0% found this document useful (0 votes)
43 views8 pages

Computer Networks Syllabus Guide

This document contains the syllabus for a Computer Network subject taught as part of a Bachelor of Engineering degree in Computer Science and Engineering. It outlines the topics that will be covered across three units. Unit I introduces networking concepts like transmission technologies, network models, topologies and transmission media. It also covers physical layer topics. Unit II focuses on data link layer protocols and medium access control. Unit III discusses network layer routing, transport layer protocols, and application layer and network security topics. The document provides an overview of the key areas and concepts students will learn as part of this subject on computer networks.

Uploaded by

Aarush Kashyap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views8 pages

Computer Networks Syllabus Guide

This document contains the syllabus for a Computer Network subject taught as part of a Bachelor of Engineering degree in Computer Science and Engineering. It outlines the topics that will be covered across three units. Unit I introduces networking concepts like transmission technologies, network models, topologies and transmission media. It also covers physical layer topics. Unit II focuses on data link layer protocols and medium access control. Unit III discusses network layer routing, transport layer protocols, and application layer and network security topics. The document provides an overview of the key areas and concepts students will learn as part of this subject on computer networks.

Uploaded by

Aarush Kashyap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

University Institute of Engineering

DEPARTMENT OF COMPUTER SCIENCE


& ENGINEERING
Bachelor of Engineering (Computer Science & Engineering)
Subject Name:Computer Network
Subject Code: 21CSH-256/21ITH-256

DISCOVER . LEARN . EMPOWER


Syllabus
UNIT-I
Introduction: Introduction to network, types of transmission technologies, Network Categories: LAN, MAN, WAN (Wireless /Wired),
Network Software: Concept of Layers, Protocols, interfaces and services. Reference Models: OSI, TCP/IP and comparison, Concept of
Topologies.
Physical Layer: Bit rate, Baud rate, Bandwidth, Transmission Impairments: Attenuation, Distortion, Noise; Data rate limits: Nyquist
formula, Shannon Formula, Modulation & modems; Transmission Modes, Multiplexing: Frequency Division, Time Division, Wavelength
Division; Transmission Media: Twisted pair, coaxial, fiber optics, Wireless Transmission (radio, microwave & infrared);Message
switching, Circuit Switching & Packet Switching.
UNIT-II
Data Link Layer: Design issues, Error Detection & Correction; Flow control & Error Control; Sliding Window Protocols, ARQ: Stop &
Wait , Go Back n, Selective Repeat ; Examples of DLL protocols – HDLC, PPP; Medium Access Sub layer: Channel Allocation; Random
Access: ALOHA, CSMA protocols; Controlled Access: Polling, Reservation, Token Passing; Examples of IEEE
standards(802.2,802.3,802.4, 802.5), Basics of Wi-Fi(802.11).Network Layer: Design issues, Logical Addressing: IPv4 & IPv6; Packet
Formats & their comparison IPv4 & IPv6; Routing Algorithms: Distance Vector, Link State
UNIT-III
Network Layer(Continue): Congestion Control: Principles of congestion control; Congestion prevention policies, Leaky bucket & Token
Bucket Algorithms.
Transport Layer: Services provided to upper layers, Elements of Transport protocols. Addressing, Flow Control & buffering; Example
Transport protocols: TCP, SCTCP & UDP.
Application Layer and Network Security: Domain Name System, Simple Network Management Protocol, Electronic Mail, World Wide
Web, Basics of authentication, Public and Private Key Cryptography, Digital Signatures and Certificates, Firewalls.
CONTROLLED ACCESS

In controlled access, the stations consult one another to find which


station has the right to send. A station cannot send unless it has been
authorized by other stations. We discuss three popular controlled-access
methods.

Topics discussed in this section:


Reservation
Polling
Token Passing
Reservation access method
Select and poll functions in polling access method
Logical ring and physical topology in token-passing access method
References
• https://www.tutorialspoint.com/multiple-access-protocols-in-comput
er-networks
• https://www.studytonight.com/post/random-access-protocols-aloha-
csma-csmaca-and-csmacd
• http://highered.mheducation.com/sites/0072967757/student_view0/
chapter12/powerpoint_slides.html
• Data Communications and Networking Book by Behrouz A. Forouzan

You might also like