Top Banner
MC931 COMPUTER NETWORKS L T P C 3 0 0 3 UNIT I INTRODUCTION Communication model – Data communications networking – Data transmission concepts and terminology – Transmission media – Data encoding – Data link control. UNIT II NETWORK FUNDAMENTALS Protocol architecture – Protocols – OSI – TCP/IP – LAN architecture – Topologies – MAC – Ethernet, Fast ethernet, Token ring, FDDI, Wireless LANS – Bridges. UNIT III NETWORK LAYER Network layer – Switching concepts – Circuit switching networks – Packet switching – Routing – Congestion control – X.25 – Internetworking concepts and X.25 architectural models – IP – Unreliable connectionless delivery – Datagrams – Routing IP datagrams – ICMP. UNIT IV TRANSPORT LAYER Transport layer – Reliable delivery service – Congestion control – Connection establishment – Flow control – Transmission control protocol – User datagram protocol. UNIT V APPLICATIONS Applications – Sessions and presentation aspects – DNS, Telnet – rlogin, – FTP – SMTP – WWW – Security – SNMP. TOTAL = 45 REFERENCES:
27

Computer Networks Students Copy

Apr 18, 2015

Download

Documents

karthika07
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Networks Students Copy

MC931 COMPUTER NETWORKS L T P C

3 0 0 3UNIT I INTRODUCTION Communication model – Data communications networking – Data transmission concepts and terminology – Transmission media – Data encoding – Data link control.

UNIT II NETWORK FUNDAMENTALS Protocol architecture – Protocols – OSI – TCP/IP – LAN architecture – Topologies –

MAC – Ethernet, Fast ethernet, Token ring, FDDI, Wireless LANS – Bridges.

UNIT III NETWORK LAYER Network layer – Switching concepts – Circuit switching networks – Packet switching – Routing – Congestion control – X.25 – Internetworking concepts and X.25 architectural models – IP – Unreliable connectionless delivery – Datagrams – Routing IP datagrams – ICMP.

UNIT IV TRANSPORT LAYER Transport layer – Reliable delivery service – Congestion control – Connection establishment – Flow control – Transmission control protocol – User datagram protocol.

UNIT V APPLICATIONS Applications – Sessions and presentation aspects – DNS, Telnet – rlogin, – FTP – SMTP – WWW – Security – SNMP.

TOTAL = 45

REFERENCES:

1. Larry L. Peterson & Bruce S. Davie, “Computer Networks – A systems Approach”, Second Edition, Harcourt Asia / Morgan Kaufmann, 2000.

2. William Stallings, “Data and Computer Communications”, Fifth Edition, PHI, 1997.

Page 2: Computer Networks Students Copy

S.VEERASAMY CHETTIAR COLLEGEOF ENGINEERING AND TECHNOLOGYS. V. Nagar, Puliangudi – 627 855.

DEPARTMENT OF COMPUTER APPLICATIONS

COURSE PLAN-ODD SEMESTER (2012-2013)

Semester/Branch : III/ MCASubject : COMPUTER NETWORKS Subject Code : MC 9231Staff Name : R.Selvamatha

1) PRE-REQUISITES:

Minimum (required) prerequisites include an understanding of basic networking and basic Graph theory concepts in Mathematics.

2) OBJECTIVES:

To learn about why effective communication is required?

To understand about what are they affect the basic communication network.

To learn the Computer Network Fundamental terms Protocols, Medium, Topologies and Bridges.

To learn about what are difficulties in the intermediate system in the communication Network.

To learn the various Network Applications details.

3) LEARNING OUTCOMES AND END USE:

Outcome leads the student to study the project based courses and advanced communication networks from that Students can acquired a deep understanding of various network concepts and protocols that leads the student to develop sophisticated network applications.

4) LIST OF REFERNCE BOOKS

R1) Larry L. Peterson & Bruce S. Davie, “Computer Networks – A systems Approach”, Second Edition, Harcourt Asia / Morgan Kaufmann, 2000.

R2) William Stallings, “Data and Computer Communications”, Fifth Edition, PHI, 1997.

Page 3: Computer Networks Students Copy

5) WEB SOURCEShttp://www.easy-share.com/1907964094/Datahttp://authors.phptr.com/tanenbaumcn4http://icapeople.epfl.ch/thiran/CoursED/Ch1_Intro.pdfhttp://www.freewebs.com/tahiras100/Computer%20Networks-PETERSON%20AND%20DAVIE.pdf

6) LESSON PLAN:

Topic No.

