30
Department of Computer Science and Engineering Course Name : Computer Networks Course Number : A55026 Course Designation : Core Prerequisites : Computer Fundamentals, Number Systems and Data communication System. III B Tech – I Semester

Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Embed Size (px)

Citation preview

Page 1: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Department of Computer Science and Engineering

Course Name : Computer Networks

Course Number : A55026

Course Designation : Core

Prerequisites : Computer Fundamentals,Number Systems and Data communication System.

III B Tech – I Semester(2015-2016)

B. UjwalaAsst professor

Page 2: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

SYLLABUS

Unit – I

Introduction Reference Models: The OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI and TCP/IP Reference Models, A Critique of the OSI Model and Protocols, A Critique of the TCP/IP Reference Model. Sliding Window Protocols: One-Bit Sliding Window Protocol, A Protocol Using Go Back N, A Protocol Using Selective Repeat.

Unit – II

The Channel Allocation problem: Static Channel Allocation in LANs and MANs, Dynamic Channel Allocation in LANs and MANs.Multiple Access Protocols: ALOHA, Carrier Sense Multiple Access Protocols, Collision-Free Protocols, Limited-Contention Protocols, Wavelength Division Multiple Access Protocols, Wireless LAN Protocols. Ethernet: Ethernet Cabling, Manchester Encoding, The Ethernet MAC Sublayer Protocol, The Binary Exponential Backoff Algorithm, Ethernet Performance, Switched Ethernet, Fast Ethernet, Gigabit Ethernet, IEEE 802.2: Logical Link Control, Retrospective on Ethernet,

Unit – III

Network Layer Design Issues : Store-and-Forward Packet Switching, Service Provided to the Transport Layer, Implementation of Connectionless Service, Implementation of Connection-Oriented Service, Comparison of Virtual-Circuit and Datagram Subnets, Routing Algorithms : The Optimality Principle, Shortest Path Routing, Flooding, Distance Vector Routing, Link State Routing, Hierarchical Routing, Broadcast Routing, Multicast Routing, Routing for Mobile Hosts, Routing in Ad Hoc Networks, Node Lookup in Peer-to-Peer Networks.Congestion Control Algorithms: General Principles of Congestion Control, Congestion Prevention Policies, Congestion Control in Virtual-Circuit Subnets, Congestion Control in Datagram Subnets, Load Shedding, Jitter Control.

Unit – IV

The Transport Service: Services Provided to the Upper Layers. Transport Service Primitives. Berkeley Sockets, An Example of Socket Programming: An Internet File Server.Elements Of Transport Protocols: Addressing, Connection Establishment, Connection Release, Flow Control and Buffering, Multiplexing, Crash Recovery. A Simple Transport Protocol: The Example Service Primitives, The Example Transport Entity, The Example as a Finite State Machine.The Internet Transport Protocols: UDP: Introduction to UDP, Remote Procedure Call, The Real-Time Transport Protocol.The Internet Transport Protocols: Introduction to TCP, The TCP Service Model, The TCP Protocol, The TCP Segment Header, TCP Connection Establishment, TCP Connection Release, Modeling TCP Connection Management, TCP Transmission Policy, TCP Congestion Control, TCP Timer Management, Wireless TCP and UDP, Transactional TCP.

Unit – V

Cryptography: Introduction to Cryptography, Substitution Ciphers, Transposition Ciphers, One-Time Pads, Two Fundamental Cryptographic Principles.Symmetric-Key Algorithms: DES-The Data Encryption Standard, AES-The Advanced Encryption Standard, Cipher Modes, Other Ciphers, Cryptanalysis.Public-Key Algorithms: RSA., Other Public-Key Algorithms.Digital Signatures: Symmetric-Key Signatures, Public-Key Signatures, Message Digests, The Birthday Attack.Communication Security: IPsecurity, Firewalls, Virtual Private Networks, Wireless Security,

2

Page 3: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

TEXT BOOKS & OTHER REFERENCES

Text Books

1. Computer Networks Fifth Edition By Andrew S. Tanenbaum, Pearson Education

Suggested / Reference Books1. Data communications and Networking, Behrouz A. Forouzan, 4th edition, TMH.

2.Computer Networking, A Top – Down approach featuring the internet, James F. kurose, K .w.ross , 3rd edition, Pearson Education.

