Sie sind auf Seite 1von 38

COLLEGE OF TECHNOLOGY

Department of Information Technology

COURSE FILE

BRANCH : Information Technology

SEMESTER :V

SESSION : Jul-Dec 2015

SUBJECT : Computer Networks

SUBJECT CODE : IT-503

Prepared by: HOD IT


INDEX

1. SCHEME

2. SYLLABUS

3. TIME TABLE

4. LECTURE PLAN

5. UNIVERSITY EXAM PAPERS

6. MID SEM TEST PAPERS

7. MID SEM TEST RESULTS

8. UNIT TEST PAPERS

9. UNIT TEST RESULTS

10. ASSIGNMENTS

11. ASSIGNMENTS GRADING SHEET

12. TUTORIALS

13. LECTURE NOTES

14. ATTENDANCE SHEET

15. REFERENCES
Scheme
(i) Syllabus

Category of Course Title Course Credit-6C Theory Paper


Course Code (ES)
Departmental Computer IT 503 L T P Max.Marks-100
Core (IT-503) Networks 3 1 0 Min.Marks-35
Duration-3hrs.

Unit-I
Importance of computer networks, broadcast and point to point networks, Local area networks and Wide area
networks , Introduction to ISO-OSI reference model, TCP/IP reference model , function of each layer, interfaces
and services, Protocol data unit, connection oriented and connectionless services, service primitives, comparison
of TCP/IP and ISO-OSI reference model, Novel Netware, Arpanet , X.25

Unit-II
Data-Link layer: - Data link layer design issues, framing , flow & error control , physical addressing,Stop &
Wait protocol ,Go back N ARQ ,selective repeat ARQ ,piggybacking and pipelining ,HDLC LAN Protocol
stack-Logical link control and Media Access Control sublayer, IEEE 802.2 LLC Frame format Data link
layer in the internet, Serial line IP and Pont to point Protocol

Unit-III`
MAC layer Protocols- , static and dynamic allocation , Pure and slotted ALOHA protocols, Carrier sense
multiple access, Persistent and non persistent CSMA, IEEE standard 802.3 and Ethernet,802.3 cabling,
IEEE 802.4, IEEE 802.5, FDDI Wireless LAN , Comparison of wired and wireless LAN, WIMAX

Unit-IV
The Network layer- logical addressing, classful & classless addressing , address mapping packet delivery &
forwarding. unicast routing protocols , multicast routing protocols, Routing algorithm- Least Cost, Dijkstra's,
Bellman-ford, congestion control algorithms, Internetworking devices, Introduction to Internet protocol IPv4

Unit-V
Transport layer-Transport services , Process to process delivery, UDP ,TCP ,congestion control , quality of
service , Integrated services, Differentiated services LAN-WAN Design and implementation-Configuring TCP/IP,
using Ipconfig, ping command , study of structured LAN , study of internetworking devices and their
configuration– switches, hubs, Bridges, routers and Gateways

References:-

1. “Local area networks ”, Forouzan, TMH, 1st edition

2. “Computer Networks” - Tanenbaum ,PHI Learning.

3. Computer Networks: Protocols, Standards and Interfaces By Black, PHI learning

4. “Computer Communications & Networking Technologies”-Michael A. Gallo & William M. Hancock –

Cengage pearsen publications


(ii) Time Table
COLLEGE OF TECHNOLOGY  Format
No
TIME TABLE
  PERIOD WISE DETAILS ISSUE NO
W.E.F. YEAR 2015-16
Faculty Name: Branch/Sem: IT V
Department: Information Technology
SEM (B)
10:00AM 10:50AM 11:40AM 12:30PM 01:20PM 02:00PM 02:50PM 03:40PM
Day to 10:50AM to 11:40AM to 12:30PM to 01:20PM to to 02:50PM to 03:40PM to 04:30PM
I II III IV 02:00PM V VI VII
Monday
L
Tuesday
Wednesd U
ay
Thursday N
Friday
C
Saturday SS/GD/SEMINAR H

Ms. Kavita Rawat (KR)

APPROVED BY :
(HOD)

APPROVED BY :
(PRINCIPAL)
(ii)Lecture Plan with references

Lectu Date of Remarks


Topic to be covered Completion
re no.
Introduction: Components, data representation, data R1;2,22
1. flow, Serial and parallel Transmission, Modes of R2;104,103,1
data transmission 08,112
2. Encoding: unipolar, Bipolar, polar R2;89,110
Block codes, Data compression, R2 97
3.
Frequency dependent codes R1;21-25
Run length encoding, Relative encoding
4. R1 31

5. Analog and digital Transmission methods R1 102,159


6. Nyquist Theorem R3 89
Multiplexing TDM,WDM ,FDM, Synchronous and
7. R2 149
statistical TDM
FDM, Synchronous and statistical TDM R2 157-
8.
,Multiplexing Hierarchy 165,R1 77-82
R2 363,364,
9. Spread spectrum :FH, DSSS
R2 364,365
Unit Test – I (25% of Syllabus)

10. Terminal handling and Polling R1 282-289

11. Switching: Circuit, Message R3 147,150

12. Packet Switching R3 150

13. X.25 R3 61-73

14. ISDN R1 93-95


15. Interfacing Standards: 232 ,449 R3 :73
16. Interfacing Standards: 232 ,449 R3 :73
17. Null Modem R376
18. BNC Connectors, connecters, RJ 11,45 R3 272-291

