You are on page 1of 14

Computer Communication and Telecommunication Networks

Faculty: Ms. Afreenzehra Sayed


Course Objectives:
1. To introduce analysis and design of computer and communication networks.
2. To understand the network layered architecture and the protocol stack.

Course Outcomes:
Upon completion of the subject, students will be able to

CO1: Assemble the components of a PC and install one or more network operating systems
resulting in a functioning
CO2: Design a small or medium sized computer network including media types, end devices,
and interconnecting devices that meets a customer’s specific needs.

CO3: Perform basic configurations on routers and Ethernet switches.

CO4: Demonstrate knowledge of programming for network communications

CO5: Simulate and troubleshoot connectivity problems in computer networks at multiple layers
of OSI model and analyze the results

CO6: Develop knowledge and skills necessary to gain employment as computer network
engineer and network administrator.
Course Syllabus
(As prescribed by Mumbai University)

MODULE 1
Network Architectures, Protocol layers, and their Service Models (04 Hours)

Application and layered architectures the OSI reference model, unified view of layers,
protocols and services, overview of TCP/IP architecture, TCP/IP protocol.

 Interpretation: This chapter revises some basic concepts about networks. The
concepts of switching which is fundamental in understanding various protocols such as
connectionless and connection oriented is studied. The OSI model and TCP/IP models
which are building blocks of computer networks are discussed. The purpose of this
chapter is to explain how the design of a network is influenced by the services that it
supports. We also discuss the new and emerging services and how these services are
influencing the evolution of modern networks.
  Pre-requisite: NA
  Teaching Duration: 4 hours 
 Teaching Methodology:
 Chalk board, presentation, Video’s, Student interactive
 discussions
 Laboratory/Tutorial sessions: Study of network hardware components by
implementing LAN
  Modern tool usage: LAN Tester, Switch, CAT6 cables, RJ45 connectors. 
  Course outcomes addressed:
 Design a small or medium sized computer network including media types, end
 devices, and interconnecting devices that meets a customer’s specific needs. 
  Perform basic configurations on routers and Ethernet switches. 
 Skill Set acquired: The students were exposed to fundamentals of OSI and TCP/IP
models. They also learned the various the basics of computer networks.
  Assessment tools used: Quizzes. 
Question Bank:
Sr. Question Year Marks
No.
Where is the MAC sub-layer placed in the OSI model? What does it
1. deal with and what services does it provide. Dec 12 5
Compare packet switching, cell switching and circuit switching
2. techniques with the help of timing diagrams. Dec 12 10
What is open system? Explain OSI model by drawing sender,
receiver, intermediate node and various communication between
3. them. Dec 11 10
Explain OSI model and explain the process of data encapsulation in
4. detail. Dec 13 10
5. S.N on OSI model Dec 14 7
List the networking components and map all networking components
6. with OSI layer June 15 5
Differentiate host to host delivery provided by data link layer and
7. network layer May 16 5

  References: 
 Andrew Tanenbaum, “Computer Networks”, PHI New Dehli, 
 Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi 
 J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”, 
 Pearson Publication , 5th Edition, March 2009 
  L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd 
Edition 

 B. Forouzan, th“Data Communication and Networking”, McGraw Hill
Publication, 5 edition.TCP/IP protocol suite, 2nd edition, Behrouz A
 Forouzan 
 Gap Analysis: Network functions and network topology, basics of message switching,
packet switching, circuit switching and cell switching topics were addressed.

MODULE 2
Principles of Network Applications (10 Hours)