Websites References

1. http://netgroup.polito.it/teaching/cn/Content

2. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-829-computer-networks-fall-2002/download-course-materials/

3. http://en.wikipedia.org/wiki/Computer_networks

4. http://www.networking-forum.com/

3

Page 4: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Time Table Room No: W.E.F: 22-06-2015 Hour/

Time

1 2 3 4

12:2

0 –

1:00

LUN

CH B

REAK

5 6 7

9:00 - 9:50 9.50 –10:40 10:40 –11:30 11:30 – 12: 20 1:10 –21:00 2:00 – 2:50 2:50 – 3:40

MON III-I CSE-D

TUE III-I CSE-D

WED III-I CSE-D

THU

FRI III-I CSE-D

SAT III-I CSE-D

PROGRAM EDUCATIONAL OBJECTIVES (PEO’s)

4

Page 5: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

PEO1 The Graduates are employable as software professionals in reputed industries.

PEO2 The Graduates analyze problems by applying the principles of computer science, mathematics and scientific investigation to design and implement industry accepted solutions using latest technologies.

PEO3 The Graduates work productively in supportive and leadership roles on multidisciplinary teams with effective communication and team work skills with high regard to legal and ethical responsibilities.

PEO4 The Graduates embrace lifelong learning to meet ever changing developments in computer science and Engineering.

PROGRAM OUTCOMES (PO’s)

PO1 An ability to communicate effectively and work on multidisciplinary teams

PO2 An ability to identify, formulate and solve computer system problems with professional and ethical responsibility.

PO3 A recognition of the need for, and an ability to engage in life-long learning to use the latest techniques, skills and modern engineering tools

PO4 The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental and social context

PO5 An ability to apply knowledge of mathematics, science, and computing to analyze, design and implement solutions to the realistic problems.

PO6 An ability to apply suitable process with the understanding of software development practice.

Course Outcomes:

5

Page 6: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

By the completion of this course the student will be able to:

1. Analyze TCP/IP and OSI models and various protocols.2. Identify suitable multiple access protocol for different networks.3. Analyze various routing algorithms.4. Choose suitable protocol (UDP/TCP) of transport layer based on the type of

the application.5. Compare and contrast various security algorithms

MAPPING OF COURSE OBJECTIVES & COURSE OUT COMES WITHPO’s & PEO’s

Course Outcomes PO’s PEO’s1 5 22 5 23 5 24 2 25 5 2

COURSE SCHEDULE

Distribution of Hours Unit – Wise

6

Page 7: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Unit TopicChapters

Total No. of HoursBook1

I Introduction Reference Models, Sliding Window Protocols Ch-1,2,3 11

II Data link layer Ch-4 10

III Network Layer Ch-5 12

IV The Transport layer Ch-6 10

V Cryptography Ch-8 12

Contact classes for Syllabus coverage 55

Tutorial Classes : Online Quiz : Descriptive Tests : 02 (Before Mid Examination)

Number of Hours / lectures available in this Semester / Year 55

The number of topics in every unit is not the same – because of the variation, all the units have an unequal distribution of hours

Lecture Plan

S No. Topic Date of Completion

Unit-11 Introduction to Reference Models2 The OSI Reference Model3 The TCP/IP Reference Model,4 A Comparison of the OSI and TCP/IP Reference Mode

5 A Critique of the OSI Model and Protocols, A Critique of the TCP/IP Reference Model.

6 Sliding Window Protocols : One-Bit Sliding Window Protocol

7 A Protocol Using Go Back N,

8 A Protocol Using Selective Repeat

Unit-21 Static Channel Allocation in LANs and MANs, Dynamic

Channel Allocation in LANs and MANs2 Access Protocols : ALOHA,

7

Page 8: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

3 Carrier Sense Multiple Access Protocols Collision-Free Protocols, Limited-Contention Protocols,

4 Wavelength Division Multiple Access Protocols, Wireless LAN Protocols.

5 Ethernet : Ethernet Cabling6 Manchester Encoding, The Ethernet MAC Sublayer Protocol

7 The Binary Exponential Backoff Algorithm, Ethernet Performance, Switched Ethernet

8 Fast Ethernet, Gigabit Ethernet9 IEEE 802.2: Logical Link Control, Retrospective on Ethernet

Unit-31 Network Layer Design Issues : Store-and-Forward Packet

Switching, Service Provided to the Transport Layer,

2 Implementation of Connectionless ServiceComparison of Virtual-Circuit and Datagram Subnets

3 Routing Algorithms : The Optimality Principle, Shortest Path Routing

4 Flooding, Distance Vector Routing,5 Link State Routing6 Hierarchical Routing, Broadcast Routing,

7 Multicast Routing Routing for Mobile Hosts, Routing in Ad Hoc Networks,

8 Node Lookup in Peer-to-Peer Networks.

9 Congestion Control Algorithms : General Principles of Congestion Control

Unit-41 The Transport Service: Services Provided to the Upper

Layers. Transport Service Primitives.