19. BNC Connectors, connecters, RJ 11,45 R3 272-291

20. X.21 R1 237


R2 128-
21. Modems: Types feature. Constellation Diagram.
130,221,223
Mid Semester (50% of Syllabus)

22. Limited Distance, Dial up , Baseband R2 128

23. V series Modems R2 130


R2
24. Active and passive hubs, Repeaters, Bridges
389,387,390
25. Bridges continued, Switches, gateway R2 390-395

26. Topologies R1 324

27. Queing theory, Types of queues, R1 589

28. Queing theory, Types of queues, R1 589

29. Parameters :Trafiic intensity .length of queue etc R1 589


Transmission media: Transmission line
30. R2 173
characteristics, distortion
Transmission media: Transmission line
31. R2 173
characteristics, distortion
32. Crosstalk R2 71,173

33. Twisted Pair, Baseband and broadband coaxial R2 174-192

34. Twisted Pair, Baseband and broadband coaxial R2 174-192

35. Twisted Pair, Baseband and broadband coaxial R2 174-192

36. Velocity and propagation of light R4 36


Unit Test – II (75% of Syllabus)
37. Unguided media, electromagnetic polarization R4 40

38. Terrestrial propagation of EM waves R4 66

39. Free space path losses R4124-130

40. ADSL,HDSL,VDSL R3175-180


R2 267,268,
41. Error control and detection, BER, Parity checking
R3 196
R3 538, R2
42. Checksum, CRC, Hamming, Interleaved codes
257-266
R2 97
43. Block parity, convolution codes
44. Comparison ,losses, light sources and detectors R4 87-102

45. PUT (100% of Syllabus)

Reference Books:

R1: Data Communications and Networking by Behrouz A Farouzan (R1)


R2: Data and Computer Communication by William Stallings (R2)
R3: Computer Networks by Andrew S Tanenbaum (R3)
R4: Data Communications, Computer Networks and Open Systems by Fred
Halsall (R4)
R5: Sedha (R5)
COLLEGE OF TECHNOLOGY

Department of Information Technology

MID-SEMESTER EXAM-I
Subject: Data communication
Subject Code: IT-503
MAX-MARKS: 20 MAX-TIMES: 2Hrs
Remarks: (a) All questions carry equal marks.
(b) Attempt any five questions

Unit - I
1. a) Define digital signal.
b) Define the term frequency and period of a signal. 2
c) Define line coding. What are its characteristics? 3
d) Draw components of data communication system and state

function of each component. 7

Or

What are modes of data transmission? Explain with

examples. 7

Unit - II
2. a)
What are the advantages of TDM over FDM?
b)
c)
Define synchronous TDM.
What is direct sequence spread spectrum? 3
d) What is the difference between message switching and

packet switching? 7
[2]

Or
What is ISDN? Explain in details with neat diagram. 7

Unit - III
3 . a) Define:
i) RJ-45 ii) RJ-11 2
b) What is the key advantage of BNC connector? 2
c) List out the difference between active hubs and passive
hubs. 3
d) What are types of bridge? Explain with example. 7
Or
What is Null Model? Explain in detail with diagram. 7

Unit - IV
4 . a) Define:
i) Guided media
ii) Unguided media 2
b) Define ADSL. 2
c) What are the characteristics of Base-band signal? 3
d) What is electromagnetic signal? Explain its advantages.
7
Or
What are the advantages of fibre optic cable over
coaxial
cable? 7

5. a) Unit - V
b) How do you identify errors in the signal? 2
c) List out the methods available for error detection. 2
d) Define flow integrity error. 3
What is CRC? Explain CRC with example. 7
Or
What is interleaved codes? Explain interleaved codes
with
1 example. 7
COLLEGE OF TECHNOLOGY

Department of Information Technology

MID-SEMESTER EXAM-I
Subject: Computer Networks
Subject Code: IT-503
MAX-MARKS: 20 MAX-TIMES: 2Hrs
Remarks: (a) All questions carry equal marks.
(b) Attempt any five questions

Ques. Marks

1. a) Compare ISO/OSI protocol suite with TCP/IP model. 4


b) Explain Connection Oriented and Connection less services.
2. a) What is Computer Networks? Write its Classification and 4
applications.
b) There are two ways to send a file of 12 MB to a long distance-
(i) through a bike carrying floppy box and running at 50km/hr.
(ii) through a telephone line whose channel capacity is 56 kbps.
Upto what distance bike is better option.

3. a) Explain LLC and its services. 4


b) Define HDLC and its frame format.
4. a) Define sliding window ARQ. 4
b) A channel has a bit rate of 4kbps and a propagation delay of 20 ms.
For what range of frame does stop and wait protocol give an
efficiency of at least 50% ?

