University Institute of Engineering
DEPARTMENT OF COMPUTER SCIENCE
& ENGINEERING
Bachelor of Engineering (Computer Science & Engineering)
Subject Name:Computer Network
Subject Code: 21CSH-256/21ITH-256
DISCOVER . LEARN . EMPOWER
Syllabus
UNIT-I
Introduction: Introduction to network, types of transmission technologies, Network Categories: LAN, MAN, WAN (Wireless /Wired),
Network Software: Concept of Layers, Protocols, interfaces and services. Reference Models: OSI, TCP/IP and comparison, Concept of
Topologies.
Physical Layer: Bit rate, Baud rate, Bandwidth, Transmission Impairments: Attenuation, Distortion, Noise; Data rate limits: Nyquist
formula, Shannon Formula, Modulation & modems; Transmission Modes, Multiplexing: Frequency Division, Time Division, Wavelength
Division; Transmission Media: Twisted pair, coaxial, fiber optics, Wireless Transmission (radio, microwave & infrared);Message
switching, Circuit Switching & Packet Switching.
UNIT-II
Data Link Layer: Design issues, Error Detection & Correction; Flow control & Error Control; Sliding Window Protocols, ARQ: Stop &
Wait , Go Back n, Selective Repeat ; Examples of DLL protocols – HDLC, PPP; Medium Access Sub layer: Channel Allocation; Random
Access: ALOHA, CSMA protocols; Controlled Access: Polling, Reservation, Token Passing; Examples of IEEE
standards(802.2,802.3,802.4, 802.5), Basics of Wi-Fi(802.11).Network Layer: Design issues, Logical Addressing: IPv4 & IPv6; Packet
Formats & their comparison IPv4 & IPv6; Routing Algorithms: Distance Vector, Link State
UNIT-III
Network Layer(Continue): Congestion Control: Principles of congestion control; Congestion prevention policies, Leaky bucket & Token
Bucket Algorithms.
Transport Layer: Services provided to upper layers, Elements of Transport protocols. Addressing, Flow Control & buffering; Example
Transport protocols: TCP, SCTCP & UDP.
Application Layer and Network Security: Domain Name System, Simple Network Management Protocol, Electronic Mail, World Wide
Web, Basics of authentication, Public and Private Key Cryptography, Digital Signatures and Certificates, Firewalls.
CONTROLLED ACCESS
In controlled access, the stations consult one another to find which
station has the right to send. A station cannot send unless it has been
authorized by other stations. We discuss three popular controlled-access
methods.
Topics discussed in this section:
Reservation
Polling
Token Passing
Reservation access method
Select and poll functions in polling access method
Logical ring and physical topology in token-passing access method
References
• https://www.tutorialspoint.com/multiple-access-protocols-in-comput
er-networks
• https://www.studytonight.com/post/random-access-protocols-aloha-
csma-csmaca-and-csmacd
• http://highered.mheducation.com/sites/0072967757/student_view0/
chapter12/powerpoint_slides.html
• Data Communications and Networking Book by Behrouz A. Forouzan