Professional Documents
Culture Documents
Course Outcomes:
Upon completion of the subject, students will be able to
CO1: Assemble the components of a PC and install one or more network operating systems
resulting in a functioning
CO2: Design a small or medium sized computer network including media types, end devices,
and interconnecting devices that meets a customer’s specific needs.
CO5: Simulate and troubleshoot connectivity problems in computer networks at multiple layers
of OSI model and analyze the results
CO6: Develop knowledge and skills necessary to gain employment as computer network
engineer and network administrator.
Course Syllabus
(As prescribed by Mumbai University)
MODULE 1
Network Architectures, Protocol layers, and their Service Models (04 Hours)
Application and layered architectures the OSI reference model, unified view of layers,
protocols and services, overview of TCP/IP architecture, TCP/IP protocol.
Interpretation: This chapter revises some basic concepts about networks. The
concepts of switching which is fundamental in understanding various protocols such as
connectionless and connection oriented is studied. The OSI model and TCP/IP models
which are building blocks of computer networks are discussed. The purpose of this
chapter is to explain how the design of a network is influenced by the services that it
supports. We also discuss the new and emerging services and how these services are
influencing the evolution of modern networks.
Pre-requisite: NA
Teaching Duration: 4 hours
Teaching Methodology:
Chalk board, presentation, Video’s, Student interactive
discussions
Laboratory/Tutorial sessions: Study of network hardware components by
implementing LAN
Modern tool usage: LAN Tester, Switch, CAT6 cables, RJ45 connectors.
Course outcomes addressed:
Design a small or medium sized computer network including media types, end
devices, and interconnecting devices that meets a customer’s specific needs.
Perform basic configurations on routers and Ethernet switches.
Skill Set acquired: The students were exposed to fundamentals of OSI and TCP/IP
models. They also learned the various the basics of computer networks.
Assessment tools used: Quizzes.
Question Bank:
Sr. Question Year Marks
No.
Where is the MAC sub-layer placed in the OSI model? What does it
1. deal with and what services does it provide. Dec 12 5
Compare packet switching, cell switching and circuit switching
2. techniques with the help of timing diagrams. Dec 12 10
What is open system? Explain OSI model by drawing sender,
receiver, intermediate node and various communication between
3. them. Dec 11 10
Explain OSI model and explain the process of data encapsulation in
4. detail. Dec 13 10
5. S.N on OSI model Dec 14 7
List the networking components and map all networking components
6. with OSI layer June 15 5
Differentiate host to host delivery provided by data link layer and
7. network layer May 16 5
References:
Andrew Tanenbaum, “Computer Networks”, PHI New Dehli,
Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi
J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”,
Pearson Publication , 5th Edition, March 2009
L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
Edition
B. Forouzan, th“Data Communication and Networking”, McGraw Hill
Publication, 5 edition.TCP/IP protocol suite, 2nd edition, Behrouz A
Forouzan
Gap Analysis: Network functions and network topology, basics of message switching,
packet switching, circuit switching and cell switching topics were addressed.
MODULE 2
Principles of Network Applications (10 Hours)
Application layer protocols such as HTTP, FTP, and SMTP, Peer-to-Peer File Sharing
Protocols and Architectures, ISPs and Domain name systems, Socket API and network socket
programming.
Interpretation: The application layer is where network applications and their
application-layer protocols reside. The Internet’s application layer includes many
protocols, such as the HTTP protocol (which provides for Web document request and
transfer), SMTP (which provides for the transfer of e-mail messages), and FTP (which
provides for the transfer of files between two end systems).This module discusses the
two cases where peer-to-peer protocols occur, across a single hop in a network and end
to end across multiple hops in a network and how file sharing takes place in a
centralized and decentralized system. ISPs, Domain name systems, Socket API and
network socket programming topics are also covered.
