxial cable into which you literally tap a connection by
drilling into the cable to connect to the core and screen. Largely obsolete, though due to its
widespread deployment in the early days, some systems may still be in use. Was known also as
Thick-Ethernet.
10BASE2 (also called Thin Net or Cheaper net): 50 coaxial cable connects machines together,
each machine using a T-adaptor to connect to its NIC. Requires terminators at each end. For
many years this was the dominant Ethernet standard 10 Mbit/s.
10BASE-T: runs over four wires (two twisted pairs) on a Category 3 or Category 5 cables. A hub or
switch sits in the middle and has a port for each node. This is also the configuration used for
100BASE-T and gigabit Ethernet. 10 Mbit/s.
The Ethernet Version 2 or Ethernet II frame, the so-called DIX frame (named after DEC, Intel, and
Xerox); this is the most common today, as it is often used directly by the Internet Protocol.
Novell's non-standard variation of IEEE 802.3 ("raw 802.3 frame") without an IEEE 802.2 LLC
header.
Contribution to Outcomes
I. Assignments:
d. Consider the delay of pure ALOHA versus slotted ALOHA at low load.
Which one is less? Explain your answer.
a) 1/e b) 1/2e c) e d) 2e
b) 10 Base 2
c) 10 Base T
d) None
6. What is a MAC?
a) A Computer made by Apple
b) Memory Address Corruption
c) Mediocre Apple Computer
d) Media Access Control
7. The ________is a product of the LLC sub layer.
a) 802.3 frame b) 802.5 frame c) PDU d) preamble
12. In transparent bridge ,both source and destinations are in the same LAN,
then a frame is ________
14. The monitor station in the ___ standard ensures that one and only one
token is circulating.
15. Another term for CSMA/CD and the IEEE802.3 standard is _____
Ans: All these 3 are related to ethernet cables, where 10base2 can define as
maximum rate of data transfer is 10megabits per second ,B stands for baseband
signaling and 2 is for 200 meter of length... this is same for 10base5 but where
in 10baset T stands for twisted pair of cable
Answers:
11) Same data rate 12) Discarded 13) Mac14) 802.4 15) Ethernet 16)
ethernet17) distributed queue dual bus 19) physical and data link layer 20)
switched multi mega bit data services
UNIT V:
Objective:
The student will be able to learn about services of network layer, different
store-and-forward subnets, principals of different routing algorithms,
Outcome:
Multipath Routing
There are several paths between pairs of nodes that are almost equally
good. Sometimes in order to improve the performance multiple paths between
single pair of nodes are used. This technique is called multipath routing or
bifurcated routing.
Hierarchical Routing
In this method of routing the nodes are divided into regions based on
hierarchy. A particular node can communicate with nodes at the same hierarchical
level or the nodes at a lower level and directly under it. Here, the path from any
source to a destination is fixed and is exactly one if the hierarchy is a tree.
Flooding: Flooding adapts the technique in which every incoming packet is sent
on every outgoing line except the one on which it arrived. One problem with this
method is that packets may go in a loop. As a result of this a node may receive
several copies of a particular packet which is undesirable
Contribution to Outcomes
i. Assignments:
d) None
4. Which routing algorithm requires more traffic between routers for setup
and updating?
13. The other name of the Distance Vector routing algorithm is __________
14. Sending a packet to all destinations simultaneously is _______
15. A________ is a subset of the subnet that includes all the routers but contains
no loops.
Ans: Sending a message to a group is called multicasting, and its routing algorithm
is called multicast routing.
Answers:
11) Network 12) flooding 13) Bellman-ford 14) broadcasting 15) spanning tree16)
Address resolution protocol17) Reverse Address resolution protocol 18) yes
UNIT VI:
Objective:
Outcome:
The can identify the congestion, principals and prevention polices for to
control the congestion in virtual circuits and datagram circuits. He/she can know
the main responsibility of network layer i.e. end-to-end transmission and how to
handle the problems in different networks.
Content:
Introduction'
Congestion occurs when the source sends more packets than the destination can
handle. When this congestion occurs performance will degrade. Congestion occurs when
these buffers gets filled on the destination side. The packets are normally temporarily
stored in the buffers of the source and the destination before forwarding it to their upper
layers.
Congestion control
Congestion control can be used to calculate the amount of data the sender can
send to the destination on the network. Determining the amount of data is not easy, as the
bandwidth changes from time to time, the connections get connected and disconnected.
Based on these factors the sender should be able to adjust the traffic. TCP congestion
control algorithms are used to detect and control congestion. The following are the
congestion algorithms we will be discussing.
Contribution to Outcomes
I. Assignments:
4. The protocol field used in the IPV4 header is not present in the fixed IPV6
header .Why not?
a) Autonomous System
b) Internetworking
d) None
a) A b) B c) C d) D
3. For what does the data link layer look for as it sends a frame from one link
to another?
5. When a host knows its physical address but not its IP address ,it can use____
15.When too many packets are present in the subnet ,performance degrades is
_____
16.What is the minimum and maximum length of the header in the TCP
segment and IP datagram?
Ans: The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.
