Course Number : A55026

Department of Computer Science and
Engineering
Course Name
:
Computer Networks
Course Number
:
A55026
Course Designation :
Core
Prerequisites
Computer Fundamentals,
:
Number Systems and Data
communication System.
III B Tech – I Semester
(2015-2016)
B. Ujwala
Asst professor
SYLLABUS
Unit – I
Unit – II
Unit – III
Unit – IV
Unit – V
Introduction Reference Models: The OSI Reference Model, The TCP/IP Reference
Model, A Comparison of the OSI and TCP/IP Reference Models, A Critique of the OSI
Model and Protocols, A Critique of the TCP/IP Reference Model. Sliding Window
Protocols: One-Bit Sliding Window Protocol, A Protocol Using Go Back N, A Protocol
Using Selective Repeat.
The Channel Allocation problem: Static Channel Allocation in LANs and MANs,
Dynamic Channel Allocation in LANs and MANs.
Multiple Access Protocols: ALOHA, Carrier Sense Multiple Access Protocols,
Collision-Free Protocols, Limited-Contention Protocols, Wavelength Division Multiple
Access Protocols, Wireless LAN Protocols.
Ethernet: Ethernet Cabling, Manchester Encoding, The Ethernet MAC Sublayer
Protocol,
The Binary Exponential Backoff Algorithm,
Ethernet Performance,
Switched Ethernet, Fast Ethernet, Gigabit Ethernet, IEEE 802.2: Logical Link
Control, Retrospective on Ethernet,
Network Layer Design Issues : Store-and-Forward Packet Switching, Service
Provided to the Transport Layer, Implementation of Connectionless Service,
Implementation of Connection-Oriented Service, Comparison of Virtual-Circuit and
Datagram Subnets,
Routing Algorithms : The Optimality Principle, Shortest Path Routing, Flooding,
Distance Vector Routing, Link State Routing, Hierarchical Routing, Broadcast
Routing, Multicast Routing, Routing for Mobile Hosts, Routing in Ad Hoc Networks,
Node Lookup in Peer-to-Peer Networks.
Congestion Control Algorithms: General Principles of Congestion Control,
Congestion Prevention Policies, Congestion Control in Virtual-Circuit Subnets,
Congestion Control in Datagram Subnets, Load Shedding, Jitter Control.
The Transport Service: Services Provided to the Upper Layers. Transport Service
Primitives. Berkeley Sockets, An Example of Socket Programming: An Internet File
Server.
Elements Of Transport Protocols: Addressing, Connection Establishment,
Connection Release, Flow Control and Buffering, Multiplexing, Crash Recovery.
A Simple Transport Protocol: The Example Service Primitives, The Example
Transport Entity, The Example as a Finite State Machine.
The Internet Transport Protocols: UDP: Introduction to UDP, Remote Procedure Call,
The Real-Time Transport Protocol.
The Internet Transport Protocols: Introduction to TCP, The TCP Service Model,
The TCP Protocol, The TCP Segment Header, TCP Connection Establishment, TCP
Connection Release, Modeling TCP Connection Management, TCP Transmission
Policy, TCP Congestion Control, TCP Timer Management, Wireless TCP and UDP,
Transactional TCP.
Cryptography: Introduction to Cryptography, Substitution Ciphers, Transposition
Ciphers, One-Time Pads, Two Fundamental Cryptographic Principles.
Symmetric-Key Algorithms:
DES-The Data Encryption Standard,
AES-The
Advanced Encryption Standard, Cipher Modes, Other Ciphers, Cryptanalysis.
Public-Key Algorithms: RSA., Other Public-Key Algorithms.
Digital Signatures: Symmetric-Key Signatures, Public-Key Signatures, Message
Digests, The Birthday Attack.
Communication Security:
IPsecurity,
Firewalls,
Virtual Private Networks,
Wireless Security,
2
TEXT BOOKS & OTHER REFERENCES
Text Books
1.
Computer Networks Fifth Edition By Andrew S. Tanenbaum, Pearson Education
Suggested / Reference Books
1.
