Swe2002 Computer-Networks Eth 1.0 37 Swe2002
Swe2002 Computer-Networks Eth 1.0 37 Swe2002
3 0 2 0 4
Pre-requisite CSE1002 Syllabus version
v.1.0
Course Objectives:
1. To learn the principles of computer networks including the Internet protocol stack and
the OSI model.
2. To understand the working of LAN, WAN, MAN.
3. To analyses Error Control and Flow Control Protocols, Routing and Congestion Control
Algorithms, Network Management and Performance.
Networking principles; Network protocol-syntax, semantics, and timing; Layered protocol Stack; Protocol
suites-OSI and TCP/IP. Network Standards and standardization bodies.
LAN topologies. Switching - Circuit Switching-X.25 Network and Frame Relay, Packet Switching-Virtual and
Datagram switching and Cell switching-ATM architecture, ATM layers, ATM cell format, Multiple access.
Link layer services, Framing, Medium Access-CSMA and CSMA/CD, LAN technologies-Ethernet, Gigabit
Ethernet and Token Ring, Error Detection and Correction.
Internet protocols – IPv4 and IPv6, ICMP, ARP, DHCP. Logical addressing-IPv4 Subnetting and Classless
addressing (CIDR) and IPv6 addresses. Transition from IPv4 to IPv6. Internet header checksum,
Networking utilities commands.
Module:5 Internet Routing: 6 hours
Routing algorithms-Distance vector and Link state routing, Internet Routing protocols-RIP, OSPF and
BGP. Basic concepts of hubs, bridges, switches, gateways, and routers.
TCP Congestion Control-Slow Start, Congestion avoidance, Fast retransmit and Fast Recovery. Congestion
Detection Methods-Random Early Detection and Explicit Congestion Notification (ECN).
Text Book(s)
1. W. Stallings, Data and Computer Communications, 10th Edition, Pearson Education, 2013.
Reference Books
1. Behrouz A Forouzan, Data Communications and Networking, 5th Edition, Tata Mc-grawhill, 2013.
Andrew S. Tanenbaum, David J. Wetheral, Computer networks, 5th Edition, Pearson,2012.
2. Nader F. Mir, Computer and Communication Networks, 2nd Edition,Pearson,PHI,2015
3. Elliotte Rusty Harold,Java Network Programming, 4th Edition,O'Reilly Media,2013
4.
1. There are 20PC’s in your network. Five PC’s are connected to one Ethernet
hub, and five PC’s are connected to another hub. Each hub is connected to
separate switch and both the switches are connected to a separate router. The
routers are connected via an Ethernet bridge. The remaining 10 PC’s are
connected directly to one of the two switches. How many Ethernet segments
are there? Implement this scenario using cisco packet tracer.
2. Two PC’s are located in adjacent rooms and a third PC is in a building 300
yards away. Explain how you could connect the three PC’s in a single network.
Implement this scenario using cisco packet tracer..
3. In CRC error correction scheme, choose pattern 1101 and data 100100. Write
a code to encode the given data.
4. There is trouble ticket raised by users of an organization that thier files are
not getting uploaded in ftp server. Measure the performance between the ftp
server and client and diagnose using iperf tool.
6. In an IPv4 packet the value of header length is 1000 in binary. Write a code
to find, how many bytes of options are being carried by this packet?
8. Implement a TCP/IP socket based ATM System. Make the server to maintain
the customer details (name, card no, pin and balance). When a client wants to
withdraw amount, validate his login with card no & pin, display a welcome
message and perform the withdraw operation if he is having sufficient balance
or display a warning message.
9. Write a UDP based server code to get the date of birth of the client and
calculate the age as on today. Client has to enter year, month and day of birth.
For example, if the date of birth of a user is 1/07/2001 then his age is 14 years 0
months and 17 days if today's date is 18/07/2015. Get today's date from the
server.
10. A reputed organization has two branches in Vellore. In one of the branch
office a new manager has been appointed. The Senior Manager from the main
office has to send the important records to the branch office. Implement a
client server model to accomplish this.
11. The finance office of VIT wishes to make the transactions more secured. If
you are a programmer how you will implement a system to validate the login
credentials obtained from the user thereby denying the access to unauthorized
users.
Establish a wired network running many applications level services and measure
the performance of same. Establish a wireless network running many
applications level services and measure the performance of same. Compare the
performance of above two scenarios and list out the challenges.