Computer Networks CHO
Computer Networks CHO
• Categorize and interrelate the functions of layers of OSI and TCP/IP reference model.
• Interpret the error detection as well as correction at Layer 2 and at Layer 3.
• Design and configure network topologies with interior routing protocols.
• Summarize the mechanism of Cellular, Satellite and MPLS Networks.
• Interpret the rationality behind congestion in networks and quality of service.
• Gauge the existing protocols, who carry the onus of network communication at Application layer.
Course PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
Learning
Outcomes
CLO1 H H M
CLO2 H H H M M M H H
CLO3 H M H M M M M
CLO4
H H H H
CLO5 H H M M M M H
CLO6
H M H H H M H M M M H
3. Recommended Books:
B01: Data Communications and Networking’ by Forouzan, 5TH edition, 2013.
B02: Computer Networks’ By Andrew S. Tanenbaum Fifth edition, Pearson Education,2013.
B03: Data and computer Communications’ by William Stallings, 8th edition, Pearson,2007.
B04: CCNA Cisco Certified Network Associate Study Guide', by Todd Lammle, Wiley, 7th edition,2011.
B05: Computer Networking: A Top-Down Approach', by Kurose and Ross, Pearson Education, 6th edition,2013.
Sr No.
Link of Journals, Magazines, websites and Research Papers
1. http://nptel.iitm.ac.in/courses/Webcourse-
contents/IIT%20Kharagpur/Computer%20networks/New_index1.html
2. http://nptel.ac.in/courses/Webcourse-
contents/IIT%20Kharagpur/Computer%20networks/New_index1.html
3. http://nptel.ac.in/courses/106105081/1
4. http://www.brainbell.com/tutorials/Networking/
5. https://learningnetwork.cisco.com/index.jspa?ciscoHome=true
6. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-263j-data-
communication-networks-fall-2002/lecture-notes/
7. https://www.slideshare.net/VidhuBaggan1/mpls-by-vidhu
1-4 Introduction: Uses of Computer >Hardware and Software required for Network
networks, Network hardware >Bus Star, Ring, Mesh Topology
Topologies, Collision Domain,
Broadcast Domain
5-6 Reference Models:Seven-Layer >Significance of OSI Layered Structure,
OSI architecture, Concepts of >Physical Layer,Data Link Layer, Network Layer,
Layers, Protocols and Layer Transport Layer,Session Layer, Presentation Layer,
interfaces and PDU Application Layer
> Purpose and functionality of each Layer,
>Difference between Bits, Frames, Packets,
Segment, Message at Application Layer
7 TCP/IP reference model , >Recap f OSI Layers and Significance of TCP/IP
Comparison of OSI and TCP/IP Reference Model
reference models >Host to Network Layer, Internet Layer, Transport
Layer, Application Layer
8-11 Physical Layer: Transmission >Guided Media: STP,UTP,Coaxial,Fiber optic Cable
Media (Cable Media), Wireless >UnGuided Media: Cellular and Satellite
Media (Cellular Telephone, Transmission
Satellite Networks),
7. Delivery/Instructional Resources
https://www
.youtube.co
m/watch?v=
4R1qHE0E8lE
https://ww
w.indiabix.c
om/networ
king/subnet
ting/
20 Routing Protocols https://www.sl
>Terminology related to OSPF ideshare.net/e
>Types of Packets scrimag/ospfp
>Administrative Distance pt-35277878
>Area,Area Border Router,
Autonomous System,Route
Summarization
>Configuration of OSPF and
EIGRP
>Single area and Multiple Area
in OSPF
21 > SYN,ACK,RST,FIN https://www.t
>SYN Attack utorialspoint.c
om/tcp-3-way-
handshake-
process
22-26 Data Link Layer http://www.en
>Single Bit and Multiple Bit gppt.com/200
Error 9/12/networki
>Hamming Code and Distance ng-fourozan-
>CRC ppt-slides.html
>CheckSum
27-29 Data Link Layer https://www.sl
>Pure and Slotted ALOHA ideshare.net/b
>Piggybacking hanutulya17/al
>Stop and Wait oha-protocol-
in-detail
8. Lab Plan
S.
Experiment Problem Statement Ref. Lectures
No.
Introduction of Cables, Network devices : Hub,
1. P(a), P(b) 1-2
Switches, Router etc.
