You are on page 1of 22

Department of Computer Science and

Engineering

Course Name : Advanced Computer Networks

Course Number : A55026

Course Designation : Core

Prerequisites : Computer Fundamentals,


Number Systems and
Computer Networks.

III B Tech – I Semester


(2018-2019)
K.RAGHAVENDRA RAO
Asst professor

SYLLABUS
Brief Introduction on Network Models, error detection and correction in data link layer.

Network Layer: Address Mapping, Error Reporting and Multicasting-Address


Unit – I
Mapping, Internet Control Message Protocol (ICMP), Internet Group Management
Protocol (IGMP), Internet Group Management Protocol Version6 (ICMPv6).

Network Layer: Delivery, Forwarding and Routing- Delivery, Forwarding, Uni-


Unit – II
casting Routing Protocols, Multicast Routing Protocols
Transport Layer: Process to Process Delivery, User Datagram Protocols (UDP),
Unit – III Transmission control Protocol (TCP), Stream Control Transmission Protocol(SCTP).

Transport Layer: Congestion Control and Quality of Service-Data Traffic,


Unit – IV Congestion, Congestion Control, Quality of Service, and Techniques to improve QoS,
Integrated Services, and Differentiated services.
Application Layer: Domain Name System-Namespace, Domain Name Space,
Unit – V Distribution of Name Space, DNS in Internet, Resolution, Domain Name Space (DNS)
Messages, Electronic Mail, File Transfer

TEXT BOOKS & OTHER REFERENCES

Text Books

1.
Data communications and Networking, Behrouz A. Forouzan, 4th edition, TMH.

Suggested / Reference Books


1. Computer Networks Fifth Edition By Andrew S. Tanenbaum, Pearson Education

2
Computer Networking, A Top – Down approach featuring the internet, James F.
2. kurose, K .w.ross , 3rd edition, Pearson Education.

Websites References
1.
http://netgroup.polito.it/teaching/cn/Content

2. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-
829-computer-networks-fall-2002/download-course-materials/
3.
http://en.wikipedia.org/wiki/Computer_networks

4.
http://www.networking-forum.com/

Time Table
Room No: 103 W.E.F: 16-11-2018
Hour/ 1 2 3 4 12:20 5 6 7
– 1:10
Time 9:00 - 9:50 9.50 –10:40 10:40 –11:30 11:30 – 12: 20 1:10 –2:00 2:00 – 2:50 2:50 – 3:40
LUNCH
BREAK
MON

TUE

WED

3
THU

FRI

SAT

PROGRAM EDUCATIONAL OBJECTIVES (PEO’s)

PEO1 The Graduates are employable as software professionals in reputed


industries.

PEO2 The Graduates analyze problems by applying the principles of


computer science, mathematics and scientific investigation to
design and implement industry accepted solutions using latest
technologies.

PEO3 The Graduates work productively in supportive and leadership roles


on multidisciplinary teams with effective communication and team

4
work skills with high regard to legal and ethical responsibilities.

PEO4 The Graduates embrace lifelong learning to meet ever changing


developments in computer science and Engineering.

PROGRAM OUTCOMES (PO’s)

PO1 An ability to communicate effectively and work on multidisciplinary


teams

PO2 An ability to identify, formulate and solve computer system problems


with professional and ethical responsibility.

PO3 A recognition of the need for, and an ability to engage in life-long


learning to use the latest techniques, skills and modern engineering
tools

PO4 The broad education necessary to understand the impact of


engineering solutions in a global, economic, environmental and social
context

PO5 An ability to apply knowledge of mathematics, science, and


computing to analyze, design and implement solutions to the realistic
problems.

PO6 An ability to apply suitable process with the understanding of


software development practice.

Course Outcomes:
By the completion of this course the student will be able to:

1. Analyze TCP/IP and OSI models and various protocols.

2. Analyze various network layer protocols.

3. Compare and contrast various Routing and Congestion control algorithms .

5
4. Choose suitable protocol (UDP/TCP) of transport layer based on the type of the application.

