You are on page 1of 15

University Institute of Engineering

DEPARTMENT OF COMPUTER SCIENCE


& ENGINEERING
Bachelor of Engineering (Computer Science & Engineering)
Subject Name:Computer Network
Subject Code: 21CSH-256/ 21ITH-256

DISCOVER . LEARN . EMPOWER


UNIT-I
Syllabus
Introduction: Introduction to network, types of transmission technologies, Network Categories: LAN, MAN, WAN (Wireless /Wired),
Network Software: Concept of Layers, Protocols, interfaces and services. Reference Models: OSI, TCP/IP and comparison, Concept of
Topologies.
Physical Layer: Bit rate, Baud rate, Bandwidth, Transmission Impairments: Attenuation, Distortion, Noise; Data rate limits: Nyquist
formula, Shannon Formula, Modulation & modems; Transmission Modes, Multiplexing: Frequency Division, Time Division, Wavelength
Division
Transmission Media and Switching: Twisted pair, coaxial, fiber optics, Wireless Transmission (radio, microwave & infrared);Message
switching, Circuit Switching & Packet Switching.
UNIT-II
Data Link Layer(Flow and Error Control): Design issues, Error Detection & Correction; Flow control & Error Control; Sliding Window
Protocols, ARQ: Stop & Wait , Go Back n, Selective Repeat ; Examples of DLL protocols – HDLC, PPP;
Data Link Layer (Medium Access Sub layer) Channel Allocation; Random Access: ALOHA, CSMA protocols; Controlled Access: Polling,
Reservation, Token Passing; Examples of IEEE standards(802.2,802.3,802.4, 802.5), Basics of Wi-Fi(802.11).
Network Layer: Design issues, Logical Addressing: IPv4 & IPv6; Packet Formats & their comparison IPv4 & IPv6; Routing Algorithms:
Distance Vector, Link State

UNIT-III
Network Layer(Continue): Congestion Control: Principles of congestion control; Congestion prevention policies, Leaky bucket & Token
Bucket Algorithms.
Transport Layer: Services provided to upper layers, Elements of Transport protocols. Addressing, Flow Control & buffering; Example
Transport protocols: TCP, SCTCP & UDP.
Application Layer and Network Security: Domain Name System, Simple Network Management Protocol, Electronic Mail, World Wide
Web, Basics of authentication, Public and Private Key Cryptography, Digital Signatures and Certificates, Firewalls.
Network Layer Design Isues
• Store-and-Forward Packet Switching
• Services Provided to the Transport Layer
• Implementation of Connectionless Service
• Implementation of Connection-Oriented Service
• Comparison of Virtual-Circuit and Datagram Subnets
Store-and-Forward Packet Switching
Implementation of Connectionless Service
Routing within a diagram subnet.
Implementation of Connection-Oriented Service

Routing within a virtual-circuit subnet.


Comparison of Virtual-Circuit and Datagram Subnets

5-4
Internet Protocol
How does information get sent from one device to another across a
WAN?
The network layer
• The purpose of the physical layer is to provide a physical mechanism
for transmitting data as signals.
• The purpose of the data link layer is to ensure the integrity of the
data sent over a given physical link.
• The purpose of the network layer is to provide a mechanism for data
to be sent from one device to another over a route that might span
many different physical links.
• Routing is the process by which data is directed across multiple links
from one host to another.
Logical Addressing
• The data link layer uses physical addressing, such as MAC or NIC addresses,
where the address is tied to a specific physical device.
• Network layer protocols use logical addressing, where a given device can
have multiple possible addresses.
IP Addresses
• Each connection to the Internet is given an IP address of some for or
another.
• No two connections on the Internet can have the same IP address at
the same time.
• However, these are still logical addresses because a given
connection’s IP address can change, or it can be reassigned to a new
device if the first one is disconnected from the Internet.
• If a given device has multiple connections to the internet (such as a
router), each connection needs its own IP address.
• Old school addressing:
• All current IP addresses are 4 bytes.
• Once upon a time, IP address were arranged somewhat hierarchically:
• The first byte would indicate the class of the site, usually reflective of its size.
• The second byte would further uniquely identify the site.
• The third byte would be the subnet within the site.
• The fourth byte would specify the actual machine.
• This was wasteful. Small organizations like Carthage did not need 65,546 IP
addresses. Lots of potential addresses were being wasted.
• This was fine when the number of machines connected to the internet could
be measured in the hundred-thousands.
• Now that it’s creeping up on the billions, not so fine.
Modern addressing

• Modern addressing largely does away with the hierarchy.


• Instead, organizations are assigned address blocks.
• These are groups of contiguous addresses
• A block must contain 2n addresses, where n ranges from 0 to 15.
• The first address in a block must be evenly divisible by the number of addresses.
• The first address in block is the network address, which is the address that identifies
the entire organization to the Internet, particularly routers.
• Within an address block, the organization is free to divide and
allocate those addresses however it sees fit.
• The network address must point to the network’s router, which is
responsible for forwarding packets out to the appropriate machines
on its network.
• Some organizations may choose to subnet their network. They divide
their address block into smaller blocks. However, the rules for
subnetting are the same as the ones for assigning address blocks.
References

• http
://highered.mheducation.com/sites/0072967757/student_view0/cha
pter12/powerpoint_slides.html
• https://www.tutorialspoint.com/data_communication_computer_net
work/data_link_control_and_protocols.htm
• Data Communications and Networking by Behrouz A. Forouzan
• www.mhhe.com/Forouzan

15

You might also like