Data communications and Networking, Behrouz A. Forouzan, 4th edition, TMH.
2.
Computer Networking, A Top – Down approach featuring the internet, James F.
kurose, K .w.ross , 3rd edition, Pearson Education.
Websites References
1.
http://netgroup.polito.it/teaching/cn/Content
2.
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6829-computer-networks-fall-2002/download-course-materials/
3.
http://en.wikipedia.org/wiki/Computer_networks
4.
http://www.networking-forum.com/
3
Time Table
Room No:
Hour/
Time
1
9:00 - 9:50
W.E.F: 22-06-2015
2
9.50 –10:40
3
10:40 –11:30
4
5
11:30 – 12: 20
1:10 –21:00
6
2:00 – 2:50
7
2:50 – 3:40
III-I
MON
CSE-D
TUE
WED
12:20 – 1:00
CSE-D
III-I
CSE-D
THU
FRI
LUNCH BREAK
III-I
III-I
CSE-D
SAT
III-I
CSE-D
4
PROGRAM EDUCATIONAL OBJECTIVES (PEO’s)
PEO1
The Graduates are employable as software professionals in reputed
industries.
PEO2
The Graduates analyze problems by applying the principles of
computer science, mathematics and scientific investigation to
design and implement industry accepted solutions using latest
technologies.
PEO3
The Graduates work productively in supportive and leadership roles
on multidisciplinary teams with effective communication and team
work skills with high regard to legal and ethical responsibilities.
PEO4
The Graduates embrace lifelong learning to meet ever changing
developments in computer science and Engineering.
PROGRAM OUTCOMES (PO’s)
PO1
An ability to communicate effectively and work on multidisciplinary
teams
PO2
An ability to identify, formulate and solve computer system problems
with professional and ethical responsibility.
PO3
A recognition of the need for, and an ability to engage in life-long
learning to use the latest techniques, skills and modern engineering
tools
PO4
The broad education necessary to understand the impact of
engineering solutions in a global, economic, environmental and social
context
PO5
An ability to apply knowledge of mathematics, science, and
computing to analyze, design and implement solutions to the realistic
problems.
PO6
An ability to apply suitable process with the understanding of
software development practice.
5
Course Outcomes:
By the completion of this course the student will be able to:
1. Analyze TCP/IP and OSI models and various protocols.
2. Identify suitable multiple access protocol for different networks.
3. Analyze various routing algorithms.
4. Choose suitable protocol (UDP/TCP) of transport layer based on the type of
the application.
5. Compare and contrast various security algorithms
MAPPING OF COURSE OBJECTIVES & COURSE OUT COMES WITH
PO’s & PEO’s
Course Outcomes
PO’s
PEO’s
1
5
2
2
5
2
3
5
2
4
2
2
5
5
2
6
COURSE SCHEDULE
Distribution of Hours Unit – Wise
Chapters
Unit
Topic
I
Introduction Reference Models,
Sliding Window Protocols
II
Book1
Total No. of Hours
Ch-1,2,3
11
Data link layer
Ch-4
10
III
Network Layer
Ch-5
12
IV
The Transport layer
Ch-6
10
V
Cryptography
Ch-8
12
Contact classes for Syllabus coverage
55
Tutorial Classes : Online Quiz :
Descriptive Tests : 02 (Before Mid Examination)
Number of Hours / lectures available in this Semester / Year
55
The number of topics in every unit is not the same – because of the variation, all
the units have an unequal distribution of hours
Lecture Plan
S No.
Topic
7
Unit-1
Introduction to Reference Models
The OSI Reference Model
The TCP/IP Reference Model,
A Comparison of the OSI and TCP/IP Reference Mode
A Critique of the OSI Model and Protocols, A Critique of the
TCP/IP Reference Model.