Pre-requisite: NA
Teaching Duration: 10 hours
Teaching Methodology:
Chalk board, presentation, Video’s, Student interactive
discussions
Laboratory/Tutorial sessions:
Network protocol analyzers using Wireshark software
Study of Wireless LAN (File sharing in infrastructure mode)
Modern tool usage: Wireshark Software, Wireless Router, dongle, Adapter
Course outcomes addressed:
Perform basic configurations on routers and Ethernet switches.
Demonstrate knowledge of programming for network communications
Learn to simulate computer networks and analyze the simulation results
Skill set acquired:
The students learned the concepts of peer to peer
protocols, different protocols of
application layer and network socket programming.
Assessment tools used: Quizzes.
References:
MODULE 3
Reliable and Unreliable Transport-layer protocols: (10 Hours)
TCP and UDP, Port numbers, Multiplexing and de-multiplexing, flow control and congestion
control. Fairness delay, jitter, and loss in packet switched networks bandwidth, throughput, and
quality-of-service
Interpretation: It is a Collection of networks that are based on different technologies.
The transport layer offers two basic communication services that operate on the top of IP:
Transmission Control Protocol (TCP) which is used for reliable stream service and User
Datagram Protocol (UDP) used for datagram service. Any application layer protocol that
operates on top of either TCP or UDP automatically operates across the Internet. The
module discusses in detail about the how the TCP provides reliable stream services, flow
control and congestion control. Fairness delay, jitter, and loss in packet switched networks
bandwidth, throughput, and quality-of-service topics were also addressed.
Pre-requisite: NA
Teaching Duration: 10 hours
Teaching Methodology: Chalk board, presentation, Video’s, Student interactive
discussions
Laboratory/Tutorial sessions: NA
Modern tool usage: NA
Course outcomes addressed:
Know various protocols involved in modeling the network and their purpose,
also where these protocols will be used, what are their advantages etc.
Skill set acquired: The concept of connection oriented and connection less data transfer
was cleared in this module using the TCP and UDP protocols. The various signals
exchanged for TCP connection establishment, data transfer and termination was studied.
Performance parameters like fairness delay, jitter, and loss in packet switched networks
bandwidth, throughput, and quality-of-service were also learned.
Assessment tools used: Quizzes.
References:
Andrew Tanenbaum, “Computer Networks”, PHI New Dehli,
Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi
J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”,
Pearson Publication, 5th Edition, March 2009
L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
Edition
B. Forouzan, “Data Communication and Networking”, McGraw Hill
Publication,
th
5 edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan
Question Bank:
Sr. Question Year Marks
No.
What is flow control? Explain stop N wait ARQ with its state
1. Diagram. Dec 12 10
With neat diagram explain sliding window flow control, suppose that
frames are 1250 bytes long including 25 bytes of overhead. ACK
frames are 25 bytes long. Calculate the efficiency of stop and wait
2.
ARQ in a system that transmits at channel transmission rate R=1 Mbps.
Round trip propagation delay is given as 1ms.(Assuming channel is
noiseless). Dec 14 10
What is ARQ? What are the types of ARQs? Explain Go back N ARQ
3.
in detail. Dec 11 10
4. Note on Leaky Bucket algorithm Dec 11 7
What is IP address, physical address, port number and socket address
5.
of a device. Dec 12 5
6. What is piggybacking? How is its use significant? Dec 12 5
7. Explain the role of Internet layer and Network interface layer Dec 12 5
8. Differentiate between TCP & UDP Dec 12 10
Why does UDP exist? Would it not have been enough to just let user
9.
processes send raw IP packets? Dec 11 5
10. Why does the internet use a connection less network service? Dec 11 5
11. Explain TCP header in detail Dec 11 10
May 13
Dec 13
12. Short note on ARP and RARP May 13 10
13. Short note on ICMP May 13 10
14. Explain the meaning of various fields in TCP header Dec 14 10
What is the role of domain name server? Explain working of DNS
15.
