130 61 - Computer Networks
Total Page:16
File Type:pdf, Size:1020Kb
ALAGAPPA UNIVERSITY (Accredited with ‘A+’ Grade by NAAC (with CGPA: 3.64) in the Third Cycle and Graded as category - I University by MHRD-UGC) (A State University Established by the Government of Tamilnadu) KARAIKUDI – 630 003 DIRECTORATE OF DISTANCE EDUCATION B.Sc (COMPUTER SCIENCE) 130 61 - COMPUTER NETWORKS Copy Right Reserved For Private Use only SYLLABUS - BOOK MAPPING TABLE COMPUTER NETWORKS UNIT SYLLABUS MAPPING IN BOOK BLOCK 1 : INTRODUCTION & PHYSICALLAYER 1 Introduction: Computer Networks - Applications - Pages 1 - 17 Line configuration - Topology - Transmission Modes 2 Categories of Network: LAN, MAN, WAN - OSI Pages 18 - 27 Layer. 3 Physical Layer:Analog and Digital Signals Pages 28 - 43 Performance - Transmission Media BLOCK 2 : DATA LINK LAYER 4 Data Link Layer: Error Detection and Correction – Pages 44 – 54 Introduction – Block Coding – Cyclic Redundancy Check – Framing – Flow and Error Control. 5 Data Link Layer Protocols:Stop - Wait Protocol and Pages 55 – 68 Sliding Window Protocol - ARQ, Go-Back-N ARQ, Selective, and Repeat ARQ. 6 Multiple Access Protocols: ALOHA – CSMA – Pages 69 – 82 CSMA/CD – CSMA/CA. BLOCK 3 : NETWORK LAYER 7 Introduction: Circuit Switching - Packet Switching - Pages 83 – 96 Message Switching - Virtual Circuit and Datagram Subnets 8 Routing Algorithm:Static Routing -Shortest Path Pages 97 – 116 Routing, Flooding, Flow Based Routing - Dynamic Routing - Distance Vector Routing, Link State Routing 9 Other Routing Algorithms: Hierarchical routing, Pages 117-127 Broad cast, Multicast Routing - Congestion Control Algorithms BLOCK 4 : TRANSPORT LAYER 10 Introduction: Process-to-Process Delivery - UDP - Pages 128 – 142 TCP-Connection Oriented VsConnectionless Services. 11 Applications and Services: Domain Name System - Pages 143 – 159 Remote Logon – Mail Exchange - File Transfer i 12 Remote Procedure Call - Remote File Access – Pages 160 - 177 WWW and HTTP – SNMP. BLOCK 5 : NETWORK SECURITY 13 Introduction:Cryptography – Encryption Model – Pages 178 – 188 Transposition and Substitution Chipers – Cryptographic principles 14 Symmetric Key Cryptography: DES – AES – Pages 189 – 206 Asymmetric Key Cryptography: RSA – Security Services. ii CONTENTS BLOCK 1 : INTRODUCTION & PHYSICAL LAYER 1 –17 UNIT 1 INTRODUCTION 1.0 Introduction 1.1 Objectives 1.2 Computer Networks 1.2.1 Goals of Computer Networks: 1.2.2 Components of Computer Networks 1.3 Applications of Computer Networks 1.4 Line Configuration 1.5 Topology 1.6 Transmission Modes 1.7 Check Your Progress Questions 1.8 Answers to Check Your Progress Questions 1.9 Summary 1.10 Key Words 1.11 Self Assessment Questions and Exercises 1.12 Further Readings UNIT-2. CATEGORIES OF NETWORK 18-27 2.0 Introduction 2.1 Objectives 2.2 Personal Area Network (PAN) 2.3 Local Area Network (LAN) 2.4 Metropolitan Area Network (MAN) 2.5 Wide Area Network (WAN) 2.6 Internetwork 2.7 OSI Layer 2.7.1 The Seven Layers of OSI Model 2.7.2 Working Method of OSI Model 2.8 Check Your Progress Questions 2.9 Answers to Check Your Progress Questions 2.10 Summary 2.11 Key Words 2.12 Self Assessment Questions and