Application layer protocols such as HTTP, FTP, and SMTP, Peer-to-Peer File Sharing
Protocols and Architectures, ISPs and Domain name systems, Socket API and network socket
programming.
 Interpretation: The application layer is where network applications and their
application-layer protocols reside. The Internet’s application layer includes many
protocols, such as the HTTP protocol (which provides for Web document request and
transfer), SMTP (which provides for the transfer of e-mail messages), and FTP (which
provides for the transfer of files between two end systems).This module discusses the
two cases where peer-to-peer protocols occur, across a single hop in a network and end
to end across multiple hops in a network and how file sharing takes place in a
 centralized and decentralized system. ISPs, Domain name systems, Socket API and
network socket programming topics are also covered.
  Pre-requisite: NA 
 Teaching Duration: 10 hours
 Teaching Methodology:
 Chalk board, presentation, Video’s, Student interactive
 discussions
  Laboratory/Tutorial sessions:
 Network protocol analyzers using Wireshark software 
 Study of Wireless LAN (File sharing in infrastructure mode) 
  Modern tool usage: Wireshark Software, Wireless Router, dongle, Adapter
 Course outcomes addressed:
 Perform basic configurations on routers and Ethernet switches. 
 Demonstrate knowledge of programming for network communications 
 Learn to simulate computer networks and analyze the simulation results 
  Skill set acquired:
The students learned the concepts of peer to peer 
protocols, different protocols of
 application layer and network socket programming.
  Assessment tools used: Quizzes. 
  References:

  Andrew Tanenbaum, “Computer Networks”, PHI New Dehli, 


 Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi 
 J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”, 
Pearson Publication, 5th Edition, March 2009 

 L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
 Edition 
 B. Forouzan, “Data Communication and Networking”, McGraw Hill Publication, 
th
5 edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan 
 Question Bank:
Sr. Year Marks
No.
What do you mean by decentralized peer to peer file sharing? How it is
1. different from centralized system. Dec 15 10
What do you mean by decentralized peer to peer file sharing? How it is
2. different from centralized file sharing system? Jan 15 10
What is socket address? Explain with example. Comment on socket 5
3. programming May 16
List the role of application layer and explain one application layer 10
4. protocol. May 16
Describe peer to peer communication? Describe decentralized peer to 10
5. peer sharing May 16
Probable Questions
Short note on HTTP 5
Short note on FTP 5
Short note on SMTP 5
Difference between peer to peer file sharing in Centralized and
decentralized systems. 5
Short note ISP’s 5
What is the role of domain name server? Explain DNS working with
different records. 10
Short note on Socket API and network socket programming 5

MODULE 3
Reliable and Unreliable Transport-layer protocols: (10 Hours)

TCP and UDP, Port numbers, Multiplexing and de-multiplexing, flow control and congestion
control. Fairness delay, jitter, and loss in packet switched networks bandwidth, throughput, and
quality-of-service
 Interpretation: It is a Collection of networks that are based on different technologies.
The transport layer offers two basic communication services that operate on the top of IP:
Transmission Control Protocol (TCP) which is used for reliable stream service and User
Datagram Protocol (UDP) used for datagram service. Any application layer protocol that
operates on top of either TCP or UDP automatically operates across the Internet. The
module discusses in detail about the how the TCP provides reliable stream services, flow

control and congestion control. Fairness delay, jitter, and loss in packet switched networks
bandwidth, throughput, and quality-of-service topics were also addressed.
 Pre-requisite: NA
 Teaching Duration: 10 hours
 Teaching Methodology: Chalk board, presentation, Video’s, Student interactive
discussions
 Laboratory/Tutorial sessions: NA
 Modern tool usage: NA
  Course outcomes addressed:
 Know various protocols involved in modeling the network and their purpose,
also where these protocols will be used, what are their advantages etc. 
 Skill set acquired: The concept of connection oriented and connection less data transfer
was cleared in this module using the TCP and UDP protocols. The various signals
exchanged for TCP connection establishment, data transfer and termination was studied.
Performance parameters like fairness delay, jitter, and loss in packet switched networks