Sliding Window Protocols : One-Bit Sliding Window
Protocol
A Protocol Using Go Back N,
8
A Protocol Using Selective Repeat
1
2
3
4
5
6
Date of
Completion
7
1
2
3
4
5
6
7
8
9
1
2
3
4
5
6
7
8
9
1
2
3
4
5
6
7
8
Unit-2
Static Channel Allocation in LANs and MANs, Dynamic
Channel Allocation in LANs and MANs
Access Protocols : ALOHA,
Carrier Sense Multiple Access Protocols Collision-Free
Protocols, Limited-Contention Protocols,
Wavelength Division Multiple Access Protocols, Wireless
LAN Protocols.
Ethernet : Ethernet Cabling
Manchester Encoding, The Ethernet MAC Sublayer Protocol
The Binary Exponential Backoff Algorithm,
Ethernet
Performance, Switched Ethernet
Fast Ethernet, Gigabit Ethernet
IEEE 802.2: Logical Link Control, Retrospective on Ethernet
Unit-3
Network Layer Design Issues : Store-and-Forward Packet
Switching, Service Provided to the Transport Layer,
Implementation of Connectionless Service
Comparison of Virtual-Circuit and Datagram Subnets
Routing Algorithms : The Optimality Principle, Shortest Path
Routing
Flooding, Distance Vector Routing,
Link State Routing
Hierarchical Routing, Broadcast Routing,
Multicast Routing
Routing for Mobile Hosts, Routing in Ad Hoc Networks,
Node Lookup in Peer-to-Peer Networks.
Congestion Control Algorithms : General Principles of
Congestion Control
Unit-4
The Transport Service: Services Provided to the Upper
Layers. Transport Service Primitives.
Berkeley Sockets, An Example of Socket Programming: An
Internet File Server.
Elements Of Transport Protocols : Addressing
Connection Establishment
Connection Release, Flow Control and Buffering,
Multiplexing, Crash Recovery
A Simple Transport Protocol : The Example Service
Primitives, The Example Transport Entity, The Example as a
Finite State Machine
The Internet Transport Protocols: Introduction to TCP, The
TCP Service Model
The TCP Protocol, The TCP Segment Header, TCP
Connection Establishment
8
1
Unit-5
Cryptography : Introduction to Cryptography
2
Substitution Ciphers, Transposition Ciphers,,
3
One-Time Pads, Two Fundamental Cryptographic Principles
4
5
Symmetric-Key Algorithms : DES-The Data Encryption
Standard
AES-The Advanced Encryption Standard,
6
Cipher Modes, Other Ciphers, Cryptanalysis
7
Public-Key Algorithms :
RSA.,
Other Public-Key
Algorithms
Digital Signatures: Symmetric-Key Signatures, Public-Key
Signatures, Message Digests, The Birthday Attack.
8
Date of Unit Completion & Remarks
Unit – 1
Date
:
__ / __ / __
Remarks:
________________________________________________________________________
Unit – 2
Date
:
__ / __ / __
Remarks:
________________________________________________________________________
Unit – 3
Date
:
__ / __ / __
Remarks:
________________________________________________________________________
9
Unit – 4
Date
:
__ / __ / __
Remarks:
________________________________________________________________________
Unit – 5
Date
:
__ / __ / __
Remarks:
________________________________________________________________________
Unit Wise Assignments (With different Levels of thinking
(Blooms Taxonomy))
Note: For every question please mention the level of Blooms taxonomy
Unit – 1
1.
2.
3.
4.
5
Go to IETF’s Web site, www.ietf.org, to see what they are doing. Pick a project you
like and write a half-page report on the problem and the proposed solution. L3
A connection oriented connection provides better quality of service. Justify the
statement. L3
The Internet is made up of a large number of networks. Their arrangement determines
the topology of the Internet. A considerable amount of information about the Internet
topology is available on line. Use a search engine to find out more about the Internet
topology and write a short report summarizing your findings. L3
A client-server system uses a satellite network, with the satellite at a height of 40,000
km. What is the best-case delay in response to a request? L3
Compare and contrast the sliding window protocol, go back-N protocol. Why selective
repeat is better than the go back - N protocol. L4
Unit – 2
1.