2 Berkeley Sockets, An Example of Socket Programming: An Internet File Server.

3 Elements Of Transport Protocols : Addressing4 Connection Establishment

5 Connection Release, Flow Control and Buffering, Multiplexing, Crash Recovery

6A Simple Transport Protocol : The Example Service Primitives, The Example Transport Entity, The Example as a Finite State Machine

7 The Internet Transport Protocols: Introduction to TCP, The TCP Service Model

8The TCP Protocol, The TCP Segment Header, TCP Connection Establishment

Unit-51 Cryptography : Introduction to Cryptography

2 Substitution Ciphers, Transposition Ciphers,,

8

Page 9: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

3 One-Time Pads, Two Fundamental Cryptographic Principles

4 Symmetric-Key Algorithms : DES-The Data Encryption Standard

5 AES-The Advanced Encryption Standard,

6 Cipher Modes, Other Ciphers, Cryptanalysis

7 Public-Key Algorithms : RSA., Other Public-Key Algorithms

8Digital Signatures: Symmetric-Key Signatures, Public-Key Signatures, Message Digests, The Birthday Attack.

Date of Unit Completion & Remarks

Unit – 1

Date : __ / __ / __

Remarks:________________________________________________________________________

Unit – 2

Date : __ / __ / __

Remarks:

________________________________________________________________________

Unit – 3

Date : __ / __ / __

Remarks:

________________________________________________________________________

Unit – 4

Date : __ / __ / __

9

Page 10: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Remarks:

________________________________________________________________________

Unit – 5

Date : __ / __ / __

Remarks:

________________________________________________________________________

Unit Wise Assignments (With different Levels of thinking (Blooms Taxonomy))Note: For every question please mention the level of Blooms taxonomy

Unit – 1

1. Go to IETF’s Web site, www.ietf.org, to see what they are doing. Pick a project youlike and write a half-page report on the problem and the proposed solution. L3

2. A connection oriented connection provides better quality of service. Justify the statement. L3

3.The Internet is made up of a large number of networks. Their arrangement determinesthe topology of the Internet. A considerable amount of information about the Internettopology is available on line. Use a search engine to find out more about the Internettopology and write a short report summarizing your findings. L3

4. A client-server system uses a satellite network, with the satellite at a height of 40,000km. What is the best-case delay in response to a request? L3

5 Compare and contrast the sliding window protocol, go back-N protocol. Why selective repeat is better than the go back - N protocol. L4

Unit – 2

1.

Consider five wireless stations, A, B, C, D, and E. Station A can communicate with allother stations. B can communicate with A, C and E. C can communicate with A, B andD. D can communicate with A, C and E. E can communicate A, D and B.(a) When A is sending to B, what other communications are possible?(b) When B is sending to A, what other communications are possible?(c) When B is sending to C, what other communications are possible?L3

2.

Two CSMA/CD stations are each trying to transmit long (multiframe) files. After each frame is sent, they contend for the channel, using the binary exponential backoffalgorithm. What is the probability that the contention ends on round k, and what is themean number of rounds per contention period?L3

10

Page 11: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

3. Give two reasons why networks might use an error-correcting code instead of error. L3

4.Distinguish different types of cabling supported by Ethernet standard? Why do you require a limit on the minimum size of Ethernet frame? L4

5 An 802.16 network has a channel width of 20 MHz. How many bits/sec can be sent toa subscriber station? L3

Unit – 3

1. Assuming that all routers and hosts are working properly and that all software in bothis free of all errors, is there any chance, however small, that a packet will be deliveredto the wrong destination? L3

2.