Topic Name Reference Books Number of periods

Cumulative periods

UNIT - I : INTRODUCTION1 A Communication Model R2 1 12 Data Communications R2 1 23 Data Communications Networking R2 1 34 Data Transmission Concepts R2 1 45 Data Transmission Terminology R2 1 56 Guided Transmission Media R2 1 67 Unguided Transmission Media R2 1 78 Digital Data Encoding R2 1 89 Analog Data Encoding R2 1 910 Flow Control in DLC R2 2 1111 Error Detection & Control R2 2 1312 HDLC & Other DLC R2 1 14

UNIT - II : NETWORK FUNTAMENTALS13 Protocol Architecture R1 & R2 1 1514 Protocols R1 & R2 1 1615 OSI R1 & R2 2 1816 TCP/IP R1 & R2 2 2017 LAN Architecture R1 & R2 1 2118 LAN Topologies R1 & R2 1 2219 Ethernet R1 & R2 1 2320 Fast Ethernet R1 & R2 1 2421 Token Ring R1 & R2 1 2522 FDDI R1 & R2 2 2723 Wireless LANS R1 & R2 1 2824 Bridges R1 & R2 1 29

UNIT-III : NETWORK LAYER 25 Network Layer Fundamentals R2 1 3026 Switching Concepts R2 2 3227 Circuit Switching R2 1 3328 Routing in Circuit Switching R2 1 3429 Packet Switching R2 1 3530 Routing in Packet Switching R2 1 36

Page 4: Computer Networks Students Copy

31 Congestion Control R2 1 3732 X.25 R2 1 3833 Internetworking Concepts R2 1 39

34 Internet Protocol R2 1 4035 Unreliable Connectionless delivery R2 1 4136 Datagram & Routing R2 2 4337 ICMP R2 1 44

Topic No.

Topic Name Reference Books Number of periods

Cumulative periods

UNIT - IV : TRASPORT LAYER38 Transport Layer Fundamentals R2 2 4639 Transport Services R2 1 4740 Reliable Delivery Service R2 1 4841 Congestion Control R2 2 5142 Connection establishment R2 1 5343 Flow Control R2 1 5444 TCP Mechanisms R2 1 5545 Transmission Control Protocol R2 2 5746 User Datagram Protocol R2 1 58

UNIT - V : APPLICATIONS47 Applications R1 2 6048 Session Aspects R1 1 6149 Presentation Aspects R1 1 6250 DNS R1 1 6351 Telnet R1 2 6552 Rlogin R1 1 6653 FTP R1 1 6754 SMTP R1 1 6855 WWW R1 1 6956 Security R1 1 7057 SNMP R1 1 71

*R –REFERANCE BOOK

7. MONTHLY TEST PORTIONS

S.NO Units Monthly Test1. Unit – I & Unit – II(1st half unit) Monthly Test – I2. Unit – II( 2nd half unit) & Unit – III Monthly Test – II3. Unit – I to IV Monthly Test - III

Page 5: Computer Networks Students Copy

8. SEMINAR TOPICSDNS.

Telnet. Rlogin. FTP. SMTP. WWW. Security. SNMP.

9. ASSIGNMENTSASSIGNMENT-I Date of Submission:

1. Draw an example Network Diagram.

2. Mention the types of errors.

3. What are the three criteria necessary for an effective and efficient network?

4. Why are standards needed?

5. What is a buffer?

6. Explain about Wireless LANS 802.11.

7. Explain about Guided and Unguided Transmission media.

ASSIGNMENT II Date of Submission:

1. Why are protocols needed?

2. What is the purpose of hamming code?

3. For n devices in a network, what is the number of cable links required for a mesh

and ring topology?

4. Define Bridges.

5. Define MAC.

6. What is Collision?

7. Explain about OSI Reference Model.

8. Explain about TCP/IP Reference Model.

ASSIGNMENT III Date of Submission:

1. What is protocol data unit?

2. What are the responsibilities of network layer?

Page 6: Computer Networks Students Copy

3. What is a virtual circuit?

4. What are data grams?

5. What is meant by hop count?

6. What is meant by brouter?

7. Explain about the following Routing algorithms

a. Shortest Path Routing

b. Flooding

c. Multicast Routing

ASSIGNMENT IV Date of Submission:

1. What are the duties of the transport layer?

2. What is function of transport layer?

3. What is the difference between network layer delivery and the transport layer

delivery?

