6.1 Syllabus Cs2361 Computer Networks L T P C 3 0 0 3 Unit I 9
6.1 Syllabus Cs2361 Computer Networks L T P C 3 0 0 3 Unit I 9
6.1 SYLLABUS
CS2361 COMPUTER NETWORKS
LTPC
3003
UNIT I
Introduction to networks network architecture network performance Direct link
networks encoding framing error detection transmission Ethernet Rings
FDDI - Wireless networks Switched networks bridges
UNIT II
Internetworking IP - ARP Reverse Address Resolution Protocol Dynamic Host
Configuration Protocol Internet Control Message Protocol Routing Routing
algorithms Addressing Subnetting CIDR Inter domain routing IPv6
UNIT III
Transport Layer User Datagram Protocol (UDP) Transmission Control Protocol
Congestion control Flow control Queuing Disciplines Congestion - Avoidance
Mechanisms.
UNIT IV
9
Data Compression introduction to JPEG, MPEG, and MP3 cryptography
symmetric-key public-key authentication key distribution key agreement PGP
SSH Transport layer security IP Security wireless security Firewalls
UNIT V
Domain Name System (DNS) E-mail World Wide Web (HTTP) Simple Network
Management Protocol File Transfer Protocol (FTP) Web Services Multimedia Applications Overlay networks
TOTAL : 45 PERIODS
TEXT BOOK:
1.Larry L. Peterson and Bruce S. Davie, Computer Networks: A Systems Approach,
Fourth Edition, Elsevier Publishers Inc., 2007.
2. Andrew S. Tanenbaum, Computer Networks, Fourth Edition, PHI, 2003.
OM SAKTHI
OM SATHI
OM SAKTHI
OM SATHI
1)In the first step, the 4-bit divisor is subtracted from the first 4 bit of thedividend.
2) Each bit of the divisor is subtracted from the
corresponding bit of the dividend without disturbing the next higher bit.
29. Write short notes on CRC checker.
A CRC checker functions exactly like a generator. After receiving the data appended
with the CRC it does the same modulo-2 division. If the remainder is all 0s the CRC
isdropped and the data accepted. Otherwise, the received stream of bits is discarded and
thedates are resent.
30. Give the essential properties for polynomial.
A polynomial should be selected to have at least the following properties.
a) It should not be
b) It should be divisible by(x+1).
31. Define checksum.
The error detection method used by the higher layer protocol is called checksum.
Checksum is based on the concept of redundancy.
32. What are the steps followed in checksum generator?
The sender follows these steps
a) The units are divided into k sections each of n bits.
b) All sections are added together using 2s complement to get the sum.
c) The sum is complemented and become the checksum.
d) The checksum is sent with the data.
33. List out the steps followed is checksum checker side.
The receiver must follow these steps
a) The unit is divided into k section each of n bits.
b) All sections are added together using 1s complement to get the sum.
c) The sum is complemented.
d) If the result is zero.
34. Write short notes on error correction.
It is the mechanism to correct the errors and it can be handled in 2 ways.
a) When an error is discovered, the receiver can have the sender retransmit the
entire data unit.
b) A receiver can use an error correcting coder, which automatically corrects
certain errors.
OM SAKTHI
OM SATHI
Network
Logical Link Control
Media Access Control
Physical
logical address, control information, and data. These functions are handled by the
IEEE802.2 logical link control (LLC) protocol.
4. What are the functions of MAC?
MAC sub layer resolves the contention for the shared media. It contains
synchronization, flag, flow and error control specifications necessary to move information
from one place to another, as well as the physical address of the next station to receive and
route a packet.
5. What is protocol data unit?
The data unit in the LLC level is called Protocol Data Unit (PDU). It contains four
fields.
1)Destination Service Point Address (DSAP)
2)Source Service Access Point
3)Control field
4)Information field
6. What are headers and trailers and how do they get added and removed?
The control data added to the beginning of a data is called headers. The control data
added to the end of a data is called trailers. At the sending machine, when the message
passes through the layers each layer adds the headers or trailers. At the receiving machine,
each layer removes the data meant for it and passes the rest to the next layer.
7. What are the responsibilities of network layer?
The network layer is responsible for the source-to-destination delivery of packet
across multiple network links. The specific responsibilities of network layer include the
following:
1)Logical addressing.
2)Routing.
8. What is a virtual circuit?
A logical circuit made between the sending and receiving computers. The connection
is made after both computers do handshaking. After the connection, all packets follow the
same route and arrive in sequence.