server with different records. June 15 10
16. What do you mean by flow control? Compare flow control techniques. June 15 10
Draw and explain connection establishment using 3 way handshaking
17.
in TCP Dec 15 10
18. What are the performance parameters of the network? Explain in brief. May 16 5
19. Short note on congestion control May 16 10
MODULE 4
Network layer Services and Protocols (10 Hours)
Switching fabric, routing and forwarding, queues and buffering. Virtual-circuit and datagram
networks, internet protocol. IPv4 and IPv6 tunneling, Link State and Distance Vector
algorithms, Routing in the Internet RIP, OSPF and BGP. Broadcast and multicast, handling
mobility
Interpretation:
Circuit switching is the switching technique used for telephone networks. This
approach is inefficient when the amount of information transferred is small or if
information produced intermittently in bursts, as is the case in many computer
applications. This module examines the packets switching networks which transfer
blocks of information called packets. With appropriate mechanisms packet switching
networks can be designed to support computer applications and real time applications
such as telephony. This chapter discusses the general issues regarding packet switching
networks such as routing algorithms and routing tables. Intra domain and Inter domain
routing are the two important types of autonomous system structure. In Intra domain
routing, RIP and OSPF protocols were discussed with their design, applications and
drawbacks. The module also discusses how BGP acts as Inter domain routing. We
introduced the multicast routing and explained a simple way to build a multicast tree
using a combination of graft and prune messages. The module concludes with DHCP,
NAT and mobile IP and their role in extending IP services to mobile and transitory
uses.
Pre-requisite: NA
Teaching Duration: 10 hours
Teaching Methodology: Chalk board, presentation, Video’s, Student interactive
discussions
Laboratory/Tutorial sessions: NA
Modern tool usage: NA
Course outcomes addressed:
Develop knowledge and skills necessary to gain employment as computer
network engineer and network administrator.
Know various protocols involved in modeling the network and their purpose,
also where these protocols will be used, what are their advantages etc.
Skill set acquired:
The students understood the concepts of switching in this module. The network layer
protocols such as IP (both version 4 and 6) was studied. How packets switching can
be used to transfer the data across various networks were studied in this module. The
concepts of routing were studied in depth in this module. The concepts of Intra
domain and Inter domain routing were analyzed.
Assessment tools used: Quizzes.
References:
Andrew Tanenbaum, “Computer Networks”, PHI New Dehli,
Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi
J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”,
Pearson Publication , 5th Edition, March 2009
L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
Edition
B. Forouzan, “Data Communication and Networking”, McGraw Hill
Publication,
th
5 edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan
Question Bank:
Sr.
No. Question Year Marks
1. For the graph shown in the figure show the successive iterations of the Dec 12 10
Djikstra’s method of Shortest Path Algorithm. Take node 1 as the root
node.
4. May 13 10
Find the shortest path between the source node 1 to all nodes for the
network given below using Djikstra’s algorithm. Also draw the
shortest path tree from node 1 to all the other nodes.
5. Dec 13 10
6. Short note on Looping in Distance Vector Routing Protocol Dec 13 6.5
Explain the difference between a connection oriented and
7. connectionless service. Dec 14 4
8. Compare circuit switching, Datagram packet switching and virtual Dec 14 10
packet switching May16
Explain lopping problem in Distance vector routing protocol with an
9. example and method to avoid this problem Dec 14 10
Explain Dijkstras Algorithm and Bellman ford Algorithm using
10. suitable example Dec 14 10
Explain how fragmentation and reassembly helps IP to work on a
11. variety of Physical networks Dec 12 10
12. Short note on Mobile IP Dec 12 10
13. Short note on DHCP Dec 12 10
14. Short note on OSPF Dec 12 10
15. Why does the internet use a connection less network service? Dec 11 5
What is classful IP addressing? Find maximum addresses provided by
16. each class Dec 11 10
Explain the difference between a data link delivery and a network layer
17. delivery Dec 13 5
18. Why do you require a limit on the minimum size of Ethernet frame? Dec 13 5
19. Explain fragmentation and the fields related to fragmentation in the IP Dec 13 10
datagram header. Discuss why IPV4 protocol needs to fragment some
packets.