bandwidth, throughput, and quality-of-service were also learned. 
  Assessment tools used: Quizzes.
  References:
 Andrew Tanenbaum, “Computer Networks”, PHI New Dehli, 
 Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi 
 J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”, 
 Pearson Publication, 5th Edition, March 2009 
 L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd 
 Edition 
 B. Forouzan, “Data Communication and Networking”, McGraw Hill
Publication, 
th
5 edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan 
 Question Bank:
Sr. Question Year Marks
No.
What is flow control? Explain stop N wait ARQ with its state
1. Diagram. Dec 12 10
With neat diagram explain sliding window flow control, suppose that
frames are 1250 bytes long including 25 bytes of overhead. ACK
frames are 25 bytes long. Calculate the efficiency of stop and wait
2.
ARQ in a system that transmits at channel transmission rate R=1 Mbps.
Round trip propagation delay is given as 1ms.(Assuming channel is
noiseless). Dec 14 10
What is ARQ? What are the types of ARQs? Explain Go back N ARQ
3.
in detail. Dec 11 10
4. Note on Leaky Bucket algorithm Dec 11 7
What is IP address, physical address, port number and socket address
5.
of a device. Dec 12 5
6. What is piggybacking? How is its use significant? Dec 12 5
7. Explain the role of Internet layer and Network interface layer Dec 12 5
8. Differentiate between TCP & UDP Dec 12 10
Why does UDP exist? Would it not have been enough to just let user
9.
processes send raw IP packets? Dec 11 5
10. Why does the internet use a connection less network service? Dec 11 5
11. Explain TCP header in detail Dec 11 10
May 13
Dec 13
12. Short note on ARP and RARP May 13 10
13. Short note on ICMP May 13 10
14. Explain the meaning of various fields in TCP header Dec 14 10
What is the role of domain name server? Explain working of DNS
15.
server with different records. June 15 10
16. What do you mean by flow control? Compare flow control techniques. June 15 10
Draw and explain connection establishment using 3 way handshaking
17.
in TCP Dec 15 10
18. What are the performance parameters of the network? Explain in brief. May 16 5
19. Short note on congestion control May 16 10

MODULE 4
Network layer Services and Protocols (10 Hours)

Switching fabric, routing and forwarding, queues and buffering. Virtual-circuit and datagram
networks, internet protocol. IPv4 and IPv6 tunneling, Link State and Distance Vector
algorithms, Routing in the Internet RIP, OSPF and BGP. Broadcast and multicast, handling
mobility

 Interpretation:
Circuit switching is the switching technique used for telephone networks. This
approach is inefficient when the amount of information transferred is small or if
information produced intermittently in bursts, as is the case in many computer
applications. This module examines the packets switching networks which transfer
blocks of information called packets. With appropriate mechanisms packet switching
networks can be designed to support computer applications and real time applications
such as telephony. This chapter discusses the general issues regarding packet switching
networks such as routing algorithms and routing tables. Intra domain and Inter domain
routing are the two important types of autonomous system structure. In Intra domain
routing, RIP and OSPF protocols were discussed with their design, applications and
drawbacks. The module also discusses how BGP acts as Inter domain routing. We
introduced the multicast routing and explained a simple way to build a multicast tree
using a combination of graft and prune messages. The module concludes with DHCP,
NAT and mobile IP and their role in extending IP services to mobile and transitory
uses.

 Pre-requisite: NA
 Teaching Duration: 10 hours
 Teaching Methodology: Chalk board, presentation, Video’s, Student interactive
discussions
 Laboratory/Tutorial sessions: NA
 Modern tool usage: NA
 Course outcomes addressed:
 Develop knowledge and skills necessary to gain employment as computer
network engineer and network administrator.
 Know various protocols involved in modeling the network and their purpose,
also where these protocols will be used, what are their advantages etc.
 Skill set acquired:
The students understood the concepts of switching in this module. The network layer
protocols such as IP (both version 4 and 6) was studied. How packets switching can
be used to transfer the data across various networks were studied in this module. The
concepts of routing were studied in depth in this module. The concepts of Intra
domain and Inter domain routing were analyzed.
 Assessment tools used: Quizzes.
 References:
 Andrew Tanenbaum, “Computer Networks”, PHI New Dehli,
 Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi
 J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”,
Pearson Publication , 5th Edition, March 2009
 L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
Edition
 B. Forouzan, “Data Communication and Networking”, McGraw Hill
Publication,
th
5 edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan
 Question Bank:
Sr.
No. Question Year Marks
1. For the graph shown in the figure show the successive iterations of the Dec 12 10
Djikstra’s method of Shortest Path Algorithm. Take node 1 as the root
node.

Write Djikstra’s algorithm. Find shortest path to destination node 6.


2. Will Bellman Ford algorithm yield same solution? Why or why not? Dec 11 10
Explain count to infinity problem with an example and a method to
3. avoid this problem. May 13 10
Find the shortest path between the source node 1 to all nodes for the
network given below using Djikstra’s algorithm. Also draw the
shortest path tree from node 1 to all the other nodes.