Consider five wireless stations, A, B, C, D, and E. Station A can communicate with all
other stations. B can communicate with A, C and E. C can communicate with A, B and
D. D can communicate with A, C and E. E can communicate A, D and B.
(a) When A is sending to B, what other communications are possible?
(b) When B is sending to A, what other communications are possible?
(c) When B is sending to C, what other communications are possible?
L3
10
2.
3.
Two CSMA/CD stations are each trying to transmit long (multiframe) files. After each
frame is sent, they contend for the channel, using the binary exponential backoff
algorithm. What is the probability that the contention ends on round k, and what is
the
mean number of rounds per contention period?L3
4.
Give two reasons why networks might use an error-correcting code instead of error.
L3
Distinguish different types of cabling supported by Ethernet standard? Why do you
require a limit on the minimum size of Ethernet frame? L4
5
An 802.16 network has a channel width of 20 MHz. How many bits/sec can be sent to
a subscriber station? L3
Unit – 3
1.
Assuming that all routers and hosts are working properly and that all software in
both
is free of all errors, is there any chance, however small, that a packet will be
delivered
to the wrong destination? L3
2.
A router has the following (CIDR) entries in its routing table:
Address/mask Next hop
135.46.56.0/22 Interface 0
135.46.60.0/22 Interface 1
192.53.40.0/23 Router 1
default Router 2
For each of the following IP addresses, what does the router do if a packet with that
address arrives?
(a) 135.46.63.10
(b) 135.46.57.14
(c) 135.46.52.2
(d) 192.53.40.7
(e) 192.53.56.7
3.
4.
An IP datagram using the Strict source routing option has to be fragmented. Do you
think the option is copied into each fragment, or is it sufficient to just put it in the
first
fragment? Explain your answer. L3
Convert the IP address whose hexadecimal representation is C22F1582 to dotted
decimal notation. L3
Unit – 4
1.
2.
Datagram fragmentation and reassembly are handled by IP and are invisible to TCP.
Does this mean that TCP does not have to worry about data arriving in the wrong
order?. L3
Both UDP and TCP use port numbers to identify the destination entity when delivering
a message. Give two reasons why these protocols invented a new abstract ID (port
numbers), instead of using process IDs, which already existed when these protocols
11
were designed. L3
3.
Compare and contrast between Wireless TCP and UDP. L3
4.
Consider the effect of using slow start on a line with a 10-msec round-trip time and
no congestion. The receive window is 24 KB and the maximum segment size is 2 KB.
How long does it take before the first full window can be sent? L3
Unit – 5
1.
2.
3.
4.
Differentiate between block ciphers with transposition cipher.
How does DNS perform name resolution? Explain with example .
L2
Generate the public key and secret key for the following prime numbers using RSA
algorithm: P=3, Q=11, and take E=5.
And Discuss the DNS message format for query and reply messages .
L3
Break the following mono alphabetic substitution cipher. The plaintext, consisting of
letters only, is an excerpt from a poem by Lewis Carroll.
mvyy bek mnyx n yvjjyr snijrh invq n muvjvdt je n idnvy
jurhri n fehfevir pyeir oruvdq ki ndq uri jhrnqvdt ed zb jnvy
Irr uem rntrhyb jur yeoijrhi ndq jur jkhjyri nyy nqlndpr
Jurb nhr mnvjvdt ed jur iuvdtyr mvyy bek pezr ndq wevd jur qndpr
mvyy bek, medj bek, mvyy bek, medj bek, mvyy bek wevd jur qndpr
mvyy bek, medj bek, mvyy bek, medj bek, medj bek wevd jur qnd
L3
Design an attack on DES based on the knowledge that the plaintext consists
exclusively of uppercase ASCII letters, plus space, comma, period, semicolon,
carriage return, and line feed. Nothing is known about the plaintext parity bits. L3
Unit Wise Case Studies (With different Levels of thinking
(Blooms Taxonomy))
Note: For every Case Study please mention the level of Blooms taxonomy
Case Studies (With Higher Levels of thinking (Blooms
Taxonomy))
Note: For every Case Study please mention the level of Blooms taxonomy
1(Covering Syllabus Up to Mid-1)
Most IP datagram reassembly algorithms have a timer to avoid having a lost fragment tie
up reassembly buffers forever. Suppose that a datagram is fragmented into four fragments.