5. Define the following terms- 4


i) ARPANET ii) X.25 iii) PPP (any two)
COLLEGE OF TECHNOLOGY

Department of Information Technology

MID-SEMESTER EXAM-II
Subject: Computer Networks
Subject Code: IT-503
MAX-MARKS: 20 MAX-TIMES: 2Hrs
Remarks: (a) All questions carry equal marks.
(b) Attempt any five questions

Ques. Marks

1. a) Differentiate and compare Wired LAN, Wireless LAN and WiMax. 2


b) Mention the three auxiliary protocols at the network layer of the
TCP/IP suite that are designed to help the IPv4 Protocol. 2
2. a) Determine if these devices are on the same subnet or different subnets- 2
DeviceA: 172.16.17.30/20
DeviceB: 172.16.28.15/20
b) Draw and explain the IPv4 Header format.. 2
3. a) What is distance vector routing? Also write algorithm for the distance 2
vector routing
b) What are the techniques used for congestion control? 2

4. a) Explain the 3-way handshake technique related to TCP protocol. 2


b) Draw and explain the UDP pseudo header. 2

5. Short notes (any four) 4


i) IPv6
ii) Compare, Bridge, switch, hub and router
iii) Dijkastra Algorithm
iv) Differentiated Services
v) Classless Addressing
COLLEGE OF TECHNOLOGY

Department of Information Technology

UNIT TEST - I
Subject: Computer Networks
Subject Code: IT-503
MAX-MARKS: 20 MAX-TIMES: 1Hrs
Remarks: (a) All questions carry equal marks.
Q. 1. (a) What do you mean by broadcast networks? Discuss the need or lack of need for a Network layer
in a broadcast network.
(b) What are the some factor that determines whether a communication system is a LAN, MAN or
WAN? Explain each of them in detail
Q. 2. (a) Explain the well labeled ISO-OSI reference model. Give the function of each layer.
(b) Differentiate between connectionless and connection oriented services.
COLLEGE OF TECHNOLOGY

Department of Information Technology

UNIT TEST - II
Subject: Computer Networks
Subject Code: IT-503
MAX-MARKS: 20 MAX-TIMES: 1Hrs
Remarks: (a) All questions carry equal marks.

1. (a) Explain TCP/IP protocol suite in detail.


(b) Define piggybacking and pipelining.
2. (a) Draw the frame format of HDLC protocol. Explain the technique of bit stuffing for data
transparency. Explain the use of control, data checksum and address fields of HDLC protocol.
(b) Briefly explain IEEE 802.2 in detail

COLLEGE OF TECHNOLOGY

Department of Information Technology

UNIT TEST - III


Subject: Computer Networks
Subject Code: IT-503
MAX-MARKS: 20 MAX-TIMES: 1Hrs
Remarks: (a) All questions carry equal marks.

Q. 1. (a) Differentiate between pure and slotted ALOHA. How the throughput of slotted ALOHA is
better than pure ALOHA?
(b) What is static and dynamic channel allocation?
Q. 2. (a) Give the frame format of IEEE 802.5. Explain various fields used in it.
(b) Compare wired and wireless LAN. What is WIMAX?
COLLEGE OF TECHNOLOGY

Department of Information Technology

UNIT TEST - IV
Subject: Computer Networks
Subject Code: IT-503
MAX-MARKS: 20 MAX-TIMES: 1Hrs
Remarks: (a) All questions carry equal marks.

Q. 1. (a) Compare unicast, broadcast and multicast.


(b) Explain the frame format of IPv4.
Q. 2. (a) Explain address mapping. What protocols are used for address mapping?
OR
For the given data IP address is 172.16.0.0 Subnet mask is 255.255.248.0. Find the:
a. No. of subnets
b. No. of hosts
c. Subnet IP
d. Range of IP address

(b) What is Optimality? Why it is used in routing? Explain shortest path routing algorithm.

COLLEGE OF TECHNOLOGY

Department of Information Technology

UNIT TEST - V
Subject: Computer Networks
Subject Code: IT-503
MAX-MARKS: 20 MAX-TIMES: 1Hrs
Remarks: (a) All questions carry equal marks.

Q. 1. (a) Differentiate between TCP and UDP.Explain Three-way handshaking.


(b) Explain BLUETOOTH. Write their architecture
Q. 2. Write Shorts notes on-
a. VoIP
b. FTP
c. Cryptography
d. SMTP
COLLEGE OF TECHNOLOGY
Department of Information Technology

ASSIGNMENT-I
Subject: Computer Networks
Subject Code: IT-503

1. Explain types of cable used in Different topologies in context of computer Network.


2. Explain and discusses the functional and architectural model of CAT-3 and 5 cable.
3. List all the options of ping command

COLLEGE OF TECHNOLOGY
Department of Information Technology

ASSIGNMENT-II
Subject: Computer Networks
Subject Code: IT-503
1. What is the significance of the ARP and RARP protocol?
2. Do the case study of IEEE 802.3 Ethernet with practical utility.

COLLEGE OF TECHNOLOGY
Department of Information Technology

ASSIGNMENT-III
Subject: Computer Networks
Subject Code: IT-503
1. List the name of the modern protocol which used CSMA scheme for sharing the
channel
2. List all the options of arp command
3. How WIFI channel sharing is accomplish among the network users? Explain with
architectural model.
COLLEGE OF TECHNOLOGY
Department of Information Technology

ASSIGNMENT-IV
Subject: Computer Networks
Subject Code: IT-503

1. What is difference between IPV4 and IPv6? Used IPV6 address in your home
computers and list address assigned to your computer.
2. How to trace the route? Also explain all the options of the command
3. What do you mean by static IP and dynamic IP address? Explain with picture tutorial
for the both scheme to set the IP address in a computer.
4. How to connect access moodle server and telnet with the help smart phone? Tells the
application available in android phone for the same.