A router has the following (CIDR) entries in its routing table:Address/mask Next hop135.46.56.0/22 Interface 0135.46.60.0/22 Interface 1192.53.40.0/23 Router 1default Router 2For each of the following IP addresses, what does the router do if a packet with that address arrives?(a) 135.46.63.10(b) 135.46.57.14(c) 135.46.52.2(d) 192.53.40.7(e) 192.53.56.7

3. An IP datagram using the Strict source routing option has to be fragmented. Do youthink the option is copied into each fragment, or is it sufficient to just put it in the firstfragment? Explain your answer. L3

4. Convert the IP address whose hexadecimal representation is C22F1582 to dotteddecimal notation. L3

Unit – 4

1.Datagram fragmentation and reassembly are handled by IP and are invisible to TCP.Does this mean that TCP does not have to worry about data arriving in the wrongorder?. L3

2.Both UDP and TCP use port numbers to identify the destination entity when deliveringa message. Give two reasons why these protocols invented a new abstract ID (portnumbers), instead of using process IDs, which already existed when these protocolswere designed. L3

3. Compare and contrast between Wireless TCP and UDP. L3

4.Consider the effect of using slow start on a line with a 10-msec round-trip time and no congestion. The receive window is 24 KB and the maximum segment size is 2 KB. How long does it take before the first full window can be sent? L3

Unit – 5

1.Differentiate between block ciphers with transposition cipher. How does DNS perform name resolution? Explain with example . L2

11

Page 12: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

2.Generate the public key and secret key for the following prime numbers using RSA algorithm: P=3, Q=11, and take E=5.And Discuss the DNS message format for query and reply messages . L3

3.

Break the following mono alphabetic substitution cipher. The plaintext, consisting of letters only, is an excerpt from a poem by Lewis Carroll.mvyy bek mnyx n yvjjyr snijrh invq n muvjvdt je n idnvyjurhri n fehfevir pyeir oruvdq ki ndq uri jhrnqvdt ed zb jnvyIrr uem rntrhyb jur yeoijrhi ndq jur jkhjyri nyy nqlndprJurb nhr mnvjvdt ed jur iuvdtyr mvyy bek pezr ndq wevd jur qndprmvyy bek, medj bek, mvyy bek, medj bek, mvyy bek wevd jur qndprmvyy bek, medj bek, mvyy bek, medj bek, medj bek wevd jur qnd L3

4.Design an attack on DES based on the knowledge that the plaintext consists exclusively of uppercase ASCII letters, plus space, comma, period, semicolon, carriage return, and line feed. Nothing is known about the plaintext parity bits. L3

Unit Wise Case Studies (With different Levels of thinking (Blooms Taxonomy))Note: For every Case Study please mention the level of Blooms taxonomy

Case Studies (With Higher Levels of thinking (Blooms Taxonomy))Note: For every Case Study please mention the level of Blooms taxonomy

1(Covering Syllabus Up to Mid-1)

Most IP datagram reassembly algorithms have a timer to avoid having a lost fragment tie up reassembly buffers forever. Suppose that a datagram is fragmented into four fragments. The first three fragments arrive, but the last one is delayed. Eventually, the timer goes off and the three fragments in the receiver’s memory are discarded. Al ittle later, the last fragment stumbles in. What should be done with it?

2(Covering Entire Syllabus)

Alice was a heavy user of a type 1 anonymous remailer. She would post many messages to her favorite newsgroup, alt.fanclub.alice, and everyone would know they all came from Alice because they all bore the same pseudonym. Assuming that the remailer worked correctly, Trudy could not impersonate Alice. After type 1 remailers were all shut down, Alice switched to a cypherpunk remailer and started a new thread in her newsgroup. Devise a way for her to prevent Trudy from posting new messages to the newsgroup, impersonating Alice.

Unit Wise Important Questions (With different Levels of thinking (Blooms Taxonomy))Note: For every question please mention the level of Blooms taxonomy

12

Page 13: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Unit – 1

1. Discuss the ISO - OSI layered model, bringing out the functionalities of each layer

2. Draw a CRC encoder and decoder for CRC code with C (7, 4). Also explain how this CRC design works, with an example

3.Differentiate between OSI reference model and TCP/IP model with neat diagrams.

4. Explain in detail Sliding window protocol

Unit – 2

1.Consider a 100 Mb/s version of Ethernet using CSMA/CD. If the maximum separation between two nodes is 5 km, how efficient is the network if all packets have the minimum length? What if they have the maximum length?