The first three fragments arrive, but the last one is delayed. Eventually, the timer goes off
and the three fragments in the receiver’s memory are discarded. Al ittle later, the last
fragment stumbles in. What should be done with it?
12
2(Covering Entire Syllabus)
Alice was a heavy user of a type 1 anonymous remailer. She would post many messages to
her favorite newsgroup, alt.fanclub.alice, and everyone would know they all came from Alice
because they all bore the same pseudonym. Assuming that the remailer worked correctly,
Trudy could not impersonate Alice. After type 1 remailers were all shut down, Alice switched
to a cypherpunk remailer and started a new thread in her newsgroup. Devise a way for her
to prevent Trudy from posting new messages to the newsgroup, impersonating Alice.
Unit Wise Important Questions (With different Levels of
thinking (Blooms Taxonomy))
Note: For every question please mention the level of Blooms taxonomy
Unit – 1
1.
Discuss the ISO - OSI layered model, bringing out the functionalities of each
layer
3.
Draw a CRC encoder and decoder for CRC code with C (7, 4). Also explain how
this CRC design works, with an example
Differentiate between OSI reference model and TCP/IP model with neat
diagrams.
4.
Explain in detail Sliding window protocol
2.
Unit – 2
1.
2.
3.
Consider a 100 Mb/s version of Ethernet using CSMA/CD. If the maximum
separation between two nodes is 5 km, how efficient is the network if all
packets have the minimum length? What if they have the maximum length?
a) Discuss in brief MAC frame structure for IEEE 802.3?
b) Explain the following CSMA schemes
a) Describe the stop and wait flow control technique.
Explain the term sliding window. Also illustrate and explain the
operation of selective repeat.
4.
a) An ALOHA network user 19.2 kbps channel for sending message packets of
100 bit long size. Calculate the maximum throughput for pure ALOHA network
5
Two neighboring nodes A and B use sliding window protocol with 3-bit
sequence number. As the ARQ mechanism Go Back N is used with window
size of 4. Assume A is transmitting and B is receiving , show window position
for the following events:
i) before A send any frame
ii) After A send frame 0, 1, 2 and receive ACK from B for 0 and 1.
13
a) Discuss in brief MAC frame structure for IEEE 802.3?
Explain the followi g CSMA schemes: (i)Non-persistet
(ii) 1-ersistent
(iii)p-persistent
Unit – 3
1.
2.
3.
4.
Which of the following IP addresses are “matched” by the address prefix
123.234.99.10/20?
123.235.31.10
123.234.95.23
123.234.102.10
123.456.140.10
Explain in detail the ATM cell format.
Explain Distance Vector routing in detail.
Differentiate ARP And RARP
Unit – 4
1.
With neat architecture, explain UDP in detail.
2.
Explain TCP Congestion control techniques in detail.
3.
4.
Explain how QoS is provided through Differentiated Services.
Explain the Congestion Avoidance techniques in detail.
Unit – 5
1.
2.
3.
4.
a) Generate the public key and secret key for the following prime numbers
using RSA algorithm: P=3, Q=11, and take E=5.
b)Discuss the DNS message format for query and reply messages. L3
a) Explain the message authentication operation used in RSA technique.
b) If a DNS domain name is XXX.YYY.edu, how many labels are involved in
here? What is the lowest level domain and what is the highest level domain
in this example? Explain. L2
a) Differentiate between block ciphers with transposition cipher.
b) How does DNS perform name resolution? Explain with example. L3
a) What is Electronic mail? Explain the two scenarios of architecture of E-Mail.
b)What is a name server? List and explain the characteristic features of
various name servers.
