Computer Networks
Computer Networks
CATEGORY L T P CREDIT
ECT423 COMPUTER NETWORKS
PEC 2 1 0 3
.
Preamble: The course aims to expose students to computer networks taking a top-down
approach of viewing from the layer of user applications and zooming into link layer
protocols. The principles of various protocols used in every layer are studied in detail. A brief
introduction to mathematical modelling of queues with an application to a single example is
included.
Course Outcomes: After the completion of the course the student will be able to
PO PO PO PO
PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9
1 10 11 12
CO 1 3 3 3 2
CO 2 3 3 3 2
CO 3 3 3 3 2
CO 4 3 3 3 2
CO 5
Assessment Pattern
Mark distribution
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contain 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions. Part B contains 2 questions from each module of which
student should answer any one. Each question can have maximum 2 sub-divisions and carry
14 marks. Mark patterns are as per the syllabus with 60 % for theory and 40% for
logical/numerical problems, derivation and proof.
Course Outcome 1 (CO1): Describe the protocols used in web and email applications.
1. Describe the HTTP message format
2. Compare and contrast two application layer protocols SMTP and HTTP
Course Outcome 2 (CO2: Analyse problems pertaining to reliale data transfer, flow control
and congestion over a TCP network.
1. Why is it that voice and video traffic is often sent over TCP rather than UDP in
today’s Internet?
2. Suppose two TCP connections are present over some bottleneck link of rate R bps.
Both connections have a huge file to send (in the same direction over the bottleneck
link). The transmissions of the files start at the same time. What transmission rate
would TCP like to give to each of the connections?
Course Outcome 3 (CO3): Apply Dijkstra’s algorithm and distance-vector algorithm in the
context of routing over computer networks.
1. Consider the following network. Compute the shortest-path from the node D to all
other nodes using Dijkstra’s shortest path algorithm. (Numbers indicated shows the
link costs).
2. Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3.
Suppose all of the interfaces in each of these three subnets are required to have the
prefix 223.1.17/24. Also suppose that Subnet 1 is required to support at least 60
interfaces, Subnet 2 is to support at least 90 interfaces, and Subnet 3 is to support at
least 12 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy
these constraints.
Course Outcome 5 (CO5):Analyze the delay performance of an ARQ system using standard
queueing models.
1. Consider a network where packets arrive via N different nodes with different arrivate
rates. Illustrate the use of Littles law in this scenario to calcualte the average packet
delay inside the network.
2. Customers arrive in a restaurant at a rate of 5 per minute, and wait to receive their
order for an average of 5 minutes. Customers eat in the restaurant with a probability
of 0.5, and carry their order out without eating with probability 0.5. What is the
average number of customers in the restaurant?
Network edges, Network core and Network links Client and server
hosts, connectionless and connection-oriented services provided to
hosts, circuit-switched versus packet-swtiched network cores, FDM,
TDM versus statistical multiplexing, Datagram versus Virtual-circuit
networks. Access and physical media.
I 8
Delay and loss in packet-swtiched networks Types of delay, Packet
loss. Layered Architecture: Protocol layering, Internet protocol stack,
Message encapsulation.
Text Books
1. James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach
Featuring the Internet, 3rd edition, Pearson
2. D. Bertsekas, RG Gallager, Data Networks, Prentice Hal
Reference Books
1. Larry L. Peterson, Bruce S. Davie, Computer Networks – A Systems Approach, Morgan
Kauffman
2. N. Abramson, F. Kuo, Computer Communication Networks, Prentice Hall
3. A. S. Tanenbaum, D. J. Wetherall, Computer Networks, Pearson
4. A. Kumar, D. Manjunath, J. Kuri, Communication Networking – An Analytical Approach,
Morgan Kauffman Series.
No TOPIC No of Lectures
MODULE 1
1.1 Components of computer networks, Applications, Protocol, 1
Protocol standrdization
1.2 Hosts, connectionless and connection-oriented, circuit- 1
switching versus packet-swtiching in network core design,
FDM, TDM versus statistical multiplexing,
1.3 Datagram versus Virtual-circuit networks. Examples of access 1
networks, and examples of physical media.
1.4 Types of delay, Packet loss. 1
1.5 Layered Architecture, Protocol layering, Internet protocol 1
stack, Message encapsulation.
1.6 Communication between processes, HTTP, Mssage format 1
1.7 Email application: SMTP, Message format, MIME, POP3, 1
IMAP and Web-based email.
1.8 Domain Name System (DNS) 1
MODULE II
2.1 Services of transport layer, Multiplexing and demultiplexing. 1
Connectionless and connection-oriented transport. UDP.
2.2 Procols for reliable data transfer: ARQ protocols, stop-and- 3
wait protocol, alternating-bit protocol, Go-back-N, Selective
Repeat.
Simulation Assignments
Assignment 1:
2. Wireshark is a standard network packet analyzer tool which can be used to analyze
how the different protocol layers work (by adding headers and other meta
information) to an application layer message.
5. https://gaia.cs.umass.edu/kurose_ross/wireshark.php
3. Generation of random graphs (students can use inbuilt functions of NetworkX – see
for example https://networkx.org/documentation/stable/reference/generators.html)
5. Use inbuilt shortest path functions to obtain a baseline to test self-written code
https://networkx.org/documentation/stable/reference/algorithms/shortest_paths.html)
1. Fully fledged simulation using NS3 can be given as a demonstration by the instructor
https://www.cse.iitb.ac.in/~mythili/teaching/cs224m_autumn2017/tcpsimpa/index.ht
ml
PART A
MODULE 1
11(a) How layered architecture helps in the efficient communication between hosts? 4
11(b) Explain the functions performed by the layers in the internet protocol stack. 10
OR
MODULE IV
17(a) Explain the multiple access protocol used in IEEE 802.3. 7
17(b) Explain the error detection mechanism using CRC with an example. 7
OR
18(a) Derive the efficiency of slotted ALOHA. 7
18(b) Explain how the physical address of a host is being mapped from its IP address 7
using address resolution protocol.
MODULE V
19(a) State and prove Littles theorem. 7
19(b) Explain the IEEE 802.11 MAC protocol. 7
OR
20(a) Derive an expression for the average packet delay in a Go-Back-N ARQ system. 7
20(b) Describe how a wireless station associates with an access point (AP) as per IEEE 7
802.11 protocol.