2. a) Discuss in brief MAC frame structure for IEEE 802.3 ? b) Explain the following CSMA schemes

3.a) Describe the stop and wait flow control technique. Explain the term sliding window. Also illustrate and explain the operation of selective repeat.

4. a) An ALOHA network user 19.2 kbps channel for sending message packets of 100 bit long size. Calculate the maximum throughput for pure ALOHA network

5

Two neighboring nodes A and B use sliding window protocol with 3-bit sequence number. As the ARQ mechanism Go Back N is used with window size of 4. Assume A is transmitting and B is receiving , show window position for the following events: i) before A send any frame ii) After A send frame 0, 1, 2 and receive ACK from B for 0 and 1.

a) Discuss in brief MAC frame structure for IEEE 802.3? Explain the followi g CSMA schemes : (i)Non-persistet (ii) 1-ersisten t (iii)p-persistent

Unit – 3

1. Which of the following IP addresses are “matched” by the address prefix

123.234.99.10/20?123.235.31.10 123.234.95.23 123.234.102.10 123.456.140.10

2. Explain in detail the ATM cell format.

3. Explain Distance Vector routing in detail.

13

Page 14: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

4. Differentiate ARP And RARP

Unit – 4

1. With neat architecture, explain UDP in detail.

2. Explain TCP Congestion control techniques in detail.

3. Explain how QoS is provided through Differentiated Services.

4. Explain the Congestion Avoidance techniques in detail.

Unit – 5

1.a) Generate the public key and secret key for the following prime numbers using RSA algorithm: P=3, Q=11, and take E=5. b)Discuss the DNS message format for query and reply messages. L3

2.a) Explain the message authentication operation used in RSA technique.b) If a DNS domain name is XXX.YYY.edu, how many labels are involved in here? What is the lowest level domain and what is the highest level domain in this example? Explain. L2

3. a) Differentiate between block ciphers with transposition cipher.b) How does DNS perform name resolution? Explain with example. L3

4.a) What is Electronic mail? Explain the two scenarios of architecture of E-Mail. b)What is a name server? List and explain the characteristic features of various name servers.

Unit Wise Multiple Choice Questions

Unit – I1. Routers operate at which layer of the OSI Model?

A) Physical  B) Network C) Transport D) MAC sublayer of the Data Link layer2. Bits are packaged into frames at what layer of the OSI Model?

A) Data Link  B) Physical C) Transport D) Application E) Presentation3. Which of the following are benifits of using a layered network model?

A) It facilitates troubleshootingB) It breaks the comples process of netorking into more managable chuncksC) It allows layers developed by different vendors to interoperate.D) All of the above

4. The layer of the OSI Model, from the top down are:A) Application, Presentation, Session, Transport, Network, Data Link, Physical

14

Page 15: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

B) Physical, Data Link,Network, Transport, Session, Presentation, ApplicationC) Session, Presentation, Data Transport, MAC, Network, PhysicalD) Application, Encryption, Network, Transport, Logical Link Control, Physical

5. Which of the following operates at the Presentation layer?A) FTP & HTTP B) UDP C) SMTP D) MIDI & JPEG E) All of the above

6. Which of the following are Transport layer protocols?A) TCP & UDP B) CISC C) ATMD) HTTP & FTP

7. Which of the following are considered to be the upper layer protocols?A) Presentation & Session B) Application, Presentation, & SessionC) Application & Presentation D) ApplicationE) Application, Presentation, Session, & Transport

8. Flow control takes place at what layer?A) Physical B) Transport C) Network D) Application E) Data Link

9. Encryption takes place at which layer?A) Physical  B) ApplicationC) Presentation D) Data Link E) Session10. The Network layer uses physical addresses to route the data to destination hosts.