14
Unit Wise Multiple Choice Questions
Unit – I
1. Routers operate at which layer of the OSI Model?
A) Physical
B) Network
C) Transport D) MAC sublayer of the Data Link layer
2. Bits are packaged into frames at what layer of the OSI Model?
A) Data Link
B) Physical
C) Transport D) Application
E) Presentation
3. Which of the following are benifits of using a layered network model?
A) It facilitates troubleshooting
B) It breaks the comples process of netorking into more managable chuncks
C) It allows layers developed by different vendors to interoperate.
D) All of the above
4. The layer of the OSI Model, from the top down are:
A) Application, Presentation, Session, Transport, Network, Data Link, Physical
B) Physical, Data Link,Network, Transport, Session, Presentation, Application
C) Session, Presentation, Data Transport, MAC, Network, Physical
D) Application, Encryption, Network, Transport, Logical Link Control, Physical
5. Which of the following operates at the Presentation layer?
A) FTP & HTTP
B) UDP
C) SMTP
D) MIDI & JPEG
E) All of the above
6. Which of the following are Transport layer protocols?
A) TCP & UDP
B) CISC
C) ATM
D) HTTP & FTP
7. Which of the following are considered to be the upper layer protocols?
A) Presentation & Session
C) Application & Presentation
B) Application, Presentation, & Session
D) Application
E) Application, Presentation, Session, & Transport
8. Flow control takes place at what layer?
A) Physical
B) Transport C) Network
D) Application
E) Data Link
9. Encryption takes place at which layer?
A) Physical
C) Presentation
B) Application
D) Data Link E) Session
10. The Network layer uses physical addresses to route the data to destination hosts.
A) True
B) Who Knows
C) False
False B/C its the logical address
11. Error detection & recovery takes place at what layer?
A) Transport
B) Data Link C) Presentation
D) Application
E) Network
15
12. What layer establishes, maintains, & termenates communitions between applications
located on different devices?
A) Application
B) Transport C) Session D) Data Link E) Network
13. IP is implemented at which OSI Model layer?
A) Transport B) Data Link C) Network D) Session E) Presentation
14. Which layer handles the formatting of application data so that it will be readable by the
destination system?
A) Application B) Transport C) Presentation D) Data Link E) Network
15. Packets are found at which layer of the OSI Model?
A) Data Link B) Network
C) Transport D) Session E) Presentation
16. Which layer translates between the physical (MAC) & logical address?
A) Network
B) Transport C) Data Link D) Application
E) Presentation
17. What does OSI stand for?
A) Organization Standards International
C) Open Systems Interconnect
B) Operating Standard Information
D) Open System Interface
E) Operatin System Interconnection
18. Repeaters & hubs operate at whaich layer?
A) Network
B) Transport C) Physical
D) Presentation
E) Data Link
19. Bit synchronization is handled at which layer of the OSI Model?
A) Physical
B) Network
C) Session
D) Presentation
E) Data Link
20. Most logical addresses are present in network interface cards at the factory?
A) True
B) No one knows
C) False
False B/C its the physical address
21. Bridges operate at which layer of the OSI Model?
A) Physical
B) Network
C) Data Link
D) Presentation E) Transport
22. What are the sublayers of the Data Link layer?
A) MAC & IPX
B) MAC & LLC
C) hardware & frame D) Mac address E) WAN & LAN
23. Which layer translates between physical & logical addresses?
A) the MAC sublayer of the Data Link layer B) Physical
C) Transport
D) Presentation
E) Network
24. Which layer is responsible for packet sequencing, acknowledgements, & requests for
retransmission?
A) Network
B) Transport
C) Session D) Presentation
E) Data Link
25. The physical layer concerns with
a) bit-by-bit delivery
c) application to application delivery
b) process to process delivery
d) none of the mentioned
16
26. Which transmission media has the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
27. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
28. The portion of physical layer that interfaces with the media access control sublayer is
called
a) physical signaling sublayer
b) physical data sublayer
c) physical address sublayer
d) none of the mentioned
29. In asynchronous serial communication the physical layer provides
a) start and stop signaling
b) flow control
c) both (a) and (b)
d) none of the mentioned
30. The physical layer is responsible for
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
Unit – II
1. The data link layer takes the packets from _____ and encapsulates them into frames
for transmission.
