Anda di halaman 1dari 40

SWARNA BHARATHI INSTITUTE OF SCIENCE & TECHNOLOGY

CSE DEPARTMENT

IV YEAR ECE

COMPUTER NETWORKS

Mentors:

P.Sreedevi

S.MuraliChalam
UNIT I:

Introduction: OSI, TCP/IP and other network models. Examples of Networks:


Novell Networks, Arpanet, Internet, Network Topologies, WAN, LAN, MAN.

UNIT II:

Physical Layer: Transmission media copper, twisted pair wireless, switching and
encoding asynchronous communications: Narrow band, broad band ISDN and
ATM.

UNIT III:

DataLinkLayer: Design issues, framing, error correction, CRC, Elementary


Protocol-stop and wait, sliding Window, Slip, and Data link layer in HDLC,
internet, ATM.

UNIT IV:

Medium Access sub Layer: ALOHA, MAC addresses, Carrier sense multiple
access.IEEE 802.x Standard Ethernet, wireless LANS, Bridges.

UNIT V:

Network Layer: Virtual circuit and Datagram subnets-Routing algorithm shortest


path routing, Flooding, Hierarchical routing, Broad cast, Multi cast, distance vector
routing.

UNIT VI:

Dynamic routing-Broadcast routing, Rotary for mobility. Congestion, Control


Algorithms-General Principles-of Congestion prevention policies. Internet
working: The Network layer in the internet and in the ATM Networks.

UNIT VII:

Transport Layer: Transport Services, Connection management, TCP and UDP


protocols: ATM AAL Layer Protocol.

UNIT VIII:
Application Layer: Network Security, Domain name system, SNMP, Electronic
Mail: the World WEB, Multi Media.

Text Books:

1. Computer Networks-Andrew S Tanenbaum, 4th Edition, Pearson


Education/PHI

2. Data Communications and Networking-Behrouz A.Forouzan, 3rd Edition


TMH.

Referenced Books:

1. An Engineering Approach to Computer Networks S.Keshav , 2nd Edition,


Pearson Education

2. Understanding communications and Networks, 3rd edition, W.A. Shay,


Thomson.
UNIT I:

Objective:

The student will be able to learn the basic concepts of communication, networks
and their models, examples of networks along with some history and background.
The student will be able to learn how many ways to connect the systems in the
network.

Outcome:

The student can differentiate network models (OSI,TCP/IP,ATM)and network


topologies.(STAR,RING ,MESH,BUS)The student now can know the different
types of networks i.e. WAN, LAN, MAN. He/she knows the functionalities of
each layer in different network models.

Content & Description:

Introduction: OSI, TCP/IP and other network models. Examples of Networks:


Novell Networks, Arpanet, Internet, Network Topologies, WAN, LAN, MAN.
A computer network is a group of computers that are connected to each other for the purpose of
communication.
It is the way two or more communication devices attach to a link. A Link is the physical
communication pathway that transfers data from one device to another.

Point to Point
Provide dedicated link between two devices use actual length of wire or cable to connect the
two end including microwave & satellite link. Infrared remote control & tvs remote control.

Multipoint.
Also known as Multidrop line configuration one or more than two specific devices share a
single link capacity of the channel is shared.

A computer network topology is the physical communication scheme used by connected


devices.

The OSI model is a reference model which most IT professionals use to describe
networks and network applications.

The Physical Layer is responsible for bit-level transmission between network nodes.
The Data Link Layer is responsible for communications between adjacent network nodes.
Hubs and switches operate at the Data Link Layer.
The MAC Sub-layer is also responsible for determining when nodes on a Local Area
Network are allowed to transmit. In Ethernet, this is accomplished using the CSMA/CD
protocol.
The LLC Sub-layer The Network Layer is responsible for establishing paths for data
transfer through the network.
The Network Layer is also responsible for packet sequencing, congestion control, and
error handling. Routers operate at the Network Layer. Is responsible for synchronizing
frames, error checking, and flow control.
The Transport Layer is responsible for delivering messages between networked hosts.
the Transport Layer is also responsible for fragmentation and reassembly. In addition it is
also providing services to manage flow control and end-to-end error recovery.
The Session Layer is responsible for establishing process-to-process communications
between networked hosts.
The Presentation Layer is responsible for defining the syntax which two network hosts
use to communicate. Encryption and compression should be Presentation Layer
functions.
The Application Layer of the OSI model is responsible for providing end-user services,
such as file transfers, electronic messaging, e-mail, and virtual terminal access.
Atm model:
The physical layer provides for the transmission and reception of ATM cells across a
physical medium between two ATM devices.
The Physical Medium Dependent (PMD) sub layer is responsible for the transmission and
reception of individual bits on a physical medium. These responsibilities encompass bit
timing, signal encoding, interacting with the physical medium, and the cable or wire
itself.
The Transmission Convergence (TC) sub layer functions as a converter between the bit
stream of ATM cells and the Physical Medium Dependent sub layer. When transmitting,
the TC sub layer maps ATM cells onto the format of the Physical Medium Dependent sub
layer (such as DS-3 or SONET frames).
The ATM layer provides cell multiplexing, demultiplexing, and VPI/VCI routing
functions
The ATM Adaptation Layers (AAL) are responsible for the creation and reception of 48-
byte payloads through the lower layers of ATM on behalf of different types of
applications.
The five different AALs each provide a distinct class of service:
AAL0 AAL0 is user-defined, or No AAL, meaning that no AAL layer is used. In
AAL1 AAL1 provides circuit emulation over an ATM network.
AAL2 AAL2 is a mechanism that allows the transfer of high-speed, variable bit rate
information in an isochronous, connection-oriented manner
AAL3/4 AAL3/4 combines two once-separate AAL specifications. AAL3 was intended
for the framing of connection-oriented protocols, while AAL4 was intended for the
framing of connectionless protocols.
AAL5 AAL5 provides a way for non-isochronous, variable bit rate, connectionless
applications to send and receive data.
NetWare is a network operating system developed by Novell, Inc. It initially used
cooperative multitasking to run various services on a personal computer, and the network
protocols were based on the archetypal Xerox Network Systems stack.
The ARPANET (Advanced Research Projects Agency Network) created by the ARPA
of the United States Department of Defense during the Cold War, was the world's first
operational packet switching network, and the predecessor of the global Internet.