4. May 13 10
Find the shortest path between the source node 1 to all nodes for the
network given below using Djikstra’s algorithm. Also draw the
shortest path tree from node 1 to all the other nodes.

5. Dec 13 10
6. Short note on Looping in Distance Vector Routing Protocol Dec 13 6.5
Explain the difference between a connection oriented and
7. connectionless service. Dec 14 4
8. Compare circuit switching, Datagram packet switching and virtual Dec 14 10
packet switching May16
Explain lopping problem in Distance vector routing protocol with an
9. example and method to avoid this problem Dec 14 10
Explain Dijkstras Algorithm and Bellman ford Algorithm using
10. suitable example Dec 14 10
Explain how fragmentation and reassembly helps IP to work on a
11. variety of Physical networks Dec 12 10
12. Short note on Mobile IP Dec 12 10
13. Short note on DHCP Dec 12 10
14. Short note on OSPF Dec 12 10
15. Why does the internet use a connection less network service? Dec 11 5
What is classful IP addressing? Find maximum addresses provided by
16. each class Dec 11 10
Explain the difference between a data link delivery and a network layer
17. delivery Dec 13 5
18. Why do you require a limit on the minimum size of Ethernet frame? Dec 13 5

19. Explain fragmentation and the fields related to fragmentation in the IP Dec 13 10
datagram header. Discuss why IPV4 protocol needs to fragment some
packets.

20. Short note on Private IPV4 addresses Dec 13 6.5

21. What is port address? What is the significance of port address? Dec 14 4

22. 1. For a classful network address 209.100.78.0


i. How many host can this network support using the default mask.
ii. What subnet mask is necessary to establish six usable subnets.
iii. List the six subnet address in classless address notation How many
host can be supported in each subnet?
iv. What is the broadcast address for subnet three Dec 14 10
23. Explain fragmentation and the fields related to the fragmentation in the
IP datagram header. Discuss why IPv4 protocol needs to fragment
some packets Dec 14 10
24. Identify elements of IPv4 header June 15 10
25. Which protocol sends the error messages back to source? Explain the
query messages of ICMP. June 15 10
26. Explain the classful address of IPv4 with netid and host id June 15 10
27. An ISP granted a block of address starting with 120.60.4.0. The ISP
wants to distribute these blocks to 100 organizations with each
organization reacving 8 addresses only. Design subblocks and gives the
slash notations for each subblock. Find out how many addresses are
still available after these allocations. June 15 10
28. Classify routing protocols? Explain in brief the concept of distance
vector and link state routing algorithms with examples. June 15 10
29. What is use of subnetwork in IP addressing Dec 15 5
30. Explain need of fragmentation and field related to fragmentation in IP
datagram. Dec 15 10
31. Solve the following related to IP datagram.
a) which field shows no of hop count
b) If HLEN value is 5 and length of data is 24 bytes. Calculate option
c) What are differentiating services?
d) Packet version of-010 is discarded. Justify Dec 15 10
32. What is the role of ICMP protocol? Explain the error messages of
ICMP Dec 15 10
33. An ISP.are granted a block of address starting with 127.60.4.0/20. The
ISP wants with each organization receiving 8 address only Design
subblock and 10 give the slash notation for each subblock. Dec 15 10
34. Which protocol gives mapping of name with IP address? Explain
working of such protocol with different records. Dec 15 10
35. Classify unicast routing protocol. Explain exterior routing protocol in
brief. May16 10
36. What are the demerits of distance vector algorithm? How it is
overcome? May16 10
37. What is tunneling? Explain Automatic Tunneling and configuration
tunneling in detail May16 10
38. Short note on IPv6 May16 10

 Gap Analysis: Classful and Classless Addressing with numericals

MODULE 5
Data link layer Services and Protocols: (10 Hours)