5. Evaluate various responsibilities of application layer.

MAPPING OF COURSE OBJECTIVES & COURSE OUT COMES WITH


PO’s & PEO’s

Course Outcomes PO’s PEO’s


1 5,2 2,1
2 5,2 2,1
3 5,2 2,1
4 2 2,1
5 5,2 2,1

COURSE SCHEDULE
Distribution of Hours Unit – Wise
Chapters
Unit Topic Total No. of Hours
Book1

Brief Introduction on Physical ,


Ch-2.2,2.3,10.1,Ch-
I Data link layer, Network Layer- 21
8
Part-1
II Network Layer-Part-II Ch-22 10

6
III Transport layer-Part-I Ch-23 10

IV Transport layer-Part-II Ch-24 10

V Application layer Ch-25,26 12

Contact classes for Syllabus coverage 50

Tutorial Classes : Online Quiz :


Descriptive Tests : 02 (Before I-Mid-1,After Mid-I Examination)

Number of Hours / lectures available in this Semester / Year 50

The number of topics in every unit is not the same – because of the variation, all
the units have an unequal distribution of hours

Lecture Plan

Date of
S No. Topic
Completion
Unit-1
1 Brief Introduction on Network Models
Error detection and Correction in data link layer.
2
3 Address Mapping
4 Error Reporting and Multicasting
Address Mapping
5
6 Internet Control Message Protocol (ICMP)
7 Internet Group Management Protocol (IGMP),
8 Internet Group Management Protocol Version6 (ICMPv6).
Unit-2
1 Network Layer :Delivery
2 Forwarding and Routing
3 Delivery
4 Forwarding
7
5 Uni-casting Routing Protocols,
6 Multicast Routing Protocols
Unit-3
1 Transport Layer
2 Process to Process Delivery
3 User Datagram Protocols(UDP)
4 Transmission control Protocol (TCP),
5 Link State Routing
6 Stream Control Transmission Protocol(SCTP)
Unit-4
1 Transport Layer: Congestion Control
2 Quality of Service
3 Data Traffic
4 Congestion
5 Congestion Control
6 Quality of Service
7 Techniques to improve QoS,Integrated Services
Differentiated services
8

Unit-5
1 Application Layer
2 Domain Name System-Namespace
3 Domain Name Space
4 DNS in Internet
5 Resolution
6 Domain Name Space (DNS) Messages
7 Electronic Mail
8 File Transfer

Date of Unit Completion & Remarks

Unit – 1

Date : __ / __ / __

Remarks:
8
________________________________________________________________________

Unit – 2

Date : __ / __ / __

Remarks:

________________________________________________________________________

Unit – 3

Date : __ / __ / __

Remarks:

________________________________________________________________________

Unit – 4

Date : __ / __ / __

Remarks:

________________________________________________________________________

Unit – 5

Date : __ / __ / __

Remarks:

________________________________________________________________________

9
Unit Wise Assignments (With different Levels of thinking
(Blooms Taxonomy))
Note: For every question please mention the level of Blooms taxonomy

Unit – 1

Compare the responsibilities of network layer with that of transport layer.


1.

Explain about the functionalities of session and presentation layers.


2.

Explain about the hamming code technique for single bit error correction.
3.

How do you find the number of check bits required for a data word of length n and
codeword of size r?
4.

Find the code word for the following data words using the odd parity with hamming
code.
i)1000010001
5 ii)10011110
iii)111000011111010

Explain the reason behind the restriction on ICMPV4 message in response to failed
ICMPv4 error message. A router receives an IPv4 packet with source IP address
6) 130.45.3.3 and destination IP address 201.23.4.6. If a router cannot find the destination IP
address in the routing table which ICMPv4 message should be employed

Unit – 2

Explain about the functionality of RIP along with its shortcomings.