Introduction of Mac Address, IP addresses,
2. P(c), P(b) 3-4
Subnet Mask, Network Classes : A, B, C, D, E
To make cables: Cables: Straight Through,
3. P(a), P(b) 5-6
Crossover, Rollover
To do peer to peer connectivity, assign the IP
4. P(b), P(c) 7-8
address and share the resources
P(a) Consider the problem of designing a small network of computers. To accomplish this goal, Ethernet
lines must be constructed and run between the machines. The construction costs for each possible link
are based approximately on distance. Besides distance, the costs also reflect some restrictions due to
physical boundaries. To connect all the machines in the office at minimal cost, try different
configurations to connect them like (star, mesh, ring, bus) with the help of various other networking
devices like (switch, repeater, hub, bridge.
P(b) You have just started a new business. You need to have three to four workstations available for your
employees who simply need to share some files and a printer, but you don't have a large budget.
Security is not a major concern, but costs are. What type of network would be the most appropriate for
your situation?
P(c ) Let us assume that Johnson & Co. is a small business firm with five departments each having twenty-
five employees. Assuming each employee has a computer and each department has a printer, Johnson
& Co. will need 125 nodes for computers and five for printers. It is also assumed that one department
requires token ring, another requires fiber, and the rest of the departments requires 10 or 100 Mbps
Ethernet. The network number assigned to Johnson & Co. is 201.222.5.0. The network administrator
decides to create smaller networks, one for each department.
P( d) Mr. Amit wants to connect Advertising department with Sales department. At First, he did not require
WAN devices as both departments were having same Network Addresses .But Later on, he has to
introduce Layer 3 devices because Network addresses were changed of both departments. Simulate the
previous and present scenario using suitable commands to verify the connectivity.
P( e) CEO of company ABC needs a system with network configuration that can communicable only with
machines of managers of different departments. The path for communication between source and
destination should be set by static routing.
P( f) Mr. Gunit is feature-riffic and hence he wants to configure the routers with the protocol having many
features. He does not scare off the complexities of the protocol to be implemented but he is certain
about one thing that the protocol should be open and not proprietary. Perform the following as per his
need: Simulate a topology.
Implement small and medium sized networked dynamic routing protocol.
Routing updates are multicast.
Minimize broadcast traffic.
Send periodic routing updates.
Hint: This routing protocol is distance vector style.
P(g) Perform the following with atleast three routers, two switches and two PC’s:
• Simulate a topology.
• Implement dynamic routing protocol that sends no Broadcasts and consumes less bandwidth
and supports multiple network layer protocols.
• Send partial updates as needed.
Hint: Hybrid Distance Vector/Link State algorithm
P(h) Perform the following with atleast three routers, four switches and four PC’s:
Simulate a topology.
Implement loop free dynamic routing protocol.
Balance the network traffic using multiple paths.
Send immediate routing updates rather than periodically.
Hint: This protocol supports VLSM, CIDR, and supernetting.
P(I) A company has only one public IP address but several private IP address dynamically assigned by the
DHCP server for all its computers. NAT application (Router, Firewall) would change the source address
(private IP address) on every outgoing packet from the internal computers in to the single public IP
address. But it assigns a different source port for packets coming from each computer, so that while the
packets return with a single public IP address, it can still remember which packet needs to go to which
computer (Every IP address has source IP, destination IP and associated port numbers). Of course, while
coming back, the packets are re-assigned with its respective private IP address of the computer it needs
to go to and the public IP address is discarded by the NAT application. This process is managed by a
port mapping table managed by the NAT application, for all the incoming and outgoing packets from a
network. Perform the following tasks based on mentioned scenario:
• Design a topology consisting of a private and public network, and configure NAT.
• Provide NAT table for every incoming and outgoing packet.
• Display all NAT translations.
• Allow internal users to connect to internet.
As defined in
ST 01 Upto 30% Academic
Calendar
As defined in
Component 02 ST 02 31 - 70% Academic 30%
Calendar
As defined in
ST 03 71-100% Academic
Calendar
At the end of
Component 3 End Term Examination 1-100% 50%
the semester
Total 100%
**Out of 03 STs, the ERP system automatically picks the best 02 STs marks for evaluation of the STs as final marks.
*Out of 02 internal Lab Performances, the ERP system automatically picks the best 01 Performances marks for
evaluation of the Lab Performances as final marks.
*Lab performances will be evaluated periodically (File Work- 5, Viva- 5, Practical Performance- 10)
**The End Term examination for practical courses is held at the end of semester and includes conduct of experiment
and an oral examination (viva voce).
*As per Academic Guidelines minimum 75% attendance is required to become eligible for appearing in the End
Semester Examination.
12. Syllabus of the Course:
No. of Weightage
S.N. Topic (s)
Lectures %
Date (DD/MM/YYYY)