A LAN connects network devices over a relatively short distance. A networked office
building, school, or home usually contains a single LAN, though sometimes one building
will contain a few small LANs (perhaps one per room), and occasionally a LAN will span
a group of nearby buildings. In TCP/IP networking, a LAN is often but not always
implemented as a single IP subnet
A WAN is a geographically-dispersed collection of LANs
Other Types of Area Networks

Wireless Local Area Network - a LAN based on WiFi wireless network technology
Metropolitan Area Network - a network spanning a physical area larger than a LAN
but smaller than a WAN, such as a city. A MAN is typically owned an operated by a
single entity such as a government body or large corporation.

Campus Area Network - a network spanning multiple LANs but smaller than a MAN,
such as on a university or local business campus.

Storage Area Network - connects servers to data storage devices through a technology
like Fibre Channel.

System Area Network - links high-performance computers with high-speed


connections in a cluster configuration

Contribution to outcomes:

I. Assignments:

1. What are two reasons for using Layered Protocols?

2. What is the principal difference between Connection-less communication and


connection-oriented communication?
3. What is the main difference between TCP and UDP?

4. List two ways in which the OSI reference model and TCP/IP reference model
are the same. Now list 2 ways in which they differ?

5. Why does ATM use small, fixed-length cells?

II. Important Questions:

1. Define the following terms:

a) Computer Network

b) Peer process

c) Protocol

d) Interface

2. Discuss various network applications and goals in detail?

3. Explain problems of the TCP/IP model and protocols?

4. With a neat diagram explain ARPANET design?

5. What are the advantages of having layered architecture? Mention the layers of
ISO-OSI reference model?

6. What is Internet? Mention some of the applications of Internet?

III. Objective Type Questions:

Multiple Choice Questions:

1. In a network with 25 computers, which topology would require the most


extensive cabling? [ ]

a) mesh b) star c) bus d) ring

2. A __________ connection provides a dedicated link between 2 devices. [ ]

a) Point-to-point

b) multipoint

c) Primary
d) Secondary

3. Why was the OSI model developed? [ ]

a) Manufactures disliked the TCP/IP protocol Suite.

b) The rate of data transfer was increasing exponentially.

c) Standards were needed to allow any 2 systems to communicate.

d) None of the above.

4. As the data packet moves from the lower to upper layers, headers are [ ]

a) Added b) subtracted c) Rearranged d) modified

5. In the_________ layer, the data unit is called a frame. [ ]

a) Physical b) data link c) network d) transport

6. Mackenzie Publishing with head quarters in London and branch offices


through out Asia ,Europe and South America, is probably connected by
a_____________. [ ]

a) LAN b)WAN c)MAN d)NONE

7. Security and privacy are less of an issue for devices in a_________


topology . [ ]

a) mesh b)tree c) bus d) star

8. Session layer check points _________ [ ]

a) Allow just a portion of a file to be resent

b) Detect and recover errors

c) Control the addition of errors

d) Are involved in dialog control


9. Mail services and directory services are available to network users through
the_________ layer. [ ]

a) Data link b)Session c) Transport d)Application

10. Why was the OSI Model developed? [ ]

a) Manufactures disliked the TCP/IP protocol suite.

b) The rate of data transfer was increasing exponentially.

c) Standards were needed to allow any two systems to communicate.

d) None

Fill in the Blanks:

11. The ______layer is the layer closest to the transmission medium.

12.The end -to- end delivery of the entire message is the responsibility of the
____layer.

13.____ are rules that govern a communication exchange.

14. In _____ transmission, the channel capacity is shared by both


communicating devices at all times

15.ATM cells are ______bytes long.

16. ______are rules that govern a communication exchange.

17.The information to be communicated in a data communication system is the


________

18. Which agency created standards for telephone communications (V series)


and for network interfaces and public networks (X series).

19. ______is the division of one task among multiple computers.

20.The _____ is the physical path over which a message travels.

ANSWERS:

1) b 2) a 3) c 4) b 5) b
6) b 7) a 8) a 9) d 10) c

11) Physical Layer 12) Transport 13) Protocols 14) Full Duplex 15) 53

16) protocol 17) message 18) ITU-T 19) Distributed processing 20) medium

UNIT II:

Objective:

The student will be able to learn the types of transmission media, types of
communication and switches, different types of digital networks.

Outcome:

The student can identify different types of transmission media, communications


and he /she can able to define the functioning of switches, ISDN. He/she knows
the main functionality of physical layer i.e. transmission of bits..

Content & Description:

Physical Layer: Transmission media copper, twisted pair wireless, switching and
encoding asynchronous communications: Narrow band, broad band ISDN and
ATM.
All communications media can be divided into two categories: physical or
conducted media, such as wires, and radiated or wireless media, which use radio
waves.
Conducted media include twisted pair wire, coaxial cable, and fiber optic cable.
In wireless transmission, various types of electromagnetic waves, such as radio
waves, are used to transmit signals.
Terrestrial microwave transmissions, satellite transmissions, cellular radio
systems, personal communication systems, pagers, infrared transmissions, and
multichannel multipoint distribution service.
A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN).
Packet switching is the approach used by some computer network protocols to
deliver data across a local or long distance connection. Examples of packet
switching protocols are Frame Relay, IP and X.25.
a circuit switching network is one that establishes a circuit (or channel) between
nodes and terminals before the users may communicate, as if the nodes were
physically connected with an electrical circuit.
message switching was the precursor of packet switching, where messages were
routed in their entirety, one hop at a time

Contribution to Outcomes:

I. Assignments:

1. What is the essential difference between Message Switching and Packet


Switching?

