0% found this document useful (0 votes)
92 views4 pages

19EC412 - Communication Networks

This document outlines a course on communication networks that covers: - The components and architecture of networks including OSI and TCP/IP models. - Wired and wireless networking standards like Ethernet, WiFi, and Bluetooth. - Network routing protocols including RIP, OSPF, BGP, and multicast routing. - Transport layer protocols like TCP and congestion control. - Network applications and security including DNS, HTTP, email, SNMP, and cryptography.

Uploaded by

Abi Jayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views4 pages

19EC412 - Communication Networks

This document outlines a course on communication networks that covers: - The components and architecture of networks including OSI and TCP/IP models. - Wired and wireless networking standards like Ethernet, WiFi, and Bluetooth. - Network routing protocols including RIP, OSPF, BGP, and multicast routing. - Transport layer protocols like TCP and congestion control. - Network applications and security including DNS, HTTP, email, SNMP, and cryptography.

Uploaded by

Abi Jayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

L T P C

19EC412 COMMUNICATION NETWORKS


3 0 2 4

PREAMBLE

The global connectivity can be achieved through communication networks. It is important to


understand the function of communication networks and the knowledge about hardware and
software requirements of networks is essential. This course emphasizes the various components
to make a network operational and this course will also help us to understand various security
schemes and it importance over the internetwork.

PREREQUISITE

19EC406 - Digital Communication

COURSE OUTCOMES

At the end of the course learners will be able to

Identify the functionalities of network architecture and components


CO1 Analyze
required to build and design different types of networks.

CO2 Synthesize Wired and wireless network standards and analyze them. Understand

Implement the different routing protocols and IP tunneling in


CO3 Apply
network
CO4 Analyze the flow and congestion control algorithms of TCP. Analyze

Analyze the operations of different application layer protocols and to


CO5 Analyze
implement network security operations

MAPPING OF COs WITH POs AND PSOs

PROGRAMME
PROGRAMME OUTCOMES SPECIFIC
COURSE OUTCOMES
OUTCOMES
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 3 2 3 3 3 2 1 - 2 - - 2 3 2 3
CO2 2 3 3 3 2 2 - - 2 - - 2 2 1 3
CO3 2 3 3 3 3 2 1 - 2 - - 1 3 3 3
CO4 3 2 3 2 2 2 - - 2 - - 1 2 1 3
CO5 3 3 3 3 3 2 1 - 2 - - 1 3 3 3
1. LOW 2. MODERATE 3. SUBSTANTIAL
CONCEPT MAP
Communication Networks

can be are managed by are studied through


Internet LAN WAN
(TCP/IP) SNMP Simulation
(NS2 and LAN
can be includes Trainer kit)

includes Wireless Frame Relay


LAN ATM
Wired LAN
includes consists of consists of
Physical Layer includes
Datalink Layer
Network Layer
Transport Layer IEEE 802.11
Bluetooth Physical Layer
Application Layer
Data Link Layer
Physical
Layer
Switched Ethernet
ATM Layer
Fast Ehernet
Gigabit Ethernet

SYLLABUS
UNIT I FUNDAMENTALS & LINK LAYER
15
Introduction – Building requirements – basic Network Topologies - network architecture –
OSI, TCP/IP -protocol implementation issues – Quantitative performance metrics in network
design - Framing (BiSYNC, HDLC, PPP, DDCMP) and error control techniques-Simulation
of sliding window protocols - Switched networks – Datagram switching and virtual circuits
Switching.
Implementation of basic Network Topologies, Implementation of error control techniques,
Simulation of sliding window protocols

UNIT II MEDIA ACCESS & INTERNETWORKING


15 Media access control - Ethernet (802.3) – CSMA/CD and CSMA/CA
MAC schemes - Wireless LANs – 802.11 – Bluetooth - Switching and bridging – Basic
Internetworking (IP, CIDR, ARP, DHCP, ICMP ) – ATM.
Simulation of CSMA/CD and CSMA/CA MAC schemes, Simulation of ATM , Frame relay
networks and performance analysis.
UNIT III ROUTING 15
Routing (RIP, OSPF, metrics) – Distance vector routing – Link state routing protocols – Switch
basics – Global Internet (Areas, Inter domain routing implementation of BGP, IPv6), Multicast
– addresses – multicast routing (DVMRP, PIM) - VLAN – VPN – IP tunneling.
Simulation of OSPF, Simulation of RIP, Simulation of EIGRP routing protocol,
Implementation of IP tunneling.

UNIT IV TCP & CONGESTION


15 Overview of Transport layer - UDP - Reliable byte stream (TCP) - Connection management
- Flow control - Retransmission – TCP Congestion control - Congestion avoidance (DEC bit,
RED) – QoS.
Implementation of Socket programming

UNIT V APPLICATIONS & NETWORK SECURITY


15
DNS – HTTP – E-MAIL – SNMP - Introduction to cryptography techniques-Substitution
Techniques- Transposition Techniques- Symmetric and Asymmetric Key Cryptography - Web
security model-Pretty Good Privacy (PGP)- HTTPS-Introduction to Firewalls- types of
firewalls – Security operation Centre (SOC) operations.
Simulation of Encryption and Decryption Algorithms

TOTAL: 75 PERIODS

LIST OF EQUIPMENT FOR BATCH OF 30 STUDENTS


SOFTWARE

1. C / Python / Java / Equivalent Compiler


2. MATLAB SOFTWARE (Few experiments can be practiced with MATLAB)
3. Network simulator like NS2/ NS3 / Glomosim/OPNET/ - 30 Equivalent

HARDWARE

1. Standalone Desktops - 30 Nos

TEXT BOOKS

1. Andrew S. Tanenbaum and David J. Wetherall,”Computer Networks”, Fifth Edition,


Pearson, 2011.
2. 2.Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Fifth
Edition, Morgan Kaufmann Publishers, 2011.
3. William Stallings, Cryptography and Network Security, 6 th Edition, Pearson Education,
March 2013.

REFERENCES

1. Behrouz A. Forouzan, “Data communication and Networking”, Fourth Edition, Tata


McGraw – Hill, 2011.
2. 2.Nader. F. Mir, “Computer and Communication Networks”, Pearson Prentice Hall
Publishers, 2010.
3. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007.
4. 4.Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source
Approach”, Mc Graw Hill Publisher, 2011.
5. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and
Protocols”, Wiley Publications, 2003.
6. Security operations center, building , operating, and maintaining your SOC, Joseph Muniz
Gary McIntyre, Nadhem AlFardan. (Book by CISCO)

COURSE DESIGNERS

1. Dr.Srigitha S nath - [email protected]


2. Mr.J.Dhanancheziyan - [email protected]

You might also like