Unit 1 basicsCN
Unit 1 basicsCN
TECH SEMESTER VI
Course Code TP Credits
4
Course Title Computer Networks 3I0
Course objective:
basiCs.
Djectine of this course is to develop an understanding of compuler networking
e r e n t componenls of computer networks. various protocols. modern: technologies and their
applications.
Pre-requisites: Basic knowledge of C'onputer system and their intereonncetron. operau
system. Digital logie and design and hands on experienee of programming kngirages.
Course ontents /Syllabus
NIT-I 8 Hours
Introduction
of the nternet. ISP.
0s and
applications of networks. Categories ol networks, Organizaiion
modei. TCPIP prolocol suile. Network devices and componcy1s. Mode o
ne Osl reference
communications
hysical Layer: Nctmork topology design. Types of connections. I.AN. MAN and MA
Network perlormance and
TansimiSston mediay Signal transmission and encoding.
transmission impaiments. Swiching teehniques and multiplexing. I1:Eslaidards.
8 Hours
UNIT-II Data Link layer
(:lementary
control Data Link Protocols.
Taming. r o r Detection and Correction. Tlow Networks: Channel
Medium Access Control and Local Area
Sliding Window protocols).
allocation. Multiple access protocols. LAN standards. I.ink layer switclhes & bridges.
8 Hours
UNIT-I Network Layer
CDR. ARP. RARP.
Point-to-pomt networks. Logical addressing. Basic internetworking (IP.
DHCP. ICMP). IP4. Routing. forwarding
and delivery. Static and dynamic routing. Routing
control algorithms. IP16.
algorithnms and protocols. Congestion
UNIT-IVN Transport Layer 8 Hours
TP). Connection
deliverY. ransjprar nrotocls (DP nd
Process-10-procesS
and retransmisSIOn. Wndow managenme. 1C ongestiv
loW Control
management.
control. Quality ofservice. 8 Hours
UNIT-V Application Layer
Wide \Weh and lHyper iext l
ransler Protocoi. 1lecironie mail.
Domain Name Systlem. World Dala compression. VPN.
Protocol. Renmote login. Neiwork management.
File Transfer
Firewalls.
Cry ptography basic concepts. able to
of this course students will be
Course outeome: Alier completion and
of the fundanental concepts
understanding K.2. K6
Buiid an
too
for Couupute Nehoos k Nefaor k (bveyf d tor setury
LosB Phase c0upwte
Oud hou Secuythy ovidsd m Covubeee Netoorlk
So lod
phusiCal udium
Undin wlecl Calegord
olved Unk CotTies ormaton trom us C0wbute to
(owburet OY Vee Verc
Tw dvires (an CoMuu cakd not wth tko Coble
ey Too Swarlphou WO to ext houge dla y
this thon te no hesiCal CouuecHA
hn how Can be tha, lou muule oh 0
1ectabUSCAe
kiy 1s Yossible orough olyeleg toyeles
technoloq tég
i 4hal fs tha co se ho
fs
2ol. to Cauy the Sigro
obViousy alh is goi to, lasvy the dota
dofa thoy
Here &in, fs the ukUtlat tastly tHe
Ohe plae to anothen. Plaut.
wlyeles U
( e lpho
Thi's is a
Phe gakeny Pcrfeet exot bleel
w e e s Copute Nehaoy
Cowbue
Kourey
n Pv
wrlesedtary devces
ev d o v i r e s
tibesdismbrt-/
PDDT olatamtent
CoPhelchbdalatalnteny enfU
D9
ATM
Basfc choracteaístfcs
leonerg Undestand tho need oy tault tolasaut Metosc
os Scalable Nekoog hs
Understordthe merd
Urderstard 6ualtt SexvIce
) faul oleyamce
2) Scalabilhy
3)ualty e Ses vice Cýss)
4) Secusty
tault oyeyance
Thu
abilty to 1 (ouhmu Loosting despite ta1luges
EnsuTe no loss eSeu e
Scal abflt
Thu abihty to Groo based on ths merdc
Hove gvod Petosmane after go th
Quals hy ef Sevice (0os)
Th abilhy to . Set frovthes
9 Manag data offhc to ®dure data loss, clelay ete.
Sec un
Tu Qbrlity To Peveut 1 mauthov1Zeol actess
2MisuSe
3 tagerY
Th abihy to oviol Consdoutalhy
2Integ4
3 Auad labl t
Data Communicathon
Are
Are the echonge edo ta betOarn too
madee Va 9me torm o unk ( T me dium) Such as o Coolo
Mssag encoding t
Messagatosma tiq
both Sendes / hucaue. a g u on cestan tosmad
encap suulate ho inpT mathan to talnhey He 9eudyl
uctiven igk.tly.
UsaR 9e, Humm beak long messagt ln Smaler fants 0
Sewhres, Log Meseg0s mut also be be byokon Into n a l y
hee to travel aroß a Mo