2. Discuss in detail about Broadband ISDN?

3. How does a virtual Circuit differ from a physical Circuit? What advantages
would a virtual circuit provide?

4. How do guided media differ from unguided media? Why coaxial cable is
superior to twisted- pair cable?

5. Explain ATM Architecture and Batcher Banyan Switch?

II. Important questions:

1. Discuss in detail about asynchronous communication?

2. Discuss in detail about broad band ISDN?

3. Discuss in detail about Time division switches?

4. With a neat diagram explain ISDN system with a PBX for use in large
businesses?

5. How does a virtual circuit differ from a physical circuit? What advantages
would a virtual circuit provide?

III. Objective Type Questions:

Multiple Choice Questions:

1. Which of the following is not a guided medium?

a) Twisted- pair cable b) coaxial cable c) fiber-optic cable d) atmosphere


2. Which ISDN plane is associated with signaling and the D channel?

a) User b) control c) management d) supervisory

3. Which of the following primarily uses guided media?

a) Cellular telephone system

b) Local telephone system

c) Satellite communications

d) Radio broadcasting

4. The RG number gives us information about ___

a) Twisted pairs

b) Coaxial cables

c) Optical fibers

d) All of the above

5. VLF propagation occurs in _____

a) The troposphere

b) The ionosphere

c) Space

d) All of the above

6. Which of the following is an advantage to using fiber optics data


transmission?
a) resistance to data theft b) fast data transmission rate
c) Low noise level d) all of above
7. Which of the following statement is incorrect?
a) The difference between synchronous and asynchronous transmission is
the clocking derived from the data in synchronous transmission.
b) Half duplex line is a communication line in which data can move in two
directions, but not at the same time.
c) Teleprocessing combines telecommunications and DP techniques in
online activities
d) Batch processing is the preferred processing mode for telecommunication
operation.
8. Which of the following is considered a broad band communication channel?
a) Coaxial cable
b) Fiber optics cable
c) Microwave circuits
d) All of above
9. The transmission signal coding method of TI carrier is called
a) Bipolar
b) NRZ
c) Manchester
d) Binary

10. The physical layer, in reference to the OSI model, defines the interface
between the X.25 network and the Packet mode device.
a) True b) False

Fill in the Blanks:


11._____ converts the information from non ISDN format to ISDN
format

12. In _____each packet of a message follows the same path from sender to
receiver.

13.____ AAl type is designed to support a data stream that has a constant bit
rate.

14.Radio communication frequencies range from ____

15. Smoke signals are an example of communication through________


16.What is virtual path?
Ans: Along any transmission path from a given source to a given
destination, a group of virtual circuits can be grouped together into what
is called path.
17.What is a NIC?
Ans: Network Interface Card

18. ____ layer decides which physical pathway the data should take.

19. ISDN is an example of ______ network

20. X.25 is an example of ______ network

ANSWERS:

1) d 2) b 3) b 4) b 5) d 6) d 7) d 8) d 9) a 10) a
11) Terminal Adapter 12) virtual Circuit switching 13) AAl1
14) 3 KHz to 300GH 15) UN guided media 18) Physical
19) Circuit switched 20) Packet switched

UNIT III:

Objective:

The student will be able to learn the concepts of framing data, mechanisms of
error detection and correction of a message, Elementary protocols in data link
layer. Applications of data link layer.

Outcome:

The student knows the responsibilities of data link layer, how to do the framing of
data, how to detect the errors and how to correct the errors. He/she can know the
main responsibility i.e. node to-node delivery of a message.
Content:

DataLinkLayer: Design issues, framing, error correction, CRC, Elementary


Protocol-stop and wait, sliding Window, Slip, and Data link layer in HDLC,
internet, ATM.
Encapsulation of network layer data packets into frames
Frame synchronization

Logical link control (LLC) sublayer:

o Error control (automatic repeat request,ARQ), in addition to ARQ provided by some


Transport layer protocols, to forward error correction (FEC) techniques provided on the
Physical Layer, and to error-detection and packet canceling provided at all layers,
including the network layer. Data link layer error control (i.e. retransmission of
erroneous packets) is provided in wireless networks and V.42 telephone network
modems, but not in LAN protocols such as Ethernet, since bit errors are so uncommon in
short wires. In that case, only error detection and canceling of erroneous packets are
provided.

o Flow control, in addition to the one provided on the Transport layer. Data link layer error
control is not used in LAN protocols such as Ethernet, but in modems and wireless
networks.

o Error Detection Techniques


Despite the best attempts at prevention, errors still occur. If an error is
detected, it istypical to perform some type of request for retransmission. Error
detection techniques themselves can be relatively simple or relatively elaborate.
Generally, simple techniques do not provide the same degree of error checking as
more elaborate schemes. For example, the simplest error detection technique is
simple parity. It adds a single bit to a character of data, but catches the fewest number
of errors. At the other end of the spectrum is the most elaborate and most effective
technique available today: cyclic redundancy checksum. Although it is more complex
and typically adds 16 bits of error detection code to a block of data, it is the most
effective error detection technique ever devised.
o Error Control
Once an error is detected in the received data transmission stream, what is the
receiver going to do about it? The receiver can do one of three things: nothing,
return a message to the transmitter asking it to resend the data packet that was in
error, or correct the error.

Contribution to outcomes:

I. Assignments:
1. Discuss the use of a hamming code to correct burst errors?

2. What is difference between the information fields in an HDLC I-frame


and an HDLC U-frame?