1.

2. Briefly explain about the classification of links used by OSPF

3.
Justify the statement “ OSPF messages move faster than RIP messages”.
Explain about the significance of hop count in RIP
4.

Unit – 3

10
What is the reason behind the uniqueness of port addresses? Why port addressees
1. are shorter compared to IP addresses?

What is the minimum and maximum size of the following? Explain with proper
justification.
2. i) UDP Datagram
ii) Process data that can be encapsulated in UDP datagram

Compare the fields UDP header with TCP header. Explain the reason behind some
3. fields which are extra in TCP.

4. List out the different applications where UDP and TCP can be used by explaining the
characteristics of each of the protocols
Unit – 4

Compare and contrast the following:


i)open-loop and closed loop congestion control mechanisms
1. ii) Differentiated and Integrated Services

2. Explain about the different congestion prevention mechanisms

3. Explain about the congestion policy employed by TCP

4. Write short notes on the different techniques employed for improving QoS
Explain about the functionality of Resource Reservation protocol (RSVP).
5

Unit – 5

1. Differentiate FQDN and PQDN with examples.

Explain about the categories of DNS messages. How is iterative resolution different
2.
from recursive resolution?

3. Explain about three domains of DNS and the significance of inverse domain

4. Explain the role of POP3 and IMAP4 in electronic mail.

Briefly explain the following with regard to FTP:


5 i) Transmission modes.
ii)Connections

11
Unit Wise Case Studies (With different Levels of thinking
(Blooms Taxonomy))
Note: For every Case Study please mention the level of Blooms taxonomy

Case Studies (With Higher Levels of thinking (Blooms


Taxonomy))
Note: For every Case Study please mention the level of Blooms taxonomy

1(Covering Syllabus Up to Mid-1)

Implement a any one of uni-cast routing protocol?

2(Covering Entire Syllabus)

Develop a real time Chat Server Application using TCP Sockets.

Unit Wise Important Questions (With different Levels of


thinking (Blooms Taxonomy))
Note: For every question please mention the level of Blooms taxonomy

Unit – 1

Discuss the ISO - OSI layered model, bringing out the functionalities of each
1.
layer
Draw a CRC encoder and decoder for CRC code with C (7, 4). Also explain how
2.
this CRC design works, with an example
3. Explain network layer functionality
12
4. Explain in detail Address Mapping Mechanisms.

Unit – 2

Explain Routing and delivery?


1.

2. Define Routing?

Mention Unicast routing Protocols?


3.

Mention Multicast routing Protocols


4.

Compare Unicast and Multicast Routing Protocols.


5

Unit – 3

Define Delivery?Explain Process delivery


1.

Explain in detail the tcp header


2.

Explain in detail Udp header


3.

4. Differentiate between tcp,udp

mention advantages of SCTP


5

Unit – 4

1. With is Congestion?

2. Explain TCP Congestion control techniques in detail.

Explain how QoS is provided through Differentiated Services.


3.

4. Explain the Congestion Avoidance techniques in detail.

Unit – 5

1.
13
Explain DNS?
Discuss the DNS message format for query and reply messages. L3
If a DNS domain name is XXX.YYY.edu, how many labels are involved in
2. here? What is the lowest level domain and what is the highest level domain
in this example? Explain. L2
3. How does DNS perform name resolution? Explain with example. L3

a) What is Electronic mail? Explain the two scenarios of architecture of E-Mail.


4.
b)What is a name server? List and explain the characteristic features of
various name servers.

