Share Topics 2
Share Topics 2
Theory
Unit 1:
Networking Fundamentals
Basics of Network and Networking, Advantages of Networking, Types of Networks, Network Terms- Host,
Workstations, Server, Client, Node, Types of Network Architecture- Peer-to-Peer and Client/Server, Workgroup
Vs. Domain. Network Topologies, Types of Topologies, Logical and physical topologies, selecting the Right
Topology, Types of Transmission Media, Communication Modes, Wiring Standards and Cabling- straight through
cable, crossover cable, rollover cable, media connectors (Fibre optic, Coaxial, and TP etc.) Introduction of OSI
model, Seven layers of OSI model, Functions of the seven layers, Introduction of TCP/IP Model, TCP, UDP, IP,
ICMP, ARP/RARP, Comparison between OSI model & TCP/IP model. Overview of Ethernet Addresses.
Unit 2:
Application Layer, Presentation Layer and Network Devices
Application Layer: DHCP, DNS, HTTP/HTTPS, FTP, TFTP, SFTP, Telnet, Email: SMTP, POP3/IMAP, NTP.
Presentation Layer: Role and functions of Presentation Layer, Data representation and encoding techniques (ASCII,
EBCDIC, etc.) , Data compression and decompression, Data encryption and decryption, Common protocols at the
Presentation Layer (JPEG, MPEG, SSL/TLS, etc.)Network Devices- NIC- functions of NIC, installing NIC, Hub,
Switch, Bridge, Router, Gateways, And Other Networking Devices, Repeater, CSU/DSU, and modem.
Unit 3:
Session Layer, Transport Layer and Network Layer
Session Layer: Role and functions of Session Layer, Establishing, managing, and terminating sessions, Session
synchronization and recovery, Session layer protocols (NetBIOS, RPC, etc.), Error handling and flow control at the
Session Layer.
Transport Layer: Transmission Control Protocol(TCP), User Datagram Protocol (UDP), Overview of Ports and
Sockets.
Network Layer: Internet Protocol (IP), IP standards, versions, functions, IPv4 addressing, IPv4 address Classes,
IPv4 address types, Subnet Mask, Default Gateway, Public and Private IP Address, methods of assigning IP address,
IPv6 address, types, assignment, Data encapsulation, The IPv4 Datagram Format, The IPv6 Datagram Format,
Internet Control Message Protocol (ICMP ), ICMPv4, ICMPv6, Internet Group Management Protocol (IGMP),
Introduction to Routing and Switching concepts.
Unit 4
Data Link Layer and Physical Layer:
Data Link Layer: Role and functions of Data Link Layer , Framing techniques (bit stuffing, byte stuffing,
etc.),Error detection and correction (parity, CRC, etc.),MAC addresses and MAC protocols (Ethernet, Wi-Fi, etc.),
Switching techniques (store-and-forward, cut-through, etc.). Address Resolution Protocol (ARP) and Reverse ARP
(RARP), Error handling and flow control at the Data Link Layer.
Wireless Networking: Wireless Technology, Benefits of Wireless Technology, Types of Wireless Networks: Ad-
hoc mode, Infrastructure mode, Wireless network Components: Wireless Access Points, Wireless NICs, wireless
LAN standards: IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, wireless LAN modulation techniques, wireless
security Protocols: WEP, WPA, 802.1X, Installing a wireless LAN.
Physical Layer: Role and functions of Physical Layer, Transmission media (twisted pair, coaxial, fiber optics, etc.),
Signal encoding and modulation techniques, Multiplexing and demultiplexing, Physical layer protocols and
standards (RS-232, V.35, etc.), Wireless communication technologies (Wi-Fi, Bluetooth, etc.),Wireless network
architectures and protocols, Line coding and scrambling techniques, Analog and digital transmission, Signal quality
and noise considerations.
Unit 5:
Other Networking technologies
What Is a WAN ? , WAN Switching, WAN Switching techniques Circuit Switching, Packet Switching etc.,
Connecting to the Internet: PSTN, ISDN, DSL, CATV, Satellite-Based Services, Last Mile Fiber, Cellular
Technologies,
Connecting LANs: Leased Lines, SONET/SDH, Packet Switching, Remote Access: Dial-up Remote Access,
Virtual Private Networking, SSL VPN, Remote Terminal Emulation, Network security: Authentication and
Authorization, Tunneling and Encryption Protocols, IPSec, SSL and TLS, Firewall, Other Security Appliances,
Security Threats.
Network Operating Systems: Microsoft Operating Systems, Novell NetWare, UNIX and Linux Operating
Systems, Macintosh Networking, Troubleshooting Networks: Command-Line interface Tools, Using Network
Utilities: ping, traceroute, tracert, ipconfig, arp, nslookup, netstat, nbtstat, Hardware troubleshooting tools, system
monitoring tools. Emerging networking technologies.
Suggested Readings
Text Books:
1. "Computer Networks: A Systems Approach" by Morgan Kaufmann (Publication date: 2019)
2. "Computer Networks: A Top Down Approach" by James F. Kurose and Keith W. Ross (Publication date: 2016)
Reference Books:
1. "Data Communications and Networking" by Behrouz A. Forouzan (Publication date: 2013).
2. "Computer Networks: A Systems Approach" by Larry L. Peterson and Bruce S. Davie (Publication date: 2019).
3. "Data and Computer Communications" by William Stallings (Publication date: 2017)
Practical
List of Experiments:
1. Switch Configuration - Basic Commands and Switch Port Security.
Using Packet Tracer or a similar network simulation tool, configure a switch with the following requirements:
● Set a unique hostname for the switch.
● Assign an IP address to the switch and enable SSH for remote management.
● Implement switch port security on a specific interface to allow only two MAC addresses and restrict any
additional connections.
● Specify a violation action that shuts down the port if an unauthorized device is connected.
● Test the switch port security by connecting unauthorized devices and observe the resulting actions taken by the
switch.
2. Router – Configuration and Setting up of Passwords.
Configure a router with appropriate passwords for console, Telnet, and privileged mode access, and verify the
successful setup of passwords.
3. PPP Encapsulation, PPP PAP Authentication, PPP CHAP Authentication.
Set up a PPP connection between two routers using PPP encapsulation and configure both PAP and CHAP
authentication protocols to establish secure communication. Test the authentication process and verify the
successful establishment of the PPP connection.
4. A configuration of default, Static and Dynamic Routing.
Configure a network with three routers and implement default routing, static routing, and dynamic routing using
a routing protocol of your choice. Test the routing configurations by verifying proper forwarding of packets
between different networks.
5. VLAN Configuration.
Design a network with multiple VLANs and configure VLANs on switches, along with inter-VLAN routing, to
enable communication between different VLANs.
6. Configuration of Access-lists - Standard and Extended ACLs.
Configure standard and extended access-lists on a router to control traffic flow based on specific
source/destination IP addresses, protocols, and ports. Test the access-lists by allowing or denying specific traffic
patterns and verify the desired filtering behaviour.