3. Explain in detail the two data link protocols widely used in the internet?

4. Discuss the services provided by the data link layer to the network layer?

5. Explain one bit sliding window protocol. Give the advantages and
disadvantages of one bit sliding window protocol?

II. Important questions:

1. Discuss the use of a hamming code to correct burst errors?


2. Explain sliding window protocol using go-back-n? What are its
advantages and disadvantages?
3. Explain in detail the two data link protocols widely used in the Internet?
4. Explain one- bit sliding window protocol .Give the advantages and
disadvantages of one-bit sliding window protocol?
5. Discuss the services provided by the data link layer to the network layer?

III. Objective Type Questions:

Multiple Choice Questions:

1. Which error detection method involves polynomials? []

a) VRC b) LRC c) CRC d) checksum

2. An ACK 3 in sliding window flow control (window size of 7) means that


frame ____ is next []

a) 2 b) 3 c) 4 d) 8

3. Piggy backing means []

a) Sending an acknowledgement separate.


b) Sending an acknowledgement and data frames simultaneously.

c) Sending only data frames.

d) None

4. In stop - and -wait ARQ, if data1 has an error, the receiver sends a ____
frame. []

a) NAK 0 b) NAK 1 c) NAK 2 d) NAK

5. Polling and Selecting are functions of the _____ in HDLC protocol. []

a) I -frame b) S-frame c) U frame d) a&b

6. Which layer is responsible for flow control with sliding windows and
reliability with sequence numbers and acknowledgments?
a) Transport b) Application c) Internet d) Network Interface

7. IEEE subdivided the data link layer to provide for environments that need
connectionless or connection-oriented services. What are the two layers
called?
a) Physical b) MAC, LLC c) Session d) IP

8. Is the following statement true of the Go-back-N error control strategy?


A transmitter may send up to N packets before it receives an
acknowledgment.

a) True b) False

9. In stop and wait ARQ, if data1 has an error, the receiver sends a
_______frame.

a) NAK 0 b) NAK 1 c) NAK 2 d) NAK

10. Flow control is needed to prevent________

a) Bit errors b) Overflow of the sender buffer

c) Overflow of the receiver buffer d) collision b/w sender and receiver.

Fill in the Blanks:


11.HDLC is a _________ protocol

12.ARQ stands for ____________

13.In sliding flow control, if the window size is 63 ____ is the range of
sequence numbers.

14.The Hamming Code is a_________ method.

15. In CRC there is no error if the remainder at the receiver is _____

16.What is SLIP

Ans: It is a very simple protocol used for transmission of IP data grams


across a serial line.

17. Poll/select line discipline requires ________ to identify the packet recipient.

18. Write the functions of data link layer?

19. The HDLC _________field defines the beginning and end of a frame.

20.The Address field of a frame in HDLC protocol contains the address of the
________station.

Answers:

1) c 2) c 3) b 4) d 5) d 6) c7) b 8)a 9)d 10)c

11) Bit oriented protocol 12) Automatic Repeat Request 13) 0 to 63 14) Error
Correction 15) Zero 17) dedicated line 18)line discipline, flow control and
error control 19) flag 20) secondary.

UNIT IV:

Objective:

The student will be able to learn the media access sub layer, multiple access
protocols, IEEE standards 802.x, wireless LANs, types of bridges.

Outcome:

The student now knows the purpose of media access sub layer, problems of
multi-access channels, how to avoid the type of problems. He/she can knows the
applicability of protocols pertaining to specific situations functionality of wireless
LANS. Student can know the functionalities of bridges.

Content & Description:

Medium Access sub Layer: ALOHA, MAC addresses, Carrier sense multiple
access.IEEE 802.x Standard Ethernet, wireless LANS, Bridges.

Multiple access protocols for channel-access control, for example CSMA/CD protocols for
collision detection and retransmission in Ethernet bus networks and hub networks,
or the CSMA/CA protocol for collision avoidance in wireless networks.
Physical addressing (MAC addressing)

LAN switching (packet switching) including MAC filtering and spanning tree protocol

10BASE5: original standard uses a single coaxial cable into which you literally tap a connection by
drilling into the cable to connect to the core and screen. Largely obsolete, though due to its
widespread deployment in the early days, some systems may still be in use. Was known also as
Thick-Ethernet.

10BASE2 (also called Thin Net or Cheaper net): 50 coaxial cable connects machines together,
each machine using a T-adaptor to connect to its NIC. Requires terminators at each end. For
many years this was the dominant Ethernet standard 10 Mbit/s.

10BASE-T: runs over four wires (two twisted pairs) on a Category 3 or Category 5 cables. A hub or
switch sits in the middle and has a port for each node. This is also the configuration used for
100BASE-T and gigabit Ethernet. 10 Mbit/s.

IEEE 802.5 Token Ring or FDDI networks

The Ethernet Version 2 or Ethernet II frame, the so-called DIX frame (named after DEC, Intel, and
Xerox); this is the most common today, as it is often used directly by the Internet Protocol.

Novell's non-standard variation of IEEE 802.3 ("raw 802.3 frame") without an IEEE 802.2 LLC
header.

IEEE 802.2 LLC frame

IEEE 802.2 LLC/SNAP frame

Contribution to Outcomes
I. Assignments:

a. Discuss about MAC addresses?

b. Explain about a bit- map collision free protocol?

c. What is a prime difference between a token bus and a token ring?

d. Consider the delay of pure ALOHA versus slotted ALOHA at low load.
Which one is less? Explain your answer.

e. What is the difference between a simple bridge and a transparent bridge?