Unit Wise Multiple Choice Questions

Unit – I
1. When collection of various computers seems a single coherent system to its client, then it is
called
a) computer network
b) distributed system
c) both (a) and (b)
d) none of the mentioned
Answer:b

2. Two devices are in network if


a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) none of the mentioned
Answer:a

3. Which one of the following computer network is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Answer:d

4. In computer network nodes are


a) the computer that originates the data
b) the computer that routes the data

14
c) the computer that terminates the data
d) all of the mentioned
Answer:d

5. Communication channel is shared by all the machines on the network in


a) broadcast network
b) unicast network
c) multicast network
d) none of the mentioned
View Answer
Answer:a.
Unit – II

6. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned
Answer:a

7. A _____ is a device that forwards packets between networks by processing the routing
information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned
Answer:c

8. A list of protocols used by a system, one protocol per layer, is called


a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned
View Answer
Answer:b

9. Network congestion occurs


a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
View Answer
Answer:a.
15
10. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
Answer:b

Unit – III
11. The physical layer concerns with
a) bit-by-bit delivery
p) process to process delivery
c) application to application delivery
d) none of the mentioned
Answer:a

12. Which transmission media has the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
Answer:c

13. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation

14. The portion of physical layer that interfaces with the media access control sublayer is called
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) none of the mentioned
Answer:a

15. The data link layer takes the packets from _____ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
16
c) transport layer
d) application layer
Answer:a

Unit – IV
16. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
Answer:d
17. Which sublayer of the data link layer performs data link functions that depend upon the type
of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer:b

18. Header of a frame generally contains


a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Answer:d

18. Automatic repeat request error management mechanism is provided by


a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer:a

19. When 2 or more bits in a data unit has been changed during the transmission, the error is
called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
17
Answer:b
20. CRC stands for
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Answer:a
Unit – V
21. Which one of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) HDLC
d) all of the mentioned
Answer:d

22. Which one of the following is not a function of network layer?


a) routing
b) inter-networking
c) congestion control
d) none of the mentioned
Answer:d

23. The 4 byte IP address consists of


a) network address
b) host address
c) both (a) and (b)
d) none of the mentioned
Answer:c
24. Transmission control protocol is
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned
Answer:d

25. An endpoint of an inter-process communication flow across a computer network is called


a) socket
b) pipe
c) port
d) none of the mentioned
Answer:a

18
University Question Papers

****Should be attached

Tutorial Sheet

Date: Topics Revised:

Date: Topics Revised:

Date: Topics Revised:

Date: Topics Revised:

Date: Topics Revised:

19
TOPICS DISCUSSED BEYOND THE SYLLABUS

S.No. Topic

1 ICMP demonstration with Debugging tool PING

2 Uni-cast Routing Protocols Demonstration with Program

3. Multi-cast Routing Protocols Demonstration with Simulation

4. TCP Program Demonstration with Real time Application


UDP Program Demonstration with Real time Application
5.

ASSESMENT OF LEARNING OBJECTIVES AND OUT COMES: DIRECT

Blooms Taxonomy:
LEVEL 1 REMEMBERING Exhibit memory of previously learned
material by recalling facts, terms, basic
concepts, and answers
LEVEL 2 UNDERSTANDING Demonstrate understanding of facts and
ideas by organizing, comparing, translating,
interpreting, giving descriptions, and stating
main ideas.
LEVEL 3 APPLYING Solve problems to new situations by applying
acquired knowledge, facts, techniques and
rules in a different way
LEVEL 4 ANALYZING Examine and break information into parts by
identifying motives or causes. Make
inferences and find evidence to support
generalizations.
LEVEL 5 EVALUATING Present and defend opinions by making
judgments about information, validity of
ideas, or quality of work based on a set of
criteria.
LEVEL 6 CREATING Compile information together in a different
way by combining elements in a new pattern
or proposing alternative solutions.
*Attach course assessment sheet

ASSESMENT OF COURSE OUTCOMES: INDIRECT


SNo Criteria LEVEL(Level 5:Excellent Level 4:Very Good Level 3:Good Level 2:Satisfactory Level 1:Poor)
1 Oral 5 Student speaks in phase with the given topic confidently using Audio-Visual aids. Vocabulary is exceptional