COLLEGE OF TECHNOLOGY
Department of Information Technology

ASSIGNMENT-IV
Subject: Computer Networks
Subject Code: IT-503

1. Setup your own FTP server (windows or linux)?


2. Write a java program related to the socket programming using UDP prorocol?
COLLEGE OF TECHNOLOGY
Department of Information Technology
ASSIGNMENT GRADING SHEET
Subject: Computer Networks Subject Code: IT503
Semester: V Session: Jul-Dec2015
Name of Incharge:

A-1 A-2 A-3 A-4 A-5 RE


S.No. Roll No. Name of Candidate MA
RK
1  
2  
3  
4  
5  
6  
7  
8  
9  
10  
11  
12  
13  
14  
15  
16  
17  
18  
19  
20  
21  
22  
23  
24  
25  
26  
27  
28  
29  
30  
31  
32  
33  
34  
35  
36  
37  
38  
39  
40  
41  
42  
43  
44  
45  
46  
47  
48  
49  
50  
51  
52  
53  
54  
55  
56  
57  
58  
59  
60  
61  
62  
63  
64  
65  
66  

COLLEGE OF TECHNOLOGY
Department of Information Technology

TUTORIAL-I
Subject: Computer Networks
Subject Code: IT-503

1. Explain the types of topology used in computer network with their pros and cons.
2. What topology has been used in IT Lab. Explain in brief?
3. List all types of networks used in India with brief details

COLLEGE OF TECHNOLOGY
Department of Information Technology

TUTORIAL-II
Subject: Computer Networks
Subject Code: IT-503

1. What is NIC?
2. What is ICT Tool?
3. What is the hardware address of your computer? How did you get this?

COLLEGE OF TECHNOLOGY
Department of Information Technology

TUTORIAL-III
Subject: Computer Networks
Subject Code: IT-503

1. How does 802.11 implement virtual carrier sense?

2. What is the difference between congestion control and flow control?

3. Ping is belongs to which protocol?

4. What do you mean by ARP poisoning?

5. Why does distance-vector routing scale better than link-state routing? Be specific.
COLLEGE OF TECHNOLOGY
Department of Information Technology

TUTORIAL-IV
Subject: Computer Networks
Subject Code: IT-503

1. What is strict source routing?


2. How IP has been multiplex with Data link layer? Also explain the identification bit name to check the
IP datagram
3. What web server OCT moodle has been used? Explain the working of web server related to the port
communication.
4. Consider the network of five routers below, with edge weights labeled.

Show the step-by-step operation of Dijkstra’s algorithm for R3 using the table below.
COLLEGE OF TECHNOLOGY
Department of Information Technology

TUTORIAL-V
Subject: Computer Networks
Subject Code: IT-503

1. What is 4G/LTE network?


2. What is the meaning of ephermal ports ?
3. Consider a token bucket with maximum rate R = 20 Mbps. Suppose we want to make sure the maximum
rate can only be sent for at most 5 seconds at a time, and at most 150 Mb can be sent over any 10-second
window. Compute the required values for the token refresh rate, r, and the bucket depth, b.
Lecture Notes
BLOW-UP

UNIT – 1
Computer Network: A computer network, often simply referred to as a network, is a collection of computers
and devices interconnected by communications channels that facilitate communications among users and allows
users to share resources. Networks may be classified according to a wide variety of characteristics. A computer
network allows sharing of resources and information among interconnected devices.
Classification:
Local area network-A local area network (LAN) is a network that connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building, or closely positioned group of
buildings. Each computer or device on the network is a node.
Metropolitan area network-A Metropolitan area network is a large computer network that usually spans a city
or a large campus.
Wide area network-A wide area network (WAN) is a computer network that covers a large geographic area
such as a city, country, or spans even intercontinental distances, using a communications channel that combines
many types of media such as telephone lines, cables, and air waves.

Goals: Three main goals of Computer Networks are resource sharing, cost reduction and fast communication
medium.

Applications: Various applications of computer networks are electronic messaging, cellular telephone,
teleconferencing, manufacturing etc.

Broadcast and point to point networks: This type of network has a single communication channel that is
shared by all the machines on the network. Short messages, called packets in certain contexts, sent by any
machine are received by all the others. An address field within the packet specifies for whom it is intended.
Upon receiving a packet, a machine checks the address field. If the packet is intended for itself, it processes the
packet; if is intended for some other machine, it is just ignored.

ISO – OSI Model: The Open Systems Interconnection model (OSI model) is a product of the Open Systems
Interconnection effort at the International Organization for Standardization. It is a way of sub-dividing a
communications system into smaller parts called layers. A layer is a collection of conceptually similar functions
that provide services to the layer above it and receives services from the layer below it.

TCP/IP Protocol Suite: The Internet Protocol Suite is the set of communications protocols used for the Internet
and other similar networks. It is commonly also known as TCP/IP, named from two of the most important
protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two
networking protocols defined in this standard. Five layers of OSI Model are application, transport, network,
datalink and physical layer. Each layer used different protocols.

Interface & services: An interface specifies a set of attributes and methods that together define one single
aspect of an object. For instance, the interface to allow for reuse of such interface specifications, an interface
can inherit one or more other interfaces. The term “service” has been used with an unclear meaning in UNO.
Starting with OpenOffice.org 2.0, the underlying concepts have been made cleaner.
Protocol data unit: In telecommunications, the term protocol data unit (PDU) has the following meanings:

1. Information that is delivered as a unit among peer entities of a network and that may contain control
information, address information, or data.
2. In a layered system, a unit of data which is specified in a protocol of a given layer and which consists of
protocol-control information and possibly user data of that layer. For example: Bridge PDU or iSCSI
PDU

Connection oriented and connectionless communication: Connection-oriented communication is a data


communication mode in which the devices at the end points use a protocol to establish an end-to-end logical or
physical connection before any data may be sent byte stream. Connection-oriented protocol services are often
but not always reliable network services, that provide acknowledgment after successful delivery, and automatic
repeat request functions in case of missing data or detected bit-errors.