a) network layer
b) physical layer
c) transport layer d) application layer
2. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
3. Which sublayer of the data link layer performs data link functions that depend upon
the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none
4. Header of a frame generally contains
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
5. Automatic repeat request error management mechanism is provided by
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
6. When 2 or more bits in a data unit has been changed during the transmission, the
error is called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
7. CRC stands for
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
17
8. Which one of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) HDLC
d) all of the mentioned
9. Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) both (a) and (b)
d) none of the mentioned
10. The technique of temporarily delaying outgoing outgoing acknowledgements so
that they can be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned
Unit – III
1. The network layer concerns with
a) bits
b) frames
c) packets
d) none of the mentioned
2. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) none
3. The 4 byte IP address consists of
a) network address
b) host address
c) both (a) and (b) d) none
4. In virtual circuit network each packet contains
a) full source and destination address
b) a short VC number
c) both (a) and (b)
d) none
5. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
6. Multidestination routing
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) none
7. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing b) admission control c) load shedding d) none
9. The network layer protocol of internet is
a) Ethernet
b) internet protocol
c) hypertext transfer protocol d) none
10. ICMP is primarily used for
a) error and diagnostic functions
b) addressing
c) forwarding d) none
18
Unit – IV
1.
Transport layer aggregates data from different applications into a single stream
before passing it to
a) network layer
b) data link layer c) application layer
d) physical layer
2. Which one of the following is a transport layer protocol used in internet?
a) TCP
b) UDP
c) both (a) and (b)
d) none of the mentioned
3. 3. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) both (a) and (b)
d) none of the mentioned
4. 4. Transmission control protocol is
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned
5. An endpoint of an inter-process communication flow across a computer network is
called
a) socket
6.
b) pipe
c) port
d) none of the mentioned
Socket-style API for windows is called
a) wsock b) winsock
c) wins d) none of the mentioned
7. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned
8. A _____ is a TCP name for a transport service access point.
a) port b) pipe
c) node
d) none of the mentioned
9. Transport layer protocols deals with
a) application to application communication
b) process to process communication
c) node to node communication
d) none of the mentioned
10. Which one of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
19
c) neighbor discovery protocol
d) dynamic host configuration protocol
Unit – V
1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the mentioned
2. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver c) sender and receiver
d) all the connected devices to the network
3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) RSA algorithm
b) diffie-hellman algorithm c) electronic code book algorithm
d) none of the mentioned
4. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
5. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none
7. Which one of the following is a cryptographic protocol used to secure HTTP
connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
8. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
9. ElGamal encryption system is
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
20
c) not an encryption algorithm
d) none
10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none
University Question Papers
****Should be attached
Tutorial Sheet
Date:
Topics Revised:
Date:
Topics Revised:
Date:
Topics Revised:
Date:
Topics Revised:
Date:
Topics Revised:
21
TOPICS DISCUSSED BEYOND THE SYLLABUS
S.No.
Topic
1
2
3.
4.
5.
6.
ASSESMENT OF LEARNING OBJECTIVES AND OUT COMES: DIRECT
Blooms Taxonomy:
LEVEL 1
REMEMBERING
LEVEL 2
UNDERSTANDING
LEVEL 3
APPLYING
LEVEL 4
ANALYZING
LEVEL 5
EVALUATING
LEVEL 6
CREATING
Exhibit memory of previously learned
material by recalling facts, terms, basic
concepts, and answers
Demonstrate understanding of facts and
ideas by organizing, comparing, translating,
interpreting, giving descriptions, and stating
main ideas.
Solve problems to new situations by applying
acquired knowledge, facts, techniques and
rules in a different way
Examine and break information into parts by
identifying motives or causes. Make
inferences and find evidence to support
generalizations.
Present and defend opinions by making
judgments about information, validity of
ideas, or quality of work based on a set of
criteria.
Compile information together in a different
way by combining elements in a new pattern
or proposing alternative solutions.