4. What is meant by segmentation?

5. What is meant by Concatenation?

6. Why the congestion occurs in network?

7. What is meant by quality of service?

8. Define Gateway.

9. What are the four aspects related to the reliable delivery of data?

10. Explain about Flow control in Transport Layer.

11. Explain about User Datagram Protocol.

ASSIGNMENT V Date of Submission :

1. What is the purpose of Domain Name System?

2. Discuss the three main division of the domain name space.

3. Discuss the TCP connections needed in FTP.

4. Discuss the basic model of FTP.

5. What is the function of SMTP?

6. Explain about www.

7. Explain about rlogin.

Page 7: Computer Networks Students Copy

QUESTION BANK

UNIT I

DATA COMMUNICATION

PART A(2 Marks)

1. What is mean by data communication?

2. What are the three criteria necessary for an effective and efficient network?

3. What are the three fundamental characteristics determine the effectiveness of the

data communication system?

4. What are the advantages of distributed processing?

5. Why are protocols needed?

6. Why are standards needed?

7. For n devices in a network, what is the number of cable links required for a mesh

and ring topology?

8. What is the difference between a passive and an active hub?

9. Distinguish between peer-to-peer relationship and a primary-secondary

relationship.

10. Assume 6 devices are arranged in a mesh topology. How many cables are

needed? How many ports are needed for each device?

11. Group the OSI layers by function.

12. What are header and trailers and how do they get added and removed?

13. The transport layer creates a communication between the source and

destination. What are the three events involved in a connection?

14. What is the DC component?

15. How does NRZ-L differ from NRZ-I?

16. What are the functions of a DTE? What are the functions of a DCE?

17. What does the electrical specification of EIA-232 describe?

18. Discuss the mode for propagating light along optical channels.

19. What is refraction?

Page 8: Computer Networks Students Copy

PART B(16 Marks)

1. Explain ISO/OSI reference model.

2. Explain the topologies of the network.

3. Explain the categories of networks.

4. Explain coaxial cable & fiber optics.

5. Explain line coding (digital to digital conversion).

UINT IIDATALINK LAYER

PART A(2 Marks)

1.What are the responsibilities of data link layer?

2. Mention the types of errors.

3. Define the following terms.

4. What is redundancy?

5. List out the available detection methods.

6. Write short notes on VRC.

7. Write short notes on LRC.

8. Write short notes on CRC.

9. Write short notes on CRC generator.

10. Write short notes on CRC checker.

11. Give the essential properties for polynomial.

12. Define checksum.

13. What are the steps followed in checksum generator?

14. List out the steps followed is checksum checker side.

15. Write short notes on error correction.

16. Mention the types of error correcting methods.

17. What is the purpose of hamming code?

18. Define flow control.

19. What is a buffer?

20. Mention the categories of flow control.

Page 9: Computer Networks Students Copy

UNIT II

DATA LINK LAYER

PART B(16 Marks)

1. Explain error detection and error correction techniques.

2. Explain error control mechanism.

3. Explain the flow control mechanism

4. Explain the timers and time registers in FDDI.

5. Explain about Ethernet.

UNIT III

NETWORK LAYER

PART A(2 Marks)

1. What are the network support layers and the user support layers?

Network support layers:

2. With a neat diagram explain the relationship of IEEE Project to the OSI model?

3. What are the functions of LLC?

4. What are the functions of MAC?

5. What is protocol data unit?

6. What are headers and trailers and how do they get added and removed?

7. What are the responsibilities of network layer?

8. What is a virtual circuit?

9. What are data grams?

10. What are the two types of implementation formats in virtual circuits?

11. What is meant by switched virtual circuit?

12. What is meant by Permanent virtual circuit?

13. Define Routers.

14. What is meant by hop count?

15. How can the routing be classified?

16. What is time-to-live or packet lifetime?

17. What is meant by brouter?

18. Write the keys for understanding the distance vector routing.

Page 10: Computer Networks Students Copy

19. Write the keys for understanding the link state routing.20. How the packet cost referred in distance vector and link state routing?

PART B(16 Marks)

1. Explain the two approaches of packet switching techniques.

2. Explain IP addressing method.

3. Define routing & explain distance vector routing and link state routing.

4. Define bridge and explain the type of bridges.

5. Explain subnetting

UNIT IV

TRANSPORT LAYER

PART A(2 Marks)

1. What is function of transport layer?

2. What are the duties of the transport layer?

3. What is the difference between network layer delivery and the transport layer delivery?

4. What are the four aspects related to the reliable delivery of data?

5. What is meant by segment?

6. What is meant by segmentation?

7. What is meant by Concatenation?

8. What are the types of multiplexing?

9. What are the two possible transport services?

10. The transport layer creates the connection between source and destination. What are

the three events involved in the connection?