9. What are data grams?
In datagram approach, each packet is treated independently from all others. Even
when one packet represents just a place of a multipacket transmission, the network treats it
although it existed alone. Packets in this technology are referred to as datagram.
10. What are the two types of implementation formats in virtual circuits?
Virtual circuit transmission is implemented in 2 formats.
1) Switched virtual circuit
2) Permanent virtual circuit.
OM SAKTHI
OM SATHI
OM SAKTHI
Connection service
Connectionless services
10. The transport layer creates the connection between source and destination. What
are the three events involved in the connection?
For security, the transport layer may create a connection between the two end ports. A
connection is a single logical path between the source and destination that is associated
with all packets in a message. Creating a connection involves three steps:
1) Connection establishment
2) Data transfer & Connection release.
11. What is meant by congestion?
Congestion in a network occurs if user sends data into the network at a rate greater
than that allowed by network resources.
12. Why the congestion occurs in network?
Congestion occurs because the switches in a network have a limited buffer size to
store arrived packets.
13. What is meant by quality of service?
The quality of service defines a set of attributes related to the performance of the
connection. For each connection, the user can request a particular attribute each service
class is associated with a set of attributes.
14. What are the two categories of QoS attributes?
The two main categories are
User Oriented
Network Oriented
15. List out the user related attributes?
User related attributes are
SCR Sustainable Cell Rate
PCR Peak Cell Rate
MCR- Minimum Cell Rate
CVDT Cell Variation Delay Tolerance
16. What are the networks related attributes?
The network related attributes are,
Cell loss ratio (CLR)
Cell transfer delay (CTD)
Cell delay variation (CDV)
Cell error ratio (CER)
17. What are the rules of nonboundary-level masking?
The bytes in the IP address that corresponds to 255 in the mask will be repeated in
the subnetwork address.
The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the
subnetwork address
For other bytes, use the bit-wise AND operator.
18. Define Gateway.
A device used to connect two separate networks that use different communication
protocols.
OM SATHI
OM SAKTHI
6. Define permutation.
Permutation is transposition in bit level.
Straight permutation: The no. of bits in the input and output are preserved.
Compressed permutation: The no. of bits is reduced (some of the bits are dropped).
Expanded permutation: The no. of bits is increased (some bits are repeated).
7. Define substitutional & transpositional encryption.
Substitutional: A character level encryption in which each character is replaced by
another character in the set.
Transpositional: A Character level encryption in which the characters retain their
plaintext but the position of the character changes.
UNIT V - APPLICATION LAYER
1. What is the purpose of Domain Name System?
Domain Name System can map a name to an address and conversely an address to
name.
2. Discuss the three main division of the domain name space.
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
Generic domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
3. Discuss the TCP connections needed in FTP.
FTP establishes two connections between the hosts. One connection is used for data
transfer, the other for control information. The control connection uses very simple rules of
communication. The data connection needs more complex rules due to the variety of data
types transferred.
4. Discuss the basic model of FTP.
The client has three components: the user interface, the client control process, and the
client data transfer process. The server has two components: the server control process and
the server data transfer process. The control connection is made between the control
processes. The data connection is made between the data transfer processes.
5. What is the function of SMTP?
The TCP/IP protocol supports electronic mail on the Internet is called Simple Mail
Transfer (SMTP). It is a system for sending messages to other computer users based on email addresses. SMTP provides mail exchange between users on the same or different
computers.
6. What is the difference between a user agent (UA) and a mail transfer agent
(MTA)?
The UA prepares the message, creates the envelope, and puts the message in
the envelope. The MTA transfers the mail across the Internet.
OM SATHI
OM SAKTHI
OM SATHI
OM SAKTHI
PART-B
1. With relevant examples differentiate between simplex, half duplex and full
duplex communication.
2. Explain about the transmission modes available for data flow.
3. Explain the categories of networks.
4. Distinguish between point to point links and multipoint links. Give relevant
diagrams.
5. A network has n devices. Determine the number of cable links required for a
mesh,ring,bus and star topology.
6. Explain the star and bus topologies of computer networks.
7. What is a protocol? List three key elements of a protocol.
8. Explain about protocol standards.
9. Explain ISO/OSI reference model in the type with suitable examples.
10. Discuss about any guided transmission media and unguided transmission
media in the type with suitable diagram.
11. List out four properties by which transmission media can differ?
12. Explain twisted pair cable and co axial cable with neat diagrams.
13. What are the major components of an optical communication system?
14. Explain in detail the types of line coding with a neat diagram.
15. Explain about any two recent modem standards in detail.
16. Explain about RS-232 interface.
17. Compare connection oriented and connectionless service.