A) True B) Who KnowsC) False False B/C its the logical address

11. Error detection & recovery takes place at what layer?A) Transport B) Data Link C) Presentation D) ApplicationE) Network

12. What layer establishes, maintains, & termenates communitions between applications located on different devices?A) Application B) Transport C) Session D) Data Link E) Network

13. IP is implemented at which OSI Model layer?A) Transport B) Data Link C) Network D) Session E) Presentation

14. Which layer handles the formatting of application data so that it will be readable by the destination system?A) Application B) Transport C) Presentation D) Data Link E) Network

15. Packets are found at which layer of the OSI Model?A) Data Link  B) Network C) Transport D) Session E) Presentation

16. Which layer translates between the physical (MAC) & logical address?A) Network B) Transport C) Data Link D) Application E) Presentation

17. What does OSI stand for?A) Organization Standards International B) Operating Standard Information

15

Page 16: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

C) Open Systems Interconnect D) Open System InterfaceE) Operatin System Interconnection

18. Repeaters & hubs operate at whaich layer?A) Network B) Transport C) Physical D) Presentation E) Data Link

19. Bit synchronization is handled at which layer of the OSI Model?A) Physical  B) Network C) Session D) Presentation E) Data Link20. Most logical addresses are present in network interface cards at the factory?

A) True B) No one knows C) False False B/C its the physical address

21. Bridges operate at which layer of the OSI Model?A) Physical  B) Network C) Data Link D) Presentation E) Transport

22. What are the sublayers of the Data Link layer?A) MAC & IPX B) MAC & LLC C) hardware & frame D) Mac address E) WAN & LAN

23. Which layer translates between physical & logical addresses?A) the MAC sublayer of the Data Link layer B) PhysicalC) Transport D) Presentation E) Network

24. Which layer is responsible for packet sequencing, acknowledgements, & requests for retransmission?A) Network B) Transport C) Session D) Presentation E) Data Link

25. The physical layer concerns with a) bit-by-bit delivery b) process to process delivery c) application to application delivery d) none of the mentioned

26. Which transmission media has the highest transmission speed in a network? a) coaxial cable b) twisted pair cable c) optical fiber d) electrical cable

27. Bits can be send over guided and unguided media as analog signal by a) digital modulation b) amplitude modulation c) frequency modulation d) phase modulation

28. The portion of physical layer that interfaces with the media access control sublayer is called a) physical signaling sublayer b) physical data sublayer c) physical address sublayer d) none of the mentioned

29. In asynchronous serial communication the physical layer provides a) start and stop signaling b) flow control c) both (a) and (b) d) none of the mentioned

30. The physical layer is responsible for a) line coding b) channel coding c) modulation d) all of the mentioned

Unit – II

16

Page 17: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

1. The data link layer takes the packets from _____ and encapsulates them into frames for transmission.a) network layer b) physical layer c) transport layer d) application layer

2. Which one of the following task is not done by data link layer? a) framing b) error control c) flow control d) channel coding3. Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a) logical link control sublayer b) media access control sublayer c) network interface control sublayer d) none 4. Header of a frame generally contains a) synchronization bytes b) addresses c) frame identifier d) all of the mentioned5. Automatic repeat request error management mechanism is provided by a) logical link control sublayer b) media access control sublayer c) network interface control sublayer d) none of the mentioned6. When 2 or more bits in a data unit has been changed during the transmission, the error is called a) random error b) burst error c) inverted error d) none of the mentioned7. CRC stands for a) cyclic redundancy check b) code repeat check c) code redundancy check d) cyclic repeat check8. Which one of the following is a data link protocol? a) ethernet b) point to point protocol c) HDLC d) all of the mentioned9. Which one of the following is the multiple access protocol for channel access control? a) CSMA/CD b) CSMA/CA c) both (a) and (b) d) none of the mentioned

10. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called a) piggybacking b) cyclic redundancy check c) fletcher’s checksum d) none of the mentioned

Unit – III1. The network layer concerns with a) bits b) frames c) packets d) none of the mentioned2. Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) none 3. The 4 byte IP address consists of a) network address b) host address c) both (a) and (b) d) none

17

Page 18: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

4. In virtual circuit network each packet contains a) full source and destination address b) a short VC number c) both (a) and (b) d) none 5. Which one of the following routing algorithm can be used for network layer design? a) shortest path algorithm b) distance vector routing c) link state routing d) all of the mentioned6. Multidestination routing a) is same as broadcast routing b) contains the list of all destinations c) data is not sent by packets d) none 7. A subset of a network that includes all the routers but contains no loops is called a) spanning tree b) spider structure c) spider tree d) none 8. Which one of the following algorithm is not used for congestion control? a) traffic aware routing b) admission control c) load shedding d) none 9. The network layer protocol of internet is a) Ethernet b) internet protocol c) hypertext transfer protocol d) none 10. ICMP is primarily used for a) error and diagnostic functions b) addressing c) forwarding d) none