21. What is port address? What is the significance of port address? Dec 14 4
MODULE 5
Data link layer Services and Protocols: (10 Hours)
Link-layer and its services, Ethernet, hubs, bridges, and switches. Link-layer addressing, ATM
and MPLS, Local area networks and IEEE 802.11 wireless LANs, multiple-access protocols.
Random access, efficiency of pure and slotted ALOHA, CSMA, CSMA/CD, and CSMA/CA
Interpretation:
The Internet protocol enables communications across a vast and heterogeneous collection of
networks that are based on different technologies. The transport layer offers two basic
communication services that operate on the top of IP: Transmission Control Protocol (TCP)
which is used for reliable stream service and User Datagram Protocol (UDP) used for datagram
service. Any application layer protocol that operates on top of either TCP or UDP automatically
operates across the Internet. The module discusses in detail about the how the TCP provides
reliable stream services, flow control and congestion control. Intra domain and Inter domain
routing are the two important types of autonomous system structure. In Intra domain routing,
RIP and OSPF protocols were discussed with their design, applications and drawbacks. The
module also discusses how BGP acts as Inter domain routing. We introduced the multicast
routing and explained a simple way to build a multicast tree using a combination of graft and
prune messages. The module concludes with DHCP, NAT and mobile IP and their role in
extending IP services to mobile and transitory uses.
Pre-requisite: NA
Teaching Duration: 10 hours
Teaching Methodology: Chalk board, presentation, Video’s, Student interactive
discussions
Laboratory/Tutorial sessions:
Study of network hardware components by implementing LAN
Implementation of bit stuffing protocol
Study of Wireless LAN
Modern tool usage: LAN Tester, Switch, CAT6 cables, RJ45 connectors, Wireless
Router, dongle, Adapter and MATLAB software.
Course outcomes addressed:
Troubleshoot connectivity problems in a host occurring at multiple layers of the
OSI and TCP/IP model
Know various protocols involved in modeling the network and their purpose,
also where these protocols will be used, what are their advantages etc.
Skill set acquired:
Different networking elements required for the network connections, link layer
addressing and it’s services were studied. In this module student studied the concepts
of medium access in wired and wireless network scenarios. They learned what are the
different LAN standards including IEEE 802.3, 802.5 and 802.11. The concepts of
bridging the LANs were cleared in this module.
Assessment tools used: Quizzes.
References:
Andrew Tanenbaum, “Computer Networks”, PHI New Dehli,
Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi
J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”,
Pearson Publication , 5th Edition, March 2009
L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
Edition
B. Forouzan, “Data Communication and Networking”, McGraw Hill
Publication,
5th edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan
Question Bank:
Sr. Question Year Marks
No.
Dec 12
1. Explain repeaters, bridges, routers & switches. May 13 10
Explain the following medium sharing techniques: Reservation, Polling, Dec 12
2. Token Passing. Dec 13 10
Explain transparent bridges. Also show how bridge learning takes place
3. with appropriate example Dec 12 10
4. What are the components in ATM? Explain it in brief. June 15 5
What do you mean by multiple access? Compare between CSMA/CD
5. and CSMA/CA June 15 5
6. What do we mean we say that a bridge can filter traffic? Why is filtering Dec 11 5
important?