Exercises 2.13 Further Readings UNIT-3 PHYSICAL LAYER 28-43 3.0 Introduction 3.1 Objectives iii 3.2 Analog and Digital Signals Performance 3.2.1 Analog and Digital Transmission 3.2.2 Asynchronous and Synchronous Transmission 3.3 Transmission Media 3.3.1 Guided Transmission Media 3.3.2 Unguided Transmission Media 3.4 Check Your Progress Questions 3.5 Answers to Check Your Progress Questions 3.6 Summary 3.7 Key Words 3.8 Self Assessment Questions and Exercises 3.9 Further Readings BLOCK 2: DATA LINK LAYER UNIT 4: DATA LINK LAYER 44-54 4.0 Introduction 4.1 Objectives 4.2 Introduction to Data Link Layer 4.2.1 Functions of Data Link Layer 4.2.2 Design Issues with Data Link Layer 4.3 Error Detection and correction 4.4 Block Coding 4.5 Cyclic Redundancy Check 4.6 Framing 4.7 Flow and Error Control 4.8 Check Your Progress Questions 4.9 Answers to Check Your Progress Questions 4.10 Summary 4.11 Key Words 4.12 Self Assessment Questions and Exercises 4.13 Further Readings UNIT-5 DATA LINK LAYER PROTOCOLS 55-68 5.0 Introduction 5.1 Objectives 5.2 Introduction to Data Link Layer Protocols 5.3 Stop-and-Wait Protocol 5.4 Sliding Window Protocols 5.4.1 Automatic Repeat request(ARQ) Protocols 5.4.2 Stop-and-Wait ARQ Protocol 5.4.3 Go-Back-n ARQ Protocol 5.4.4 Selective Repeat ARQ Protocol 5.5 Check Your Progress Questions 5.6 Answers to Check Your Progress Questions 5.7 Summary iv 5.8 Key Words 5.9 Self Assessment Questions and Exercises 5.10 Further Readings. UNIT-6 MULTIPLE ACCESS PROTOCOLS 69-82 6.0 Introduction 6.1 Objectives 6.2 Introduction to Multiple Access Protocols 6.3 ALOHA 6.3.1 Pure ALOHA 6.3.2 Slotted ALOHA 6.4 Carrier Sense Multiple Access (CSMA) 6.5 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 6.6 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) 6.7 Check Your Progress Questions 6.8 Answers to Check Your Progress Questions 6.9 Summary 6.10 Key Words 6.11 Self Assessment Questions and Exercises 6.12 Further Readings BLOCK3: NETWORK LAYER UNIT-7- SWITCHING TECHNIQUES 83-96 7.0 Introduction 7.1 Objectives 7.2 Introduction to Network Layer 7.2.1 Design Issues with Network Layer 7.2.2 Switching Techniques 7.3 Circuit Switching 7.4 Packet Switching 7.5 Message Switching 7.6 Virtual Circuit and Datagram Subnets 7.7 Check Your Progress Questions 7.8 Answers to Check Your Progress Questions 7.9 Summary 7.10 Key Words 7.11 Self Assessment Questions and Exercises 7.12 Further Readings UNIT-8 ROUTING ALGORITHM 97-116 8.0 Introduction 8.1 Objectives 8.2 Introduction to Routing algorithm 8.2.1 Optimality Principle 8.3 Static routing v 8.4 Shortest Path Routing 8.5 Flooding 8.6 Flow Based Routing 8.7 Dynamic Routing 8.8 Distance Vector Routing 8.9 Link State Routing 8.10 Check Your Progress Questions 8.11 Answers to Check Your Progress Questions 8.12 Summary 8.13 Key Words 8.14 Self Assessment Questions and Exercises 8.15 Further Readings UNIT-9 OTHER ROUTING ALGORITHMS 117-127 9.0 Introduction 9.1 Objectives 9.2 Hierarchical Routing 9.3 Broadcast Routing 9.4 Multicast Routing 9.5 Congestion Control Algorithms 9.6 Check Your Progress Questions 9.7 Answers to Check Your Progress Questions 9.8 Summary 9.9 Key Words 9.10 Self Assessment Questions and Exercises 9.11 Further Readings BLOCK 4: TRANSPORT LAYER 128-142 UNIT-10 TRANSPORT LAYER 10.0 Introduction 10.1 Objectives 10.2 Introduction to Transport Layer 10.2.1 Functions of Transport Layer 10.2.2 Design Issues with Transport Layer 10.3 Process to process delivery 10.4 User Datagram Protocol (UDP) 10.5 Transmission Control Protocol (TCP) 10.5.1 TCP Service Model 10.5.2 TCP Segment Header 10.6 Connection Oriented Vs Connectionless Services. 