Unit – IV1.  Transport layer aggregates data from different applications into a single stream

before passing it toa) network layer b) data link layer c) application layer d) physical layer

2. Which one of the following is a transport layer protocol used in internet?a) TCP b) UDP c) both (a) and (b) d) none of the mentioned

3. 3. User datagram protocol is called connectionless becausea) all UDP packets are treated independently by transport layerb) it sends data as a stream of related packetsc) both (a) and (b)d) none of the mentioned

4. 4. Transmission control protocol isa) connection oriented protocolb) uses a three way handshake to establish a connectionc) recievs data from application as a single streamd) all of the mentioned

18

Page 19: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

5. An endpoint of an inter-process communication flow across a computer network is calleda) socket b) pipe c) port d) none of the mentioned

6.  Socket-style API for windows is calleda) wsock b) winsock c) wins d) none of the mentioned

7. Which one of the following is a version of UDP with congestion control?a) datagram congestion control protocolb) stream control transmission protocolc) structured stream transportd) none of the mentioned

8. A _____ is a TCP name for a transport service access point.a) port b) pipe c) node d) none of the mentioned

9. Transport layer protocols deals witha) application to application communicationb) process to process communicationc) node to node communicationd) none of the mentioned

10. Which one of the following is a transport layer protocol?a) stream control transmission protocolb) internet control message protocolc) neighbor discovery protocold) dynamic host configuration protocol

Unit – V1. In cryptography, what is cipher?

a) algorithm for performing encryption and decryptionb) encrypted messagec) both (a) and (b)d) none of the mentioned

2. In asymmetric key cryptography, the private key is kept bya) sender b) receiver c) sender and receiver d) all the connected devices to the network

3. Which one of the following algorithm is not used in asymmetric-key cryptography?a) RSA algorithm b) diffie-hellman algorithm c) electronic code book algorithmd) none of the mentioned

19

Page 20: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

4. In cryptography, the order of the letters in a message is rearranged bya) transpositional ciphers b) substitution ciphersc) both (a) and (b) d) none of the mentioned

5. What is data encryption standard (DES)?a) block cipher b) stream cipher c) bit cipher d) none of the mentioned

6. Cryptanalysis is useda) to find some insecurity in a cryptographic schemeb) to increase the speedc) to encrypt the datad) none

7. Which one of the following is a cryptographic protocol used to secure HTTP connection?a) stream control transmission protocol (SCTP)b) transport layer security (TSL)c) explicit congestion notification (ECN)d) resource reservation protocol

8. Voice privacy in GSM cellular telephone protocol is provided bya) A5/2 cipher b) b5/4 cipher c) b5/6 cipher d) b5/8 cipher

9. ElGamal encryption system isa) symmetric key encryption algorithmb) asymmetric key encryption algorithmc) not an encryption algorithmd) none

10. Cryptographic hash function takes an arbitrary block of data and returnsa) fixed size bit stringb) variable size bit stringc) both (a) and (b)d) none

University Question Papers

****Should be attached

Tutorial Sheet

20

Page 21: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Date: Topics Revised:

Date: Topics Revised:

Date: Topics Revised:

Date: Topics Revised:

Date: Topics Revised:

TOPICS DISCUSSED BEYOND THE SYLLABUS

S.No. Topic

1

2

3.

4.

5.

6.

ASSESMENT OF LEARNING OBJECTIVES AND OUT COMES: DIRECT

21

Page 22: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Blooms Taxonomy:LEVEL 1 REMEMBERING Exhibit memory of previously learned

material by recalling facts, terms, basic concepts, and answers

LEVEL 2 UNDERSTANDING Demonstrate understanding of facts and ideas by organizing, comparing, translating, interpreting, giving descriptions, and stating main ideas.

LEVEL 3 APPLYING Solve problems to new situations by applying acquired knowledge, facts, techniques and rules in a different way

LEVEL 4 ANALYZING Examine and break information into parts by identifying motives or causes. Make inferences and find evidence to support generalizations.

LEVEL 5 EVALUATING Present and defend opinions by making judgments about information, validity of ideas, or quality of work based on a set of criteria.

LEVEL 6 CREATING Compile information together in a different way by combining elements in a new pattern or proposing alternative solutions.