Service primitives: PRIMITIVES means operations. A service in a computer network consists of a set of
primitives. The primitives are to be used by the user to access the service. The primitives asks the service to do
some action or to report on an action. The primitives are system calls.

Novell NetWare: NetWare is a network operating system developed by Novell, Inc. It initially used
cooperative multitasking to run various services on a personal computer, with network protocols based on the
archetypal Xerox Network Systems stack.

Arpanet: The Advanced Research Projects Agency Network (ARPANET), was the world's first operational
packet switching network and the core network of a set that came to compose the global Internet. The network
was funded by the Defense Advanced Research Projects Agency (DARPA) of the United States Department of
Defense for use by its projects at universities and research laboratories in the US.

X.25: X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication.
An X.25 WAN consists of packet-switching exchange (PSE) nodes as the networking hardware, and leased
lines, Plain old telephone service connections or ISDN connections as physical links. X.25 is a family of
protocols that was popular during the 1980s with telecommunications companies and in financial transaction
systems such as automated teller machines.
UNIT – 2
Data Link Layer: The Data Link Layer is Layer 2 of the seven-layer OSI model of computer networking. It
corresponds to, or is part of the link layer of the TCP/IP reference model. The Data Link Layer is the protocol
layer which transfers data between adjacent network nodes in a wide area network or between nodes on the
same local area network segment. The Data Link Layer provides the functional and procedural means to
transfer data between network entities and might provide the means to detect and possibly correct errors that
may occur in the Physical Layer.

Data Link Control: Three methods of data link layer i.e. line discipline; flow control and error control are
collectively known as data link control. Two mechanism are used to achieve line discipline are ENQ/ACK and
POLL/SEL. Two mechanism are used to achieve flow control are Stop and Wait and Sliding Window. Two
mechanism are used to achieve error control are Stop and Wait ARQ and Sliding Window ARQ, sliding
window ARQ are further divided into two methods i.e. Go-back-N and Selective Repeat.

Data Link Protocols:

HDLC-High-Level Data Link Control (HDLC) is a bit-oriented synchronous data link layer protocol developed
by the International Organization for Standardization (ISO). HDLC provides both connection-oriented and
connectionless service. HDLC can be used for point to multipoint connections, but is now used almost
exclusively to connect one device to another, using what is known as Asynchronous Balanced Mode (ABM).

BISYNC-Binary Synchronous Communication (BSC or Bisync) is an IBM link protocol, announced in 1967
after the introduction of System/360. It replaced the synchronous-transmit-receive (STR) protocol used with
second generation computers. The intent was that common link management rules could be used with three
different alphabets for encoding messages

Selective repeat ARQ: It may be used as a protocol for the delivery and acknowledgement of message units, or
it may be used as a protocol for the delivery of subdivided message sub-units. When used as the protocol for the
delivery of messages, the sending process continues to send a number of frames specified by a window size
even after a frame loss.

Go-back N ARQ: Go-Back-N ARQ is a specific instance of the automatic repeat request (ARQ) protocol, in
which the sending process continues to send a number of frames specified by a window size even without
receiving an acknowledgement (ACK) packet from the receiver. It is a special case of the general sliding
window protocol with the transmit window size of N and receive window size of 1.

Stop & Wait protocol: Stop-and-wait ARQ is a method used in telecommunications to send information
between two connected devices. It ensures that information is not lost due to dropped packets and that packets
are received in the correct order. It is the simplest kind of automatic repeat-request (ARQ) method. A stop-and-
wait ARQ sender sends one frame at a time.

Piggybacking and Pipelining: Piggybacking is a bi-directional data transmission technique in the data link
layer (OSI model). It makes the most of the sent data frames from receiver to emitter, adding the confirmation
that the data frame sent by the sender was received successfully (ACK acknowledge). This practically means,
that instead of sending an acknowledgement in an individual frame it is piggy-backed on the data frame.

Logical link Control:The Logical Link Control (LLC) data communication protocol layer is the upper sub-
layer of the Data Link Layer (which is itself layer 2, just above the Physical Layer) in the seven-layer OSI
reference model. It provides multiplexing mechanisms that make it possible for several network protocols (IP,
IPX) to coexist within a multipoint network and to be transported over the same network media

Media Access Control (MAC Sublayer): The Media Access Control (MAC) data communication protocol
sub-layer, also known as the Medium Access Control, is a sublayer of the Data Link Layer specified in the
seven-layer OSI model (layer 2). It provides addressing and channel access control mechanisms that make it
possible for several terminals or network nodes to communicate within a multi-point network, typically a local
area network (LAN) or metropolitan area network.

IEEE 802 Standards:

Ethernet (802.3)-Ethernet is a family of frame-based computer networking technologies for local area networks
(LANs). The name came from the physical concept of the ether. It defines a number of wiring and signaling
standards for the Physical Layer of the OSI networking model as well as a common addressing format and
Media Access Control at the Data Link Layer. Ethernet is standardized as IEEE 802.3.