*Attach course assessment sheet
22
ASSESMENT OF COURSE OUTCOMES: INDIRECT
1
Criteria
Oral
Communicati
on
SNo
LEVEL(Level 5:Excellent Level 4:Very Good Level 3:Good Level 2:Satisfactory Level 1:Poor)
5
Student speaks in phase with the given topic confidently using Audio-Visual aids. Vocabulary is exceptional
4
Student speaking with proper planning, fair usage of Audio-Visual aids. Vocabulary is good
3
Student speaking without proper planning, fair usage of Audio-Visual aids. Vocabulary is not good
2
Student speaks
1
Student speaks vaguely not in phase with the given topic.
2
Writing Skills
5
4
3
2
1
5
Content
Knowledge
4
Student
Participation
3
Social and
Ethical
Awareness
5
4
3
Technical and
analytical Skills
Practical
Knowledge
7
Understanding of
Engineering core
Information gathered was not relevant to the given task. Content is copied from other documents
Student identifies most potential ethical or societal issues and provides solutions for them discussing with
peers
Student identifies most potential ethical or societal issues and
provides partial solutions for them
discussing with peers
Student identifies the societal and ethical issues but tries to provide solutions for them discussing with
peers
Student identifies the societal and ethical issues but fails to provide any solutions discussing with peers
1
Student makes no attempt in identifying the societal and ethical issues
5
4
Student uses appropriate methods, techniques to model and solve the problem accurately
Student uses appropriate methods, techniques to model and solve the problem partially.
3
Student uses appropriate methods to model the problem but attempts to solve the problem
2
Student tries to model the problem and fails to solve the problem
1
Student fails to model the problem and also fails to solve the problem
5
Listens carefully to the class and answer the questions confidently
4
Listens carefully to the class and tries to answer questions confidently.
3
Listens carefully to the lecture and attempts to answer the questions
2
Student listens to the class but doesn’t attempts to answer the questions
1
Student neither listens to the class nor attempts to answer the questions
4
3
2
The program structure is well organized with appropriate use of technologies and methodology. Code is
easy to read and well documented. Student is able to implement the algorithm producing accurate results
Program structure is well organized with appropriate use of technologies and methodology. Code is easy to
read and not properly documented. Student is able to implement the algorithm providing accurate results.
Program structure is well organized with appropriate use of technologies and methodology. Code is quite
difficult to read and not properly documented. Student is able to implement the algorithm providing
accurate results.
Program structure is well organized with usage of appropriate technologies and methodology. Code is
difficult to read and not documented properly and not able to execute the program
1
Program structure is not well organized with mistakes in usage of appropriate technologies and
methodology. Code is difficult to read and student is not able to execute the program
5
Independently able to write programs for any given context to strengthen the concepts covered in theory
4
Independently able to write programs to strengthen the concepts covered in theory
3
Independently able to write programs and able to strengthen the concepts learned in theory
2
1
8
Proper structuring of the document with relevant subtitles, readability of document is high with correct use
of grammar. Work is genuine and not published anywhere else.
Information gathered is relevant to the given task. Sentences were framed properly with correct use of
grammar.
Information gathered is relevant to the given task. sentences were framed properly with inappropriate use
of grammar
Information is gathered without continuity of topic, sentences were not framed properly. Few topics are
copied from other documents
2
5
6
in phase but no synchronization among the talk and Visual Aids.
5
4
3
2
1
Not able to write programs but able to strengthen the concepts learned in theory.
Not able to write programs and not able to strengthen the concepts learned in theory
Student uses appropriate methods, techniques to model and solve the problem accurately in the context of
multidisciplinary projects
Student tries to model the problem and solve the problem in the context of multidisciplinary projects
Student tries to model the problem and attempts to solve the problem in the context
of multidisciplinary projects.
Student tries to model the problem but fails to solve the problem in the context
of multidisciplinary projects.
Student fails to model the problem and also fails to solve the problem in the context
of multidisciplinary projects
23
*Attach course assessment sheet
Add-on Programmes:
1
2
3
4
Guest Lectures:
1.
2.
3.
4.
Unit Wise PPT’s:
Unit Wise lecture Notes:
24