11. What is meant by congestion?

12. Why the congestion occurs in network?

13. What is meant by quality of service?

14. What are the two categories of QoS attributes?

15. List out the user related attributes?

16. What are the networks related attributes?

17. What is the difference between service point address, logical address and

physical address?

Page 11: Computer Networks Students Copy

18. What are the rules of nonboundary-level masking?

19. Define Gateway.

20. What is LSP?

PART B(16 Marks)

1. Explain the duties of transport layer.

2. Explain socket in detail.

3. Explain UDP & TCP.

4. Explain about congestion control.

5. Explain leaky bucket and token bucket algorithm

UNIT V

APPLICATION LAYER

PART A(2 Marks)

1. What is the purpose of Domain Name System?

2. Discuss the three main division of the domain name space.

3. Discuss the TCP connections needed in FTP.

4. Discuss the basic model of FTP.

5. What is the function of SMTP? 6. What is the difference between a user agent (UA) and a mail transfer agent (MTA)?

7. How does MIME enhance SMTP?

8. Why is an application such as POP needed for electronic messaging?

9. Give the format of HTTP request message.

10. Give the format of HTTP response message.

11. Write down the three types of WWW documents.

12. What is the purpose of HTML?

13. Define CGI.

14. Name four factors needed for a secure network.

15. How is a secret key different from public key?

16. What is a digital signature?

17. What are the advantages & disadvantages of public key encryption?

18. What are the advantages & disadvantages of secret key encryption?

Page 12: Computer Networks Students Copy

19. Define permutation.

20. Define substitutional & transpositional encryption.

PART B(16 Marks)

1. Explain the duties of transport layer.

2. Explain socket in detail.

3. Explain UDP & TCP.

4. Explain about congestion control.

5. Explain leaky bucket and token bucket algorithm

Page 13: Computer Networks Students Copy

MCA DEGREE EXAMINATION, NOV / DECEMBER 2009Third Semester

MC 1701 – Computer Networks(Regulation 2005)

Time : 3 hours Maximam Marks:100 PART A (10 x 2 = 20 MARKS )

1. What functional unit makes up the DCE and what function does it provide?

2. How many lines are required to direct connect 256 nodes in a mesh system?

3. What is NIC? What is the main purpose of NIC?

4. Why is CSMA\CA used in place of CSMA\CD in wireless LAN?

5. Compare unicast and multicast routing protocols?

6. What are the functions of network layer?

7. Mention the features of TCP?

8. List the various congestion control

9. Find the value of ‘d’ in RSA algorithm, if n=77 and 3=13.

10. Explain the term : (a) SMTP  (b) SNMP.

PART B (5 x 16 = 80 MARKS )

11. (a) Discuss the design objective of computer networking? Explain Network

Architecture in detail.

OR

(b) What are the requirements of Reliable transmission> Discuss linear block codes with

suitable example.

Page 14: Computer Networks Students Copy

 

12 (a) What are common Ethernet implementations? Discuss about sub layer.

OR

((b) Discuss about IEEE 802.11 standard. Explain type of mobility.

 

13 (a) What are various switching techniques? Compare different types of switching

methodologies.

OR

(b) Discuss about any two routing technique in detail.

 

14 (a) Explain TCP and UDP features with neat diagram.

OR

(b) What are the different congestion avoidance mechanisms? Explain in detail.

 

15 (a) List various security services. Explain the structure of Data Encryption standard.

OR

(b) Explain the components of the SNMP management model. What are the basic

functions supported by Email systems.

Page 15: Computer Networks Students Copy

MCA DEGREE EXAMINATION, MAY / JUNE 2009Third Semester

MC 1701 – Computer Networks(Regulation 2005)

Time : 3 hours Maximam Marks:100 PART A (10 x 2 = 20 MARKS )

1. What are the key elements of protocol?

2. How do layers of the internet model correlate to the layers of the OSI model?

3. What is meant by NIC and NAT?

4. Mention the sublayers datalink layer in IEEE standard?

5. How do the submask subernetmask differ?

6. What are the important fields in routing table?

7. Compare circuit and packet switching.

8. List the three phases of TCP connection?

9. Name the policies that can prevent congestion?

10. In symmetric key how many keys are needed for n users?

PART B (5 x 16 = 80 MARKS )

11. a) What are the requirements of reliable connection? Explain in detail about OSI layer reference model?

(OR)

b) i. Distinguish between forward error correction versus error correction by retransmission.

ii) Find the status of the following generators related to two isolated single bit errors(1) x7+x6+1(2) x4+1

12.(a) Give brief description of the following (1)LAN topology (2) Compare the performance of BUS and RING topology

(OR)

(b) Discuss in detail of transmission on media for LAN and compare their characteristics .