Token Bus (802.4)-Token bus is a network implementing the token ring protocol over a "virtual ring" on a
coaxial cable. A token is passed around the network nodes and only the node possessing the token may transmit.
If a node doesn't have anything to send, the token is passed on to the next node on the virtual ring.

Token Ring (802.5)-Token ring local area network (LAN) technology is a local area network protocol which
resides at the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that
travels around the ring. Token-possession grants the possessor permission to transmit on the medium. Token
ring frames travel completely around the loop.

Distributed Queue Dual Bus (802.6)-In telecommunication, a distributed-queue dual-bus network (DQDB) is
a distributed multi-access network that supports integrated communications using a dual bus and distributed
queuing, provides access to local or metropolitan area networks and supports connectionless data transfer,
connection-oriented data transfer, and isochronous communications, such as voice communications. DQDB was
standardized by IEEE standard 802.6.

Serial line IP : The Serial Line Internet Protocol (SLIP) is an encapsulation of the Internet Protocol designed to
work over serial ports and modem connections. It is documented in RFC 1055. On personal computers, SLIP
has been largely replaced by the Point-to-Point Protocol (PPP), which is better engineered, has more features
and does not require its IP address configuration to be set before it is established.

Pont to point protocol: In networking, the Point-to-Point Protocol, or PPP, is a data link protocol commonly
used in establishing a direct connection between two networking nodes. It can provide connection
authentication, transmission encryption privacy, and compression.PPP is used over many types of physical
networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic
links such as SONET.
UNIT – 3

Contention and Contention free protocol:

Aloha-ALOHA net, also known as the ALOHA System, or simply ALOHA, was a pioneering computer
networking system developed at the University of Hawaii ALOHA net became operational in June, 1971,
providing the first demonstration of a wireless data network. One of the early computer networking designs,
development of the ALOHA network was begun in 1968 at the University of Hawaii under the leadership of
Norman Abramson and others (including F. Kuo, N. Gaarder and N. Weldon).

Non Adaptive and Adaptive Routing (Static and Dynamic):For (static routing) or Non-Adaptive routing
there is no algorithm, and is manually engineered. The advantage of this routing type is maximum computing
resources are saved but are conditioned. Networks have to be prepared for disaster, by additional planning. For
larger networks, static routing is avoided. For (Dynamic routing) or Adaptive routing, protocols are used to
maintain routing tables. Protocols are Routing Information Protocol (RIP), Open Shortest Path First (OSPF).

Carrier Sense Multiple Access (CSMA)-Carrier Sense Multiple Access (CSMA) is a probabilistic Media
Access Control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a
shared transmission medium, such as an electrical bus, or a band of the electromagnetic spectrum. "Carrier
Sense" describes the fact that a transmitter uses feedback from a receiver that detects a carrier wave before
trying to send.

Carrier Sense Multiple Access with collision detection (CSMA/CD)-Carrier sense multiple access with
collision detection (CSMA/CD) is a computer networking access method in which a carrier sensing scheme is
used, a transmitting data station that detects another signal while transmitting a frame, stops transmitting that
frame, transmits a jam signal, and then waits for a random time interval before trying to send that frame again.

Carrier Sense Multiple Access with collision avoidance (CSMA/CA)-Carrier sense multiple access with
collision avoidance (CSMA/CA), in computer networking, is a wireless network multiple access method in
which a carrier sensing scheme is used, a node wishing to transmit data has to first listen to the channel for a
predetermined amount of time to determine whether or not another node is transmitting on the channel within
the wireless range..

IEEE 802 Standards:

Ethernet (802.3)-Ethernet is a family of frame-based computer networking technologies for local area networks
(LANs). The name came from the physical concept of the ether. It defines a number of wiring and signaling
standards for the Physical Layer of the OSI networking model as well as a common addressing format and
Media Access Control at the Data Link Layer. Ethernet is standardized as IEEE 802.3.

Token Bus (802.4)-Token bus is a network implementing the token ring protocol over a "virtual ring" on a
coaxial cable. A token is passed around the network nodes and only the node possessing the token may transmit.
If a node doesn't have anything to send, the token is passed on to the next node on the virtual ring.

Token Ring (802.5)-Token ring local area network (LAN) technology is a local area network protocol which
resides at the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that
travels around the ring. Token-possession grants the possessor permission to transmit on the medium. Token
ring frames travel completely around the loop.

Distributed Queue Dual Bus (802.6)-In telecommunication, a distributed-queue dual-bus network (DQDB) is
a distributed multi-access network that supports integrated communications using a dual bus and distributed
queuing, provides access to local or metropolitan area networks and supports connectionless data transfer,
connection-oriented data transfer, and isochronous communications.

Fiber Distributed data Interface (FDDI):Fiber Distributed Data Interface (FDDI) provides a 100 Mbit/s
optical standard for data transmission in a local area network that can extend in range up to 200 kilometers (124
miles). Although FDDI logical topology is a ring-based token network, it does not use the IEEE 802.5 token
ring protocol as its basis; instead, its protocol is derived from the IEEE 802.4 token bus timed token protocol.

Wireless LANs:A wireless local area network (WLAN) links two or more devices using some wireless
distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an
access point to the wider internet. This gives users the mobility to move around within a local coverage area and
still be connected to the network.