Link-layer and its services, Ethernet, hubs, bridges, and switches. Link-layer addressing, ATM
and MPLS, Local area networks and IEEE 802.11 wireless LANs, multiple-access protocols.
Random access, efficiency of pure and slotted ALOHA, CSMA, CSMA/CD, and CSMA/CA
  Interpretation:
The Internet protocol enables communications across a vast and heterogeneous collection of
networks that are based on different technologies. The transport layer offers two basic
communication services that operate on the top of IP: Transmission Control Protocol (TCP)
which is used for reliable stream service and User Datagram Protocol (UDP) used for datagram
service. Any application layer protocol that operates on top of either TCP or UDP automatically
operates across the Internet. The module discusses in detail about the how the TCP provides
reliable stream services, flow control and congestion control. Intra domain and Inter domain
routing are the two important types of autonomous system structure. In Intra domain routing,
RIP and OSPF protocols were discussed with their design, applications and drawbacks. The
module also discusses how BGP acts as Inter domain routing. We introduced the multicast
routing and explained a simple way to build a multicast tree using a combination of graft and
prune messages. The module concludes with DHCP, NAT and mobile IP and their role in
extending IP services to mobile and transitory uses.
 Pre-requisite: NA
 Teaching Duration: 10 hours
 Teaching Methodology: Chalk board, presentation, Video’s, Student interactive
discussions
 Laboratory/Tutorial sessions:
 Study of network hardware components by implementing LAN
 Implementation of bit stuffing protocol
 Study of Wireless LAN
 Modern tool usage: LAN Tester, Switch, CAT6 cables, RJ45 connectors, Wireless
Router, dongle, Adapter and MATLAB software.
 Course outcomes addressed:
 Troubleshoot connectivity problems in a host occurring at multiple layers of the
OSI and TCP/IP model
 Know various protocols involved in modeling the network and their purpose,
also where these protocols will be used, what are their advantages etc.
 Skill set acquired:
Different networking elements required for the network connections, link layer
addressing and it’s services were studied. In this module student studied the concepts
of medium access in wired and wireless network scenarios. They learned what are the
different LAN standards including IEEE 802.3, 802.5 and 802.11. The concepts of
bridging the LANs were cleared in this module.
 Assessment tools used: Quizzes.
 References:
 Andrew Tanenbaum, “Computer Networks”, PHI New Dehli,
 Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi
 J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”,
Pearson Publication , 5th Edition, March 2009
 L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
Edition
 B. Forouzan, “Data Communication and Networking”, McGraw Hill
Publication,
5th edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan

 Question Bank:
Sr. Question Year Marks
No.

Dec 12
1. Explain repeaters, bridges, routers & switches. May 13 10
Explain the following medium sharing techniques: Reservation, Polling, Dec 12
2. Token Passing. Dec 13 10
Explain transparent bridges. Also show how bridge learning takes place
3. with appropriate example Dec 12 10
4. What are the components in ATM? Explain it in brief. June 15 5
What do you mean by multiple access? Compare between CSMA/CD
5. and CSMA/CA June 15 5
6. What do we mean we say that a bridge can filter traffic? Why is filtering Dec 11 5
important?
7. What is ALOHA? Derive the expression for slotted and pure ALOHA Dec 11 10
What is collision and collision domain? How collision & collision
domain can be reduced? How collision can be detected? Explain Dec 11 10
8. CSMA/CD. May 13 5
9. Note on Leaky Bucket algorithm Dec 11 7
May 13 5
Dec13 5
10. Explain ALOHA and slotted ALOHA
Explain looping problem in bridge LAN with appropriate example. May 13 10
11. How to solve it.
12. Short note on IEEE 802.5 standard in detail. May 13 10
13. Short note on IEEE 802.3 standard in detail. Dec 13 10
14. Explain in detail Repeaters, hub, bridges, Routers, and switches Dec 14 10
15. How does reservation work with medium access control Dec 14 4
16. Why do you require a limit on the minimum size of Ethernet frame Dec 14 4
17. S.N on IEEE 802.3 standard Dec 14 6
18. S.N on Spanning tree Algorithm Dec 14 7
19. Draw and explain architecture of IEEE 802.11 June 15 10
20. Compare pure ALOHA and slotted ALOHA Dec 15 5
21. Explain working principle of selective repeat ARQ Dec 15 5
22. Discuss various scheduling methods used in MAC Dec 15 5
23. What are the components of ATM? Explain in brief. Dec 15 10
24. Draw sublayer of data link layer. Explain the role of each layer May 16 5
25. Compare between Ethernet LAN and IEEE 802.11 WLAN May 16 5
Classify multiple access techniques. Explain CSMA/CD technique with
26. back off algorithm. May 16 5
27. Short note on Networking devices May 16 10
28. Short note on ATM May 16 5
29. Explain the persistent strategies of CSMA June 17 5
Probable Questions
Short note on MPLS 5
Short note on IEEE 802.11 5
Difference between Infrastructure and Adhoc mode 5
Explain Hidden node and exposed node problem and provide
solution for the same 10