II. Important questions:

1. Explain how the token ring is maintained in detail?


2. Does the use of wire center have any influence on the performance of a
token ring?
3. What is the prime difference between a token bus and a token ring?
4. Discuss about the file key assumptions in case of dynamic channel
allocation in LANs and WANs?
5. Discuss in detail the working of token bus?

III. Objective Type Questions:

Multiple Choice Questions:

1. Which of the following is not an internet working device?

a) Bridge b) Gateway c) Router d) All of them

2. The maximum throughput of SLOTTED ALOHA is

a) 1/e b) 1/2e c) e d) 2e

1. 3. Which project 802 standard provides for a collision-free protocol?

a) 802.2 b) 802.3 c) 802.5 d) 802.6

4. The ____ is a product of the LLC sub layer

a) 802.2 frame b) 802.5 frame c) PDU d) preamble

5. ______ uses a physical star topology


a) 10 Base 5

b) 10 Base 2

c) 10 Base T

d) None

6. What is a MAC?
a) A Computer made by Apple
b) Memory Address Corruption
c) Mediocre Apple Computer
d) Media Access Control
7. The ________is a product of the LLC sub layer.
a) 802.3 frame b) 802.5 frame c) PDU d) preamble

8. IEEE project 802 divides the data link layer into an


upper_________sublayer and a lower ________sub layer.
a) LLC,MAC b) MAC,LLC c) PDU,HDLC d)HDLC,PDU
9. Bridges function in the _______layers.
a) Physical b) Data link c) network d) a & b.
10. Repeaters function in the _______layers.
a) Physical b) Data link c) network d) a & b.

Fill in the Blanks:

11. 10 Base 2 and 10 Base 5 have different_______

12. In transparent bridge ,both source and destinations are in the same LAN,
then a frame is ________

13. _______ Sub layer performs the channel allocation.

14. The monitor station in the ___ standard ensures that one and only one
token is circulating.

15. Another term for CSMA/CD and the IEEE802.3 standard is _____

16. ______________ Architecture uses CSMA/CD access method?

17. DQDB is an acronym for________


18. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?

Ans: All these 3 are related to ethernet cables, where 10base2 can define as
maximum rate of data transfer is 10megabits per second ,B stands for baseband
signaling and 2 is for 200 meter of length... this is same for 10base5 but where
in 10baset T stands for twisted pair of cable

19. DQDB operates in the _______layers.

20. SMDS is an acronym for_____________.

Answers:

1) a 2) a 3) b 4) a 5) c 6) d 7) c8)a 9)d 10)a

11) Same data rate 12) Discarded 13) Mac14) 802.4 15) Ethernet 16)
ethernet17) distributed queue dual bus 19) physical and data link layer 20)
switched multi mega bit data services

UNIT V:

Objective:

The student will be able to learn about services of network layer, different
store-and-forward subnets, principals of different routing algorithms,

Outcome:

The students can understand the advantages and disadvantages of routing


algorithms. They can differentiate the physical layer, data link layer and network
layer.

Content & Description:

Network Layer: Virtual circuit and Datagram subnets-Routing algorithm shortest


path routing, Flooding, Hierarchical routing, Broad cast, Multi cast, distance vector
routing.
The network layer is concerned with getting packets from the source all the way
to the destination. The packets may require making many hops at the intermediate
routers while reaching the destination. This is the lowest layer that deals with end
to end transmission.

Routing is the process of forwarding of a packet in a network so that it reaches its


intended destination

Adaptive Routing Algorithm: These algorithms change their routing decisions


to reflect changes in the topology and in traffic as well. These get their routing
information from adjacent routers or from all routers

Non-Adaptive Routing Algorithm: These algorithms do not base their routing


decisions on measurements and estimates of the current traffic and topology.
Instead the route to be taken in going from one node to the other is computed in
advance, off-line, and downloaded to the routers when the network is booted. This
is also known as static routing

Multipath Routing

There are several paths between pairs of nodes that are almost equally
good. Sometimes in order to improve the performance multiple paths between
single pair of nodes are used. This technique is called multipath routing or
bifurcated routing.
Hierarchical Routing

In this method of routing the nodes are divided into regions based on
hierarchy. A particular node can communicate with nodes at the same hierarchical
level or the nodes at a lower level and directly under it. Here, the path from any
source to a destination is fixed and is exactly one if the hierarchy is a tree.

Flooding: Flooding adapts the technique in which every incoming packet is sent
on every outgoing line except the one on which it arrived. One problem with this
method is that packets may go in a loop. As a result of this a node may receive
several copies of a particular packet which is undesirable

Contribution to Outcomes

i. Assignments:

1. Define route? Why routing algorithm is required?

2. What is non adaptive routing? Explain any two non-adaptive routing


algorithms?

3. Why is adaptive routing superior to non adaptive routing?


4. What are the three main elements of distance vector routing?

5. What are the services provided by network layer to transport layer?

II. Important Questions:

1. Define route. Why routing algorithm is required. Routes can be


predetermined and then use them when required (or) Routes can be
determined when needed and use them immediately .First method is
proactive and second method is reactive. Which one is preferred for
wired networks? Justify your answer.
2. What is adaptive routing? Is Distance vector routing adaptive algorithm
or not .Justify your answer. Explain in detail Distance vector routing.
3. What are the services provided by Network layer to Transport layer.
Explain?
4. What is non- adaptive routing? Explain any two non- adaptive routing
algorithms?