Bluetooth:Bluetooth is a proprietary open wireless technology standard for exchanging data over short
distances (using short wavelength radio transmissions) from fixed and mobile devices, creating personal area
networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994, it was originally
conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems
of synchronization. Today Bluetooth is managed by the Bluetooth Special Interest.

WIMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a telecommunications protocol that
provides fixed and mobile Internet access. The current WiMAX revision provides up to 40 Mbit/s[1][2] with the
IEEE 802.16m update expected to offer up to 1 Gbit/s fixed speeds. The name "WiMAX" was created by the
WiMAX Forum, which was formed in June 2001 to promote conformity and interoperability of the standard.
UNIT – 4

Network Layer:The Network Layer is Layer 3 of the seven-layer OSI model of computer networking. The
Network Layer is responsible for routing packets delivery including routing through intermediate routers,
whereas the Data Link Layer is responsible for Media Access Control, Flow Control and Error Checking. The
Network Layer provides the functional and procedural means of transferring variable length data sequences
from a destination host.

Logical addressing: In computing, a logical address is the address at which an item (memory cell, storage
element, network host) appears to reside from the perspective of an executing application program.A logical
address may be different from the physical address due to the operation of an address translator or mapping
function. Such mapping functions may be, in the case of a computer memory architecture

Classful & classless addressing: In the classful addressing system all the IP addresses that are available are
divided into the five classes A,B,C,D and E, in which class A,B and C address are frequently used because class
D is for Multicast and is rarely used and class E is reserved and is not currently used. Each of the IP address
belongs to a particular class that's why they are classful addresses. Classless addressing system is also known as
CIDR(Classless Inter-Domain Routing).Classless addressing is a way to allocate and specify the Internet
addresses used in inter-domain routing more flexibly than with the original system of Internet Protocol (IP)
address classes.

Address mapping: A related choice is the granularity of address mapping, which is defined as the smallest unit
of addressed data (from the persistent store) that can be mapped independently to an area of the virtual address
space.

Packet delivery & forwarding: The successful delivery of a packet over a NetWare network depends on the
proper addressing of the packet. To send a packet, the sender must know the full IPX address (network, node,
and socket) of the recipient.. Once the sender has the recipient's address, it can address the packet. The way the
MAC header of that packet is addressed, however, depends on the network's topography.

Unicast routing protocols: Unicast routing is the forwarding of traffic destined to a single location on an
internetwork from a source host to a destination host by using routers. An internetwork is at least two networks
that are connected by routers. A router is a network layer intermediate system that is used to connect networks
together based on a common network layer protocol TCP/IP

Multicast routing protocols: Multicast routing protocols enable a collection of multicast routers to build (join)
distribution trees when a host on a directly attached subnet, typically a LAN, wants to receive traffic from a
certain multicast group.

Routing:Routing or routing is the process of selecting paths in a network along which to send network traffic.
Routing is performed for many kinds of networks, including the telephone network (Circuit switching) ,
electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily
with routing in electronic data networks using packet switching technology.

Routing Algorithms:
Distance Vector Routing-Distance vector routing use the Bellman-Ford algorithm. This approach assigns a
number, the cost, to each of the links between each node in the network. Nodes will send information from
point A to point B via the path that results in the lowest total cost (i.e. the sum of the costs of the links between
the nodes used). The algorithm operates in a very simple manner.

Link-state Routing-When applying link-state routing, each node uses as its fundamental data a map of the
network in the form of a graph. To produce this, each node floods the entire network with information about
what other nodes it can connect to, and each node then independently assembles this information into a map.
Using this map, each router then independently determines the least-cost path from itself to every other node
using a standard shortest paths algorithm such as Dijkstra's algorithm.

Path vector Routing-A path vector routing is a computer network routing protocol which maintains the path
information that gets updated dynamically. Updates which have looped through the network and returned to the
same node are easily detected and discarded. This algorithm is sometimes used in Bellman–Ford routing
algorithms to avoid "Count to Infinity" problems. It is different from the distance vector routing and link state
routing. Each entry in the routing table contains the destination network, the next router and the path to reach
the destination.

Network Congestion:

In data networking, network congestion occurs when a link or node is carrying so much data that its quality of
service deteriorates. Typical effects include queueing delay, packet loss or the blocking of new connections. A
consequence of these latter two is that incremental increases in offered load lead either only to small increases
in network throughput, or to an actual reduction in network throughput.

Internetworking devices: Internetworking devices which include Repeaters, Hubs, Routers, Switches, and
Bridges. We started by defining each device followed by the various types and lastly how they work. Links
were also provided for more information about each device.

Internet Protocol (IP):The Internet Protocol (IP) is the principal communications protocol used for relaying
datagram (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets
across network boundaries, it is the primary protocol that establishes the Internet. IP was the connectionless
datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974,
the other being the connection-oriented Transmission Control Protocol (TCP).

IP addresses:An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP
address serves two principal functions: host or network interface identification and location addressing. The
designers of the Internet Protocol defined an IP address as a 32-bit number and this system, known as Internet
Protocol Version 4 (IPv4).
UNIT – 5

Transport Layer:In computer networking, the Transport Layer provides end-to-end communication services
for applications within a layered architecture of network components and protocols. The transport layer
provides convenient services such as connection-oriented data stream support, reliability, flow control, and
multiplexing.