10.7 Check Your Progress Questions 10.8 Answers to Check Your Progress Questions 10.9 Summary 10.10 Key Words 10.11 Self Assessment Questions and Exercises 10.12 Further Readings vi UNIT-11: APPLICATIONS AND SERVICES 143-159 11.0 Introduction 11.1 Objectives 11.2 Domain name system 11.2.1 Uniform Resource Locator (URL) 11.2.2 Domain Name System Architecture 11.2.3 Types of Name Servers 11.2.4 DNS Working Procedure 11.3 Remote Login 11.4 Mail Exchange 11.4.1 Mail Architecture and Services 11.4.2 Message Formats 11.5 File Transfer 11.6 Check Your Progress Questions 11.7 Answers to Check Your Progress Questions 11.8 Summary 11.9 Key Words 11.10 Self Assessment Questions and Exercises 11.11 Further Readings UNIT-12: REMOTE PROCEDURE CALL 160-177 12.0 Introduction 12.1 Objectives 12.2 Remote Procedure Call 12.2.1 RPC Message Procedure 12.3 Remote File Access 12.4 WWW and HTTP 12.4.1 World Wide Web (WWW) 12.4.2 Hyper Text Transfer Protocol (HTTP) 12.5 Simple Network Management Protocol (SNMP) 12.6 Check Your Progress Questions 12.7 Answers to Check Your Progress Questions 12.8 Summary 12.9 Key Words 12.10 Self Assessment Questions and Exercises 12.11 Further Readings BLOCK 5: NETWORK SECURITY UNIT 13: INTRODUCTIONTO CRYPTOGRAPHY 178-188 13.0 Introduction 13.1 Objectives 13.2 Cryptography 13.3 Encryption Model vii 13.3.1 Components of a Cryptosystem 13.4 Transposition and Substitution Ciphers 13.4.1 Transposition Ciphers 13.4.2 Substitution Ciphers 13.4.3 Difference between Transposition Ciphers and Substitution Ciphers 13.5 Cryptographic principles 13.6 Check Your Progress Questions 13.7 Answers to Check Your Progress Questions 13.8 Summary 13.9 Key Words 13.10 Self Assessment Questions and Exercises 13.11 Further Readings UNIT 14. SYMMETRIC KEY CRYPTOGRAPHY 189-206 14.0 Introduction 14.1 Objectives 14.2 Symmetric key cryptography 14.2.1. DES Algorithm 14.2.2. TRIPLE DES Algorithm 14.2.3. AES Algorithm 14.2.4 Applications of Symmetric Key Cryptography 14.3 Asymmetric key cryptography 14.3.1 RSA Cryptosystem 14.3.2 Applications of Asymmetric Key Cryptography 14.3.3. Difference between Symmetric and Asymmetric Encryption 14.4 Security services 14.5 Check Your Progress Questions 14.6 Answers to Check Your Progress Questions 14.7 Summary 14.8 Key Words 14.9 Self Assessment Questions and Exercises 14.10 Further Readings Model Question Paper 207-208 viii I Introduction [ NOTES T BLOCK -1: INTRODUCTION AND y PHYSICAL LAYER p e UNIT-1INTRODUCTION t h e STRUCTURE s 1.0 Introduction i 1.1 Objectives d 1.2 Computer Networks e 1.2.1 Goals of Computer Networks: b 1.2.2 Components of Computer Networks 1.3 Applications of Computer Networks a 1.4 Line Configuration r 1.5 Topology 1.6.