III. Objective Type Questions:

Multiple Choice Questions:

1. Sending a message to a group is ____and routing algorithm is _____

a) Multi cast and multi casting routing

b) Broadcast and broad casting routing

c) Multi destination and multi destination routing

d) None

2. In hierarchical routing the routers are divided into ____

a) Sections b) Blocks c) Regions d) none

3. The shortest path in routing can refer to ____

a) The least expensive path

b) The least distant path


c) The path with the smallest no of hops

d) Any or a combination of above

4. Which routing algorithm requires more traffic between routers for setup
and updating?

a) Distance vector b) link state c) dijkstra d) vector link

5. In distance vector routing, each router receives vectors from ______

a) Every router in the network

b) Every router less than two units away

c) A table stored by the software

d) Its neighbors only

6. Select which protocols use distance vector routing?

a) OSPF b) RIP c) IGRP d) PPP

7. The End-to end delivery is the movement of a message from _________


a) One stations to the other station b) one n/w to the next n/w
c) Source to destination d) none.
8. The PSTN is an example of a_____network.
a) Packet switched b) Circuit switched
c) Message switched d)none.
9. In a time division switch a_______governs the destination of a packet
stored in RAM.
a) TDM bus b) Cross Point c) Crossbar d) control unit.
10. A permanent virtual circuit involves________
a) Connection establishment b) data transfer
c) Connection release d) all of the above.

Fill in the Blanks:

11. Routers function in the ______layer.

12. _____algorithm, in which every incoming packet is sent out on every


outgoing line except the one it arrived on.

13. The other name of the Distance Vector routing algorithm is __________
14. Sending a packet to all destinations simultaneously is _______

15. A________ is a subset of the subnet that includes all the routers but contains
no loops.

16. ARP stands for ______


17. RARP stands for ______
18. Can we use static and dynamic routing in one network?
19. What is region?
ans: When hierarchical routing is used, the routers are divided into what we
will call regions, with each router knowing all the details about how to route
packets to destinations within its own region, but knowing nothing about the
internal structure of other regions.

20. What is multicast routing?

Ans: Sending a message to a group is called multicasting, and its routing algorithm
is called multicast routing.

Answers:

1) a 2)c 3)d 4) c5) d 6) d7) c 8) b9) d10)d

11) Network 12) flooding 13) Bellman-ford 14) broadcasting 15) spanning tree16)
Address resolution protocol17) Reverse Address resolution protocol 18) yes

UNIT VI:

Objective:

The students will be able to understand about dynamic routing, broadcast


routing, Principles-of Congestion prevention policies and application of network
layer in ATM and Internet.

Outcome:

The can identify the congestion, principals and prevention polices for to
control the congestion in virtual circuits and datagram circuits. He/she can know
the main responsibility of network layer i.e. end-to-end transmission and how to
handle the problems in different networks.
Content:

Dynamic routing-Broadcast routing, Rotary for mobility, Congestion,


Control Algorithms-General Principles-of Congestion prevention policies. Internet
working: The Network layer in the internet and in the ATM Networks.

Introduction'

Congestion occurs when the source sends more packets than the destination can
handle. When this congestion occurs performance will degrade. Congestion occurs when
these buffers gets filled on the destination side. The packets are normally temporarily
stored in the buffers of the source and the destination before forwarding it to their upper
layers.

Congestion control

Congestion control can be used to calculate the amount of data the sender can
send to the destination on the network. Determining the amount of data is not easy, as the
bandwidth changes from time to time, the connections get connected and disconnected.
Based on these factors the sender should be able to adjust the traffic. TCP congestion
control algorithms are used to detect and control congestion. The following are the
congestion algorithms we will be discussing.

Contribution to Outcomes

I. Assignments:

1. Explain how flow control is different from congestion control?

2. What is the format of cell in ATM?

3. Compare Permanent Virtual Circuit with Switched Virtual Circuit in ATM?

4. The protocol field used in the IPV4 header is not present in the fixed IPV6
header .Why not?

5. Explain the congestion prevention policies?

II. Important Questions:

1. What is the format of Cell in ATM?


2. Compare Permanent V.C with Switched V.C in ATM?
3. How fixed size cells increases the speed of switching?
4. Identify the range of Ipv6 addresses spanned by Class A, Class B and
Class C?

III. Objective Type Questions:

Multiple Choice Questions:

1. Each network in an internetwork is independent of all the others is referred


to as

a) Autonomous System

b) Internetworking

c) Non Autonomous System

d) None

2. Which IP address class has few hosts per network?

a) A b) B c) C d) D

3. For what does the data link layer look for as it sends a frame from one link
to another?

a) Host ID b) IP address c) Domain name d) Station address

4. Which of the following is a class C host address?

a) 230.0.0.0 b) 130.4.5.6 c) 200.1.2.3 d)30.4.5.6

5. When a host knows its physical address but not its IP address ,it can use____

a) ICMP b) IGMP c) ARP d) RARP

6. What does ICMP stand for?


a) Internet Connection Modem Protocol
b) Intranet Control Message Program
c) Internal Conflict Management Program
d) Internet Control Message Protocol
7. What are the three commonly used methods of flow control
used for handling network congestion?
a) Buffering b) Source-quench messages c) a,b&d d) Windowing
8.
9.
10.

Fill in the Blanks:

11.The purpose of ARP on a network is to find the ____given the _____

12.TCP/IP s _____layer corresponds to the OSI models top 3 layers.

13.DHCP stands for ____________

14.Tunneling is used for _________

15.When too many packets are present in the subnet ,performance degrades is
_____

16.What is the minimum and maximum length of the header in the TCP
segment and IP datagram?
Ans: The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.

17.What is BGP (Border Gateway Protocol)?

It is a protocol used to advertise the set of networks that can be reached with
in an autonomous system. BGP enables this information to be shared with
the autonomous system. This is newer than EGP (Exterior Gateway Protocol

18.________ Protocol data units is employed at the network layer.

19.RIP stands for _______

Answers:

1) a 2) c 3) d 4) c 5) d 6) d7) c 8) 9) 10)

11) Physical, IP address 12) Transport 13) Dynamic Host Configuration protocol
14) Handling the two different networks interwork 15) Congestion

18) segments 19) Routing information protocol 20)

UNIT VII:

Objective:

The student will be able to learn the services provided to the upper layers,
elements of transport protocols, internet protocols i.e. TCP and UDP.HE/SHE learn
the transport functionality of ATM AAL layer protocol.