Transport services- There are many services that can be optionally provided by a Transport Layer protocol,
and different protocols may or may not implement them. There are following protocols given below:

1. Byte orientation
2. Reliability
3. Flow control

Process-to Process Delivery - The transport layer is responsible for process-to process delivery. The delivery
of a packet, part of a message, from one process to another. Two processes communicate in a client/server
relationship.

Transmission Control Protocol (TCP):The Transmission Control Protocol (TCP) is one of the core protocols
of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the
Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides the
service of exchanging data directly between two hosts on the same network, whereas IP handles addressing and
routing message across one or more networks

User Datagram Protocol (UDP):The User Datagram Protocol (UDP) is one of the core members of the
Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can
send messages, in this case referred to as datagram, to other hosts on an Interne Protocol (IP) network without
requiring prior communications to set up special transmission channels or data paths.

Congestion control: Congestion control concerns controlling traffic entry into a telecommunications network,
so as to avoid congestive collapse by attempting to avoid oversubscription of any of the processing or link
capabilities of the intermediate nodes and networks and taking resource reducing steps, such as reducing the
rate of sending packets. It should not be confused with flow control, which prevents the sender from
overwhelming the receiver.

Quality of Service (QoS) - In the field of computer networking and other packet-switched telecommunication
networks, the traffic engineering term quality of service (QoS) refers to resource reservation control
mechanisms rather than the achieved service quality. Quality of service is the ability to provide different
priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data
flow.

Integrated services- In computer networking, IntServ or integrated services are an architecture that specifies
the elements to guarantee quality of service (QoS) on networks. Integrated service can for example be used to
allow video and sound to reach the receiver without interruption. IntServ specifies a fine-grained QoS system,
which is often contrasted with DiffServ coarse-grained control system.
Differentiated Services- Differentiated Services or DiffServ is a computer networking architecture that
specifies a simple, scalable and coarse-grained mechanism for classifying, managing network traffic and
providing Quality of Service (QoS) on modern IP networks. DiffServ can, for example, be used to provide low-
latency to critical network traffic such as voice or streaming media.

Configuring TCP/IP - Transmission Control Protocol (TCP) and Internet Protocol (IP) are two distinct
network protocols, technically speaking. TCP and IP are so commonly used together; however, that TCP/IP has
become standard terminology to refer to either or both of the protocols. IP corresponds to the Network layer
(Layer 3) in the OSI model, whereas TCP corresponds to the Transport layer (Layer 4) in OSI.

Using Ipconfig- It may be necessary to utilize utilities such as ping, winipcfg, tracert, etc to help identify and
fix network related issues.

Ping command- The Internet Ping command bounces a small packet off a domain or IP address to test network
communications, and then tells how long the packet took to make the round trip. The Ping command is one of
the most commonly used utilities on the Internet by both people and automated programs for conducting the
most basic network test: can your computer reach another computer on the network, and if so how long does it
take?

Structured LAN- The topology as a network's virtual shape or structure, this shape does not necessarily
correspond to the actual physical layout of the devices on the network. For example, the computers on a home
LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there.
Network topologies are categorized into the following basic types:
 bus
 ring
 star
 tree
 mesh

Network Switch- A network switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a multi-port network bridge that processes and routes data at the data
link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (Layer 3) and
above are often referred to as Layer 3 switches or multilayer switches.

Hub- In computer networking, a hub is a small, simple, inexpensive device that joins multiple computers
together. Many network hubs available today support the Ethernet standard. Other types including USB hubs
also exist, but Ethernet is the type traditionally used in home networking.

Bridge-A bridge device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a
LAN by dividing it into two segments. Bridges operate at the data link layer (Layer 2) of the OSI model.
Bridges inspect incoming traffic and decide whether to forward or discard it. An Ethernet bridge, for example,
inspects each incoming Ethernet frame - including the source and destination MAC addresses, and sometimes
the frame size - in making individual forwarding decisions.

Router- A router is a device that forwards data packets between telecommunications networks, creating an
overlay internetwork. A router is connected to two or more data lines from different networks. When data
comes in on one of the lines, the router reads the address information in the packet to determine its ultimate
destination. Then, using information in its routing table or routing policy, it directs the packet to the next
network on its journey or drops the packet. A data packet is typically forwarded from one router to another
through networks that constitute the internetwork until it gets to its destination node

Gateway- A network gateway is an internetworking system capable of joining together two networks that use
different base protocols. A network gateway can be implemented completely in software, completely in
hardware, or as a combination of both. Depending on the types of protocols they support, network gateways can
operate at any level of the OSI model.

REFERENCES
List of Books

S. Name of Books Author Publication


No.
1 Local area networks Forouzan TMH, 1st edition

2 TCP/IP Protocol Suite Behrouz Forouzan 3/e, Mchraw Hill

3 Computer Networks Tanenbaum PHI Learning

4 Computer Networks: Black PHI learning


Protocols, Standards and
Interfaces
5 Computer Communications Michael A. Gallo & Cengage pearsen publications
& Networking Technologies William M. Hancock
6 Computer Networks: A Top- Behrouz Forouzan and TMH
Down Approach Firouz Mosharraf

List of Web References

S. No. Web References

1 https://en.wikipedia.org/?title=Computer_network

2 http://www.tutorialspoint.com/computer_fundamentals/computer_networking.htm

3 http://www.slackbook.org/html/basic-network-commands.html

4 http://www.computerhope.com/issues/ch000444.htm

5 http://www.howtogeek.com/168896/10-useful-windows-commands-you-should-
know/

Das könnte Ihnen auch gefallen