20
Com 4 Student speaking with proper planning, fair usage of Audio-Visual aids. Vocabulary is good
mun
3 Student speaking without proper planning, fair usage of Audio-Visual aids. Vocabulary is not good
icati
on 2 Student speaks in phase but no synchronization among the talk and Visual Aids.
1 Student speaks vaguely not in phase with the given topic.
Proper structuring of the document with relevant subtitles, readability of document is high with correct use
5
of grammar. Work is genuine and not published anywhere else.
Information gathered is relevant to the given task. Sentences were framed properly with correct use of
Writin 4
grammar.
g Information gathered is relevant to the given task. sentences were framed properly with inappropriate use
2 3
Skill of grammar
s Information is gathered without continuity of topic, sentences were not framed properly. Few topics are
2
copied from other documents
1 Information gathered was not relevant to the given task. Content is copied from other documents
Social Student identifies most potential ethical or societal issues and provides solutions for them discussing with
5
and peers
Ethi Student identifies most potential ethical or societal issues and provides partial solutions for them
4
cal discussing with peers
3 Awa Student identifies the societal and ethical issues but tries to provide solutions for them discussing with
rene 3
peers
ss 2 Student identifies the societal and ethical issues but fails to provide any solutions discussing with peers
1 Student makes no attempt in identifying the societal and ethical issues
Conten 5 Student uses appropriate methods, techniques to model and solve the problem accurately
t 4 Student uses appropriate methods, techniques to model and solve the problem partially.
Kno
4 3 Student uses appropriate methods to model the problem but attempts to solve the problem
wle
dge 2 Student tries to model the problem and fails to solve the problem
1 Student fails to model the problem and also fails to solve the problem
Studen 5 Listens carefully to the class and answer the questions confidently
t
4 Listens carefully to the class and tries to answer questions confidently.
Part
5 icip 3 Listens carefully to the lecture and attempts to answer the questions
atio 2 Student listens to the class but doesn’t attempts to answer the questions
n
1 Student neither listens to the class nor attempts to answer the questions
Techni The program structure is well organized with appropriate use of technologies and methodology. Code is
5
cal easy to read and well documented. Student is able to implement the algorithm producing accurate results
and Program structure is well organized with appropriate use of technologies and methodology. Code is easy to
4
anal read and not properly documented. Student is able to implement the algorithm providing accurate results.
ytic Program structure is well organized with appropriate use of technologies and methodology. Code is quite
6 al 3 difficult to read and not properly documented. Student is able to implement the algorithm providing
Skill accurate results.
s Program structure is well organized with usage of appropriate technologies and methodology. Code is
2
difficult to read and not documented properly and not able to execute the program
Program structure is not well organized with mistakes in usage of appropriate technologies and
1
methodology. Code is difficult to read and student is not able to execute the program
Practic
5 Independently able to write programs for any given context to strengthen the concepts covered in theory
al
Kno 4 Independently able to write programs to strengthen the concepts covered in theory
wle
7 3 Independently able to write programs and able to strengthen the concepts learned in theory
dge
2 Not able to write programs but able to strengthen the concepts learned in theory.
1 Not able to write programs and not able to strengthen the concepts learned in theory
8 Unders Student uses appropriate methods, techniques to model and solve the problem accurately in the context of
5
tand multidisciplinary projects
ing 4 Student tries to model the problem and solve the problem in the context of multidisciplinary projects
of 3 Student tries to model the problem and attempts to solve the problem in the context

21
Engi of multidisciplinary projects.
neer Student tries to model the problem but fails to solve the problem in the context
ing 2
of multidisciplinary projects.
core Student fails to model the problem and also fails to solve the problem in the context
1
of multidisciplinary projects
*Attach course assessment sheet

Add-on Programmes:
1

Guest Lectures:

1.
2.
3.
4.

Unit Wise PPT’s:

Unit Wise lecture Notes:

22

You might also like