Outcome:

The student can identify the task is to provide reliable, cost effective data
transport from source machine to destination machine, what kind of service is
provided to the application layer.

Content & Description:

Transport Layer: Transport Services, Connection management, TCP and UDP


protocols: ATM AAL Layer Protocol.
TCP was specifically designed to provide a reliable end to end byte stream over an
unreliable internetwork. Each machine supporting TCP has a TCP transport entity either a
user process or part of the kernel that manages TCP streams and interface to IP layer. A
TCP entity accepts user data streams from local processes breaks them up into pieces not
exceeding 64KB and sends each piece as a separate IP datagram. Client Server
mechanism is not necessary for TCP to behave properly.

The "three-way handshake" is the procedure used to establish a connection

Piggybacking of acknowledments: The ACK for the last received packet need not be
sent as a new packet, but gets a free ride on the next outgoing data frame (using the ACK
field in the frame header). The technique is temporarily delaying outgoing ACKs so that
they can be hooked on the next outgoing data frame is known as piggybacking. But ACK
can't be delayed for a long time if receiver (of the packet to be acknowledged) does not
have any data to send.

Flow and congestion control: TCP takes care of flow control by ensuring that both ends
have enough resources and both can handle the speed of data transfer of each other so
that none of them gets overloaded with data. The term congestion control is used in
almost the same context except that resources and speed of each router is also taken care
of. The main concern is network resources in the latter case.

Multiplexing / Demultiplexing: Many applications can be sending/receiving data at the


same time. Data from all of them has to be multiplexed together. On receiving some data
from lower layer, TCP has to decide which application is the recipient. This is called
demultiplexing. TCP uses the concept of port number to do this.

UDP -- like its cousin the Transmission Control Protocol (TCP) -- sits directly on top of
the base Internet Protocol (IP). In general, UDP implements a fairly "lightweight" layer
above the Internet Protocol. It seems at first site that similar service is provided by both
UDP and IP, namely transfer of data. But we need UDP for multiplexing/demultiplexing
of addresses.

UDP Headers
The UDP header consists of four (4) fields of two bytes each:

Source Port Destination Port source port number

destination port number


length checksum
datagram size

checksum

Remote Procedure Call (RPC)

RPC comes under the Application-Oriented Design, where the client-server


communication is in the form of Procedure Calls. We call the machine making the
procedure call as client and the machine executing the called procedure as server. For
every procedure being called there must exist a piece of code which knows which
machine to contact for that procedure. Such a piece of code is called a Stub
Contribution to Outcomes

I. Assignments:

1. What are the different flags in TCP segment explain each of them?

2. Explain how TCP controls congestion?

3. How connections are setup and released in ATM?

4. How TCP uses sliding window protocol to achieve flow control?

5. Explain about RTP?

II. Important Questions:

1. Why pseudo header is used in computing TCP Checksum?

2. Explain how TCP controls congestion?

3. What are the different flags in TCP segment? Explain each of them.

4. How tcp uses sliding window to achieve flow control?

Objective Type Questions:

Multiple Choice Questions:

1. End to End delivery is the movement of a message from ___

a) One to the next station

b) One network to the next network

c) Source to destination

d) None
2. In the transport layer ___ is a connection less service.

a) Cons

b) Clns

c) Cots

d) Clts

3. In ____services connections must be established and terminated

a) Connectionless

b) Connection-oriented

c) Segmentation

d) None

4. Making sure that data segments arrive in the correct order is ____ control

a) Error b) Sequence c ) Loss d) Duplication

5. Which of the following applies to both UDP and TCP

a) Transport layer protocols

b) Port to- Port communication

c) Services of IP layer used

d) All of the above

6. The TCP/IP application layer corresponds to the OSI models_____layers.

a) Physical,datalink,network b) transport and network

c) Session and transport d) session, presentation & application

7. TCP connections are full-duplex. (True/False)

8. There are _6__ Flags in TCP header.

9. A segment consists of a fixed _20_ byte header plus an optional part


followed by _0 or more___ bytes.
10. The source and destination addresses are __16__ bits long.

Fill in the Blanks:

1. TPDU stands for ______

2. To call a remote procedure ,the client program must be bound with a small
library procedure called _____

3. RTP has a little sister protocol called ______

4. A TCP connection is a _____ stream

5. The hardware (or) software with in the transport layer that does the work is
called _____

6. What are the duties of transport layer?

7. What are the difference between TCP and UDP?

Ans: TCP: Connection oriented protocol, acknowledged one, Point to point


communication. UDP: Connection less protocol, unreliable, less traffic

8. What is the way to establish a TCP connection?

Ans: By using acknowledgement.


9. What is the difference between flow control and error control?

Ans: Flow control: adjust and confirm data flow rate for successful transmission. Error
Control: a way to recover corrupted data.

10.You have one IP: 192.168.10.29. In which layer this IP works?

Ans: Network layer.


ANSWERS:

1) b 2) b 3) b 4) a 5) d 6)d 7)8)9)10)

11) Transport protocol data unit

12) Client stub 13) RTCP

14) Bit 15) Transport entity16) end-to end delivery,addressing,errorcontrol,flow


control and multiplexing17)18)19)20)

UNIT VIII:

Objective: The student will be able to learn the network security problems,
different applications and application layer protocols i.e. FTP, SMTP, SNMP,
FTAM, DNS, TELNET.

Outcome:

The student knows the application layer provides interfaces and support for
services such as electronic mail, remote file access and transfer, shared database
management, and other types of distributed information services. He/she can know
the mechanisms of secure data.