Page 16: Computer Networks Students Copy

13. (a) Explain the differences between adaptive and non adaptive routing algorithms.Give one algorithm from each one of the above mentioned class.

(OR)

(b) With neat diagram explain bridges and LAN switches.

14. (a) Discuss in detail various congestion control mechanism

(OR)

(b) Explain User Datagram Protocol and use of UDP in detail.

15. (a) What is S –P network? Explain the characteristics of good ciphers?How encryption differ from compression.

(OR)

(b) Exolain the following 1) SMTP 2) Compare private and public key techniques 3)SNMP

Page 17: Computer Networks Students Copy

MCA DEGREE EXAMINATION, MAY/ JUNE 2008Third Semester

MC 1701 – Computer Networks(Regulation 2005)

Time : 3 hours Maximam Marks:100 PART A (10 x 2 = 20 MARKS )

1. What are the objectives of computer networking?

2. Explain redundancy and code rate.

3. List four common LAN topologies.

4. Mention any four function of bridges.

5. Draw IEEE 802.3 protocol layer.

6. What are TCP services to provide for reliable communication?

7. What are the advandages of Packet Switching Network?

8. Mention the TCP/IP applications.

9. What are DES and Triple DES?

10. Compare SMTP and MIME?

PART B (5 x 16 = 80 MARKS )

11. (a). How do layers of the internet model correlate to the layers of the OSI reference model? Explain the layers functions.

(OR)

(b). Explain the function of data link layer.A CRC (cyclic redundancy check) is constructed to generate a 5bit frame check sequence for an 10 bit message[ M(1010001101), P(110101)] Find the the CRC.

12. (a) Discuss the categories of Standard Ethernet and IEEE 802.3 MAC frame.

(OR)

(b) Explain the access method used by wireless LAN and MAC sublayer.

Page 18: Computer Networks Students Copy

13. (a) Explain in detail about principle of forwarding and function of bridges.

(OR)

(b) Give a brief description of two groups multicast routing protocol.Discuss its application.

14. (a) Compare the TCP header and UDP header.List the field of TCP header that are missing from UDP header. Give the reason for their absence.

(OR)

(b) Discuss in detail about congestion control and avoidance mechanism.

15. (a). (i) .What is the difference between passive and active security threats? Briefly define categories of attacks with suitable example.

(ii) Perform Encryption and Decryption using RSA algorithm.p=17 q=11 d=23 m=88

(OR)

(b). (i) Discuss briefly the key elements of SNMP. (ii) Explain the function of HTTP.

Page 19: Computer Networks Students Copy

MCA DEGREE EXAMINATION, NOV/ DECEMBER 2011

Third Semester

MC 1701 – Computer Networks

(Regulation 2005)

Time : 3 hours Maximam Marks:100

PART A (10 x 2 = 20 MARKS )

1. What is service Access point?

2. Name two standard data link layer protocols.

3. What is fast Ethernet?

4. Give two drawbacks of ring topology.

5. Compare virtual circuit and datagram services.

6. What is tunneling?

7. What ios use of pseudo header in UDP?

8. How is flow control done in TCP?

9. Name two well-known UDP ports and their services.

10. Different iate between Telnet and rlogin

PART B (5 x 16 = 80 MARKS )

11. (a) (i) Explain the basic communication model with a block diagram. (10)

(ii) Compare Upward and Downward multiplexing. (6)

(OR)

(b) (i) Discuss the various design issues of datalink layer. (6)

(ii) Explain HDLC protocol in detail. (10)

12. (a) (i) Explain CSMA/CA technique used in MAC sublayer. (8)

(ii) Compare OSI and TCP/IP model. (8)

(OR)

(b) Explain the working of IEEE 802.3 standard and its frame format(16)

13. (a) (i) Explain hierarchical Routing with an example. (8)

Page 20: Computer Networks Students Copy

(ii) Discuss about the various approaches used for congestion control in

networks. (8)

(OR)

(b) If an IP datagram of size 1KB has to be send from source 10.10.10.10 to

destination 20.20.20.20. determine the values in various fields of IP header in

hexadecimal. (16)

14. (a) Explain the format of a TCP segment and its connection management

technique. (16)

(OR)

(b) (i) Discuss the various design issues of transport layer.(8)

(ii) Explain the format of a UDP datagram and its features. (8)

15. (a) Write short notes on(16)

(i) FTP.

(ii) SMTP.

(OR)

(b) Explain the RSA algorithm for security implementation with anexample. (16)