Computer Networks
for
Computer Science & Information
Technology
By
www.thegateacademy.com
Syllabus
Computer Networks
Syllabus for Computer Networks
ISO/OSI stack, LAN technologies (Ethernet, Token ring), Flow and error control techniques,
Routing algorithms, Congestion control, TCP/UDP and sockets, IP(v4), Application layer
protocols (ICMP, DNS, SMTP, POP, FTP, HTTP); Basic concepts of hubs, switches, gateways, and
routers.
Analysis of GATE Papers
(Computer Network)
Year
Percentage of marks
2013
7.00
2012
9.00
2011
3.00
2010
8.00
2009
3.33
Overall Percentage
6.513 %
2008
6.00
2007
9.33
2006
7.33
2005
6.00
2004
7.33
2003
5.33
THE GATE ACADEMY PVT.LTD. H.O.: #74, KeshavaKrupa (third Floor), 30th Cross, 10th Main, Jayanagar 4th Block, Bangalore-11
: 080-65700750, info@thegateacademy.com Copyright reserved. Web: www.thegateacademy.com
Contents
Computer Networks
CONTENTS
Chapters
Page No
#1 Introduction
1 32
Computer Network
Goals/ Advantages of Networking
13
Components of Network
Criteria of a Network
Classification of a Network
Types of Network Connection
Network Topology
46
Transmission Modes
67
Data and Data Communication
The Model
7 20
Networks Connecting Devices
20 24
Assignment 1
25 28
Assignment 2
29
Answer Keys
30
Explanations
30 32
#2 Physical Layers (Data rate, Digital transmission)
33 47
Introduction
33
Transmission Impairment
33 34
Digital transmission
34 38
Transmission Mode
38 39
Multiplexing
39 40
Transmission Media
40 41
Assignment 1
42 44
Assignment 2
44 45
Answer Keys
46
Explanations
46 47
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11
: 080-65700750, info@thegateacamy.com Copyright reserved. Web: www.thegateacademy.com
Page i
Contents
Computer Networks
#3
Medium Access Sublayer (LAN Technologies: Ethernet, Token
Ring)
48 64
Introduction
48
Multiple Access Protocols
48 52
Ethernet Cabling
53
The 802.3 MAC sublayer protocol
54
IEEE standard 802.4-Token Bus
54 55
IEEE standard 802.5-Token Ring
55 58
Assignment 1
59 60
Assignment 2
60 61
Answer Keys
62
Explanations
62 64
#4
The Data Link Layer (Flow and error control techniques)
65 - 99
Data link Layer Design Issues
65 68
Error Detection and Error Correction
69 78
Flow Control and Error Control
78 91
High-level Data Link Control (HDLC) Protocol
91 93
Assignment 1
94 95
Assignment 2
95 96
Answer Keys
97
Explanations
97 99
#5
Routing & Congestion Control
100 114
Routing
100 101
Routing Algorithms:
101 107
Assignment 1
108 110
Assignment 2
110 111
Answer Keys
112
Explanations
112 114
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11
: 080-65700750, info@thegateacamy.com Copyright reserved. Web: www.thegateacademy.com
Page ii
Contents
Computer Networks
#6
TCP/IP, UDP And Sockets, IP(V4)
115 145
Over View of