7. What is ALOHA? Derive the expression for slotted and pure ALOHA Dec 11 10
What is collision and collision domain? How collision & collision
domain can be reduced? How collision can be detected? Explain Dec 11 10
8. CSMA/CD. May 13 5
9. Note on Leaky Bucket algorithm Dec 11 7
May 13 5
Dec13 5
10. Explain ALOHA and slotted ALOHA
Explain looping problem in bridge LAN with appropriate example. May 13 10
11. How to solve it.
12. Short note on IEEE 802.5 standard in detail. May 13 10
13. Short note on IEEE 802.3 standard in detail. Dec 13 10
14. Explain in detail Repeaters, hub, bridges, Routers, and switches Dec 14 10
15. How does reservation work with medium access control Dec 14 4
16. Why do you require a limit on the minimum size of Ethernet frame Dec 14 4
17. S.N on IEEE 802.3 standard Dec 14 6
18. S.N on Spanning tree Algorithm Dec 14 7
19. Draw and explain architecture of IEEE 802.11 June 15 10
20. Compare pure ALOHA and slotted ALOHA Dec 15 5
21. Explain working principle of selective repeat ARQ Dec 15 5
22. Discuss various scheduling methods used in MAC Dec 15 5
23. What are the components of ATM? Explain in brief. Dec 15 10
24. Draw sublayer of data link layer. Explain the role of each layer May 16 5
25. Compare between Ethernet LAN and IEEE 802.11 WLAN May 16 5
Classify multiple access techniques. Explain CSMA/CD technique with
26. back off algorithm. May 16 5
27. Short note on Networking devices May 16 10
28. Short note on ATM May 16 5
29. Explain the persistent strategies of CSMA June 17 5
Probable Questions
Short note on MPLS 5
Short note on IEEE 802.11 5
Difference between Infrastructure and Adhoc mode 5
Explain Hidden node and exposed node problem and provide
solution for the same 10
MODULE 6
Introduction to Physical-layer Services and Systems (08 Hours)
Introduction to physical media, Coax, fiber, twisted pair, DSL, HFC, WiMax, cellular, satellite
and telephone networks, bit transmission, frequency division multiplexing. Time division
multiplexing.
Interpretation:
In this module various physical media like coaxial cable, twisted pair were discussed.
DSL, HFC, WiMax, cellular, satellite and telephone networks were also studied. Time
division and frequency division multiplexing techniques were revised.
Pre-requisite: NA
Teaching Duration: 8 hours
Teaching Methodology: Chalk board, presentation, Video’s, Student interactive
discussions
Laboratory/Tutorial sessions: NA
Modern tool usage: NA
Course outcomes addressed:
Develop knowledge and skills necessary to gain employment as computer
network engineer and network administrator.
Skill set acquired:
Knowledge of physical media’s required to construct a network
Assessment tools used: Quizzes.
References:
Andrew Tanenbaum, “Computer Networks”, PHI New Dehli,
Natalia Olifer and Victor Olifer, “ Computer Networks”, Wiley India,New Delhi
J. F. Kurose and K. W. Ross, “Computer Networking: A Top-Down Approach”,
Pearson Publication , 5th Edition, March 2009
L.Garcia et al, “Communication Networks”, McGraw Hill Publication, 2nd
Edition
B. Forouzan, “Data Communication and Networking”, McGraw Hill Publication,
5th edition.TCP/IP protocol suite, 2nd edition, Behrouz A Forouzan
Question Bank:
PSO2: Use modern software and hardware tools to solve complex electronics and
telecommunication engineering problems, along with analytical and managerial skills to arrive at
appropriate solutions, either independently or in a team.
Program Outcomes
PO1: Engineering knowledge
PO2: Problem analysis
PO3: Design/Development of solutions
PO4: Conduct investigations of complex problems
PO5: Modern tool usage
PO6: The engineering and society
PO7: Environment and sustainability
PO8: Ethics
PO9: Individual and teamwork
PO10: Communication
PO11: Project management and finance
PO12: Lifelong learning
CO\PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
ETC603.1 3 1 2 2 1 3 3
ETC603.2 3 3 3 1 3 3
ETC603.3 3 2 1 1 2 1 3 3
ETC603.4 1 1 3 3
ETC603.5 3 2 3 1 3 3
ETC603.6 3 3 3 1 2 1 3 3