It is a protocol used to advertise the set of networks that can be reached with
in an autonomous system. BGP enables this information to be shared with
the autonomous system. This is newer than EGP (Exterior Gateway Protocol
Answers:
1) a 2) c 3) d 4) c 5) d 6) d7) c 8) 9) 10)
11) Physical, IP address 12) Transport 13) Dynamic Host Configuration protocol
14) Handling the two different networks interwork 15) Congestion
UNIT VII:
Objective:
The student will be able to learn the services provided to the upper layers,
elements of transport protocols, internet protocols i.e. TCP and UDP.HE/SHE learn
the transport functionality of ATM AAL layer protocol.
Outcome:
The student can identify the task is to provide reliable, cost effective data
transport from source machine to destination machine, what kind of service is
provided to the application layer.
Piggybacking of acknowledments: The ACK for the last received packet need not be
sent as a new packet, but gets a free ride on the next outgoing data frame (using the ACK
field in the frame header). The technique is temporarily delaying outgoing ACKs so that
they can be hooked on the next outgoing data frame is known as piggybacking. But ACK
can't be delayed for a long time if receiver (of the packet to be acknowledged) does not
have any data to send.
Flow and congestion control: TCP takes care of flow control by ensuring that both ends
have enough resources and both can handle the speed of data transfer of each other so
that none of them gets overloaded with data. The term congestion control is used in
almost the same context except that resources and speed of each router is also taken care
of. The main concern is network resources in the latter case.
UDP -- like its cousin the Transmission Control Protocol (TCP) -- sits directly on top of
the base Internet Protocol (IP). In general, UDP implements a fairly "lightweight" layer
above the Internet Protocol. It seems at first site that similar service is provided by both
UDP and IP, namely transfer of data. But we need UDP for multiplexing/demultiplexing
of addresses.
UDP Headers
The UDP header consists of four (4) fields of two bytes each:
checksum
I. Assignments:
1. What are the different flags in TCP segment explain each of them?
3. What are the different flags in TCP segment? Explain each of them.
c) Source to destination
d) None
2. In the transport layer ___ is a connection less service.
a) Cons
b) Clns
c) Cots
d) Clts
a) Connectionless
b) Connection-oriented
c) Segmentation
d) None
4. Making sure that data segments arrive in the correct order is ____ control
2. To call a remote procedure ,the client program must be bound with a small
library procedure called _____
5. The hardware (or) software with in the transport layer that does the work is
called _____
Ans: Flow control: adjust and confirm data flow rate for successful transmission. Error
Control: a way to recover corrupted data.
1) b 2) b 3) b 4) a 5) d 6)d 7)8)9)10)
UNIT VIII:
Objective: The student will be able to learn the network security problems,
different applications and application layer protocols i.e. FTP, SMTP, SNMP,
FTAM, DNS, TELNET.
Outcome:
The student knows the application layer provides interfaces and support for
services such as electronic mail, remote file access and transfer, shared database
management, and other types of distributed information services. He/she can know
the mechanisms of secure data.
Content:
Resource Records:
Every domain whether it is a single host or a top level domain can have a set of resource records
associated with it. Each resource record has five fields and looks as below
Domain Time to
Class Type Value
Name Live
Domain name: the domain to which this record applies.
Class: set to IN for internet information. For other information other codes
may be specified.
Type: tells what kind of record it is.
Time to live: Upper Limit on the time to reach the destination
Value: can be an IP address, a string or a number depending on the record
type.
The concept of sending electronic text messages between parties in a way analogous to
mailing letters or memos predates the creation of the Internet
FTP or file transfer protocol is used to transfer (upload/download) data from one
computer to another over the internet or through or computer network. FTP is a most
commonly communication protocol for transferring the files over the internet.
IP (Internet Protocol)
TFTP
Trivial File Transfer Protocol (TFTP) is a very simple file transfer protocol with
the very basic features of the FTP. TFTP can be implemented in a very small amount of
memory. TFTP is useful for booting computers such as routers. TFTP is also used to
transfer the files over the network. TFPT uses UDP and provides no security features.
SNMP
The simple network management protocol (SNMP) forms the TCP/IP suite. SNMP is
used to manage the network attached devices of the complex network.
PPTP
The point to point tunneling protocol is used in the virtual private networks. PPP works
by sending regular PPP session. PPTP is a method of implementing VPN networks.
Contribution to Outcomes
I. Assignments:
5. What is the purpose of the DNS and discuss the three main divisions of
DNS?
a) HTTP
b) HTML
c) CGI
d) Java
a) NVT
b) TELNET
c) TCP/IP
d) All of the above
a) Message preparation
b) Envelope creation
d) A and B
a) Encryption
b) Decryption
c) Hashing
d) A and B
a) a hash function
b) a secret key
c) a nonce
6. Mail services are available to network users through the ______ layer.
a. Data link b. Physical c. Transport d. Application
7. An SNMP manager can send ______messages
a) GetRequest b) SetRequest c) GetNextRequest d)all
8. An SNMP agent can send ______messages
b) GetResponse b) GetRequest c) GetNextRequest d) SetRequest
14.Cryptography means_________
Answers:
1) a 2) b 3) c 4) a 5) a6)7)d8)a9)a10)a
11) Joint Photographic Experts Group 12) Motion Picture Experts Group