*Attach course assessment sheet

ASSESMENT OF COURSE OUTCOMES: INDIRECTSNo Criteria LEVEL(Level 5:Excellent Level 4:Very Good Level 3:Good Level 2:Satisfactory Level 1:Poor)

1

Ora

l Co

mm

unic

atio

n

5 Student speaks in phase with the given topic confidently using Audio-Visual aids. Vocabulary is exceptional4 Student speaking with proper planning, fair usage of Audio-Visual aids. Vocabulary is good3 Student speaking without proper planning, fair usage of Audio-Visual aids. Vocabulary is not good2 Student speaks in phase but no synchronization among the talk and Visual Aids.1 Student speaks vaguely not in phase with the given topic.

2

Wri

ting

Ski

lls

5 Proper structuring of the document with relevant subtitles, readability of document is high with correct use of grammar. Work is genuine and not published anywhere else.

4 Information gathered is relevant to the given task. Sentences were framed properly with correct use of grammar.

3 Information gathered is relevant to the given task. sentences were framed properly with inappropriate use of grammar

2 Information is gathered without continuity of topic, sentences were not framed properly. Few topics are copied from other documents

1 Information gathered was not relevant to the given task. Content is copied from other documents

3

Soci

al a

nd

Ethi

cal

Awar

enes

s

5 Student identifies most potential ethical or societal issues and provides solutions for them discussing with peers

4 Student identifies most potential ethical or societal issues and provides partial solutions for them discussing with peers

3 Student identifies the societal and ethical issues but tries to provide solutions for them discussing with peers

2 Student identifies the societal and ethical issues but fails to provide any solutions discussing with peers1 Student makes no attempt in identifying the societal and ethical issues

4

Cont

ent

Know

led

ge

5 Student uses appropriate methods, techniques to model and solve the problem accurately4 Student uses appropriate methods, techniques to model and solve the problem partially.3 Student uses appropriate methods to model the problem but attempts to solve the problem2 Student tries to model the problem and fails to solve the problem

22

Page 23: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

1 Student fails to model the problem and also fails to solve the problem

5

Stud

ent

Part

icip

atio

n5 Listens carefully to the class and answer the questions confidently4 Listens carefully to the class and tries to answer questions confidently.3 Listens carefully to the lecture and attempts to answer the questions2 Student listens to the class but doesn’t attempts to answer the questions1 Student neither listens to the class nor attempts to answer the questions

6

Tech

nica

l and

an

alyt

ical

Ski

lls

5 The program structure is well organized with appropriate use of technologies and methodology. Code is easy to read and well documented. Student is able to implement the algorithm producing accurate results

4 Program structure is well organized with appropriate use of technologies and methodology. Code is easy to read and not properly documented. Student is able to implement the algorithm providing accurate results.

3Program structure is well organized with appropriate use of technologies and methodology. Code is quite difficult to read and not properly documented. Student is able to implement the algorithm providing accurate results.

2 Program structure is well organized with usage of appropriate technologies and methodology. Code is difficult to read and not documented properly and not able to execute the program

1 Program structure is not well organized with mistakes in usage of appropriate technologies and methodology. Code is difficult to read and student is not able to execute the program

7

Prac

tica

l Kn

owle

dge

5 Independently able to write programs for any given context to strengthen the concepts covered in theory4 Independently able to write programs to strengthen the concepts covered in theory3 Independently able to write programs and able to strengthen the concepts learned in theory2 Not able to write programs but able to strengthen the concepts learned in theory.1 Not able to write programs and not able to strengthen the concepts learned in theory

8

Und

erst

andi

ng

of E

ngin

eeri

ng

core

5 Student uses appropriate methods, techniques to model and solve the problem accurately in the context of multidisciplinary projects

4 Student tries to model the problem and solve the problem in the context of multidisciplinary projects3 Student tries to model the problem and attempts to solve the problem in the context

of multidisciplinary projects.

2 Student tries to model the problem but fails to solve the problem in the context of multidisciplinary projects.

1 Student fails to model the problem and also fails to solve the problem in the context of multidisciplinary projects

*Attach course assessment sheet

Add-on Programmes:1

2

3

4

Guest Lectures:

1.2.3.4.

23

Page 24: Department of Computer Science Engineeringanurag.edu.in/wp-content/uploads/CN-Course-file.doc · Web viewThe OSI Reference Model, The TCP/IP Reference Model, A Comparison of the OSI

Unit Wise PPT’s:

Unit Wise lecture Notes:

24