Content:

Application Layer: Network Security, Domain name system, SNMP, Electronic


Mail: the World WEB, Multi Media.
The internet is dividing into several hundred top level domains where each domain
covers many hosts.

Resource Records:
Every domain whether it is a single host or a top level domain can have a set of resource records
associated with it. Each resource record has five fields and looks as below

Domain Time to
Class Type Value
Name Live
Domain name: the domain to which this record applies.
Class: set to IN for internet information. For other information other codes
may be specified.
Type: tells what kind of record it is.
Time to live: Upper Limit on the time to reach the destination
Value: can be an IP address, a string or a number depending on the record
type.
The concept of sending electronic text messages between parties in a way analogous to
mailing letters or memos predates the creation of the Internet

HTTP (Hyper Text Transfer Protocol)

Hypertext transfer protocol is a method of transmitting the information on the


web. HTTP basically publishes and retrieves the HTTP pages on the World Wide Web.
HTTP is a language that is used to communicate between the browser and web server.
The information that is transferred using HTTP can be plain text, audio, video, images,
and hypertext. HTTP is a request/response protocol between the client and server. Many
proxies, tunnels, and gateways can be existing between the web browser (client) and
server (web server). An HTTP client initializes a request by establishing a TCP
connection to a particular port on the remote host (typically 80 or 8080). An HTTP server
listens to that port and receives a request message from the client. Upon receiving the
request, server sends back 200 OK messages, its own message, an error message or other
message.

POP3 (Post Office Protocol)

In computing, e-mail clients such as (MS outlook, outlook express and


thunderbird) use Post office Protocol to retreive emails from the remote server over the
TCP/IP connection. Nearly all the users of the Internet service providers use POP 3 in the
email clients to retrieve the emails from the email servers. Most email applications use
POP protocol.

SMTP (Simple Mail Transfer Protocol)


Simple Mail Transfer Protocol is a protocol that is used to send the email
messages between the servers. Most email systems and email clients use the SMTP
protocol to send messages to one server to another. In configuring an email application,
you need to configure POP, SMTP and IMAP protocols in your email software.

FTP (File Transfer Protocol)

FTP or file transfer protocol is used to transfer (upload/download) data from one
computer to another over the internet or through or computer network. FTP is a most
commonly communication protocol for transferring the files over the internet.

IP (Internet Protocol)

An Internet protocol (IP) is a unique address or identifier of each computer or


communication devices on the network and internet. Any participating computer
networking device such as routers, computers, printers, internet fax machines and
switches may have their own unique IP address.

TFTP

Trivial File Transfer Protocol (TFTP) is a very simple file transfer protocol with
the very basic features of the FTP. TFTP can be implemented in a very small amount of
memory. TFTP is useful for booting computers such as routers. TFTP is also used to
transfer the files over the network. TFPT uses UDP and provides no security features.

SNMP

The simple network management protocol (SNMP) forms the TCP/IP suite. SNMP is
used to manage the network attached devices of the complex network.

PPTP

The point to point tunneling protocol is used in the virtual private networks. PPP works
by sending regular PPP session. PPTP is a method of implementing VPN networks.

Contribution to Outcomes

I. Assignments:

1. Explain in detail DES?

2. With the help of diagram explain the encryption model?


3. In email system, where the email messages are stored and why?

4. What is the function of SMTP?

5. What is the purpose of the DNS and discuss the three main divisions of
DNS?

II. Important Questions:

1. What is security? What is network security? What is information


security? How network security and information security are realted?

2. What are the Pros and Cons of providing security?

3. Who are the people who cause security problems?

4. With the help of of diagram explain the encryption model?

5. What is the role of key secrecy and algorithm secrecy in security?

6. What are the approaches for cryptanalysis?

Objective Type Questions:

Multiple Choice Questions:

1. Which of the following is not an interpreter?

a) HTTP

b) HTML

c) CGI

d) Java

2. Remote login can involve_______

a) NVT

b) TELNET

c) TCP/IP
d) All of the above

3. The purpose of the MTA is________

a) Message preparation

b) Envelope creation

c) Transferal of message across the internet

d) A and B

4. In secret key encryption, the secret key is used for_______

a) Encryption

b) Decryption

c) Hashing

d) A and B

5. To create a digest, we can use_________

a) a hash function

b) a secret key

c) a nonce

6. Mail services are available to network users through the ______ layer.
a. Data link b. Physical c. Transport d. Application
7. An SNMP manager can send ______messages
a) GetRequest b) SetRequest c) GetNextRequest d)all
8. An SNMP agent can send ______messages
b) GetResponse b) GetRequest c) GetNextRequest d) SetRequest

9. MIME allows ____ data to be sent through SMTP


a) Audio b)non-ASCII data c)image d)all

10. The RSA algorithm is the basis of a ___encryption method


a) Public key b)private key c) conventional d) denominational

Fill in the Blanks:


11.JPEG stands for_________________

12.MPEG stands for_________________

13.Digital signature can provide ______________ for a n/w .

14.Cryptography means_________

15. Hypertext documents are linked through________

16.What protocol is used by DNS name servers

DNS uses UDPfor communication between servers. It is a better choice


than TCP because of the improved speed a connectionless protocol offers.
Of course, transmission reliability suffers with UDP.

17.SNMP stands for _____

18. _______runs the SNMP client program;_________runs the SNMP


server program.

19. HTML has similarities to both ___and _____

20.Encryption and decryption are functions of the ___layer

Answers:

1) a 2) b 3) c 4) a 5) a6)7)d8)a9)a10)a

11) Joint Photographic Experts Group 12) Motion Picture Experts Group

13) Authentication, Integrity, Non-repudation 14) Secret writing

15) Home Pages.16)17)18)19)a manager and an agent20)Presentation layer

Anda mungkin juga menyukai