MODULE 6
Introduction to Physical-layer Services and Systems (08 Hours)

Introduction to physical media, Coax, fiber, twisted pair, DSL, HFC, WiMax, cellular, satellite
and telephone networks, bit transmission, frequency division multiplexing. Time division
multiplexing.
 Interpretation:
In this module various physical media like coaxial cable, twisted pair were discussed.
DSL, HFC, WiMax, cellular, satellite and telephone networks were also studied. Time
division and frequency division multiplexing techniques were revised.
 Pre-requisite: NA
 Teaching Duration: 8 hours
 Teaching Methodology: Chalk board, presentation, Video’s, Student interactive
discussions
 Laboratory/Tutorial sessions: NA
 Modern tool usage: NA
 Course outcomes addressed:
 Develop knowledge and skills necessary to gain employment as computer
network engineer and network administrator.
 Skill set acquired:
Knowledge of physical media’s required to construct a network
 Assessment tools used: Quizzes.
 References:
 Andrew Tanenbaum, “Computer Networks”, PHI New Dehli,
Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi
 J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”,
Pearson Publication , 5th Edition, March 2009
 L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
Edition
 B. Forouzan, “Data Communication and Networking”, McGraw Hill Publication,
5th edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan

 Question Bank:

Sr. University Questions Year Marks


no
1. Explain in brief DSL and HFC June 15 10
2. Explain in detail different transmission media. June 15 10
May16
3. What is bit and byte stuffing. Explain with example? Dec 15 5
4. What is DSL and HFC? Describe in brief Dec 15 10
May 16
5. What is IEEE 802.11? Explain 'features of IEEE 802.11. Draw the Dec 15 10
architecture of IEEE 802.11
6. Which is better, ADSL or cable? Justify your answer June 17 5
Probable Questions
Explain in detail the different transmission media 10
Explain in brief DSL and HFC 10
Short note on WiMax 5
Short note on multiplexing techniques 10

Course Outcomes mapping to Program Specific Outcomes and Program Outcomes

Program Specific Outcomes


PSO1: Apply the concepts of electronics, communication, signal processing and embedded
systems in the design and implementation of application-oriented engineering problems.

PSO2: Use modern software and hardware tools to solve complex electronics and
telecommunication engineering problems, along with analytical and managerial skills to arrive at
appropriate solutions, either independently or in a team.

PSO3:Develop entrepreneurial skills addressing societal needs, communicate effectively, engage


in lifelong learning, adapt to changing work environment and exhibit professional conduct in
their career.

Program Outcomes
PO1: Engineering knowledge
PO2: Problem analysis
PO3: Design/Development of solutions
PO4: Conduct investigations of complex problems
PO5: Modern tool usage
PO6: The engineering and society
PO7: Environment and sustainability
PO8: Ethics
PO9: Individual and teamwork
PO10: Communication
PO11: Project management and finance
PO12: Lifelong learning

Course Outcomes Mapping to Program Specific Outcomes

CO\PSO PSO1 PSO2 PSO3


ETC603.1 1 2
ETC603.2 3 3 2
ETC603.3 3 3
ETC603.4 3 3
ETC603.5 3 3 2
ETC603.6 3 3 2

Course Outcomes Mapping to Program Outcomes

CO\PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
ETC603.1 3 1 2 2 1 3 3
ETC603.2 3 3 3 1 3 3
ETC603.3 3 2 1 1 2 1 3 3
ETC603.4 1 1 3 3
ETC603.5 3 2 3 1 3 3
ETC603.6 3 3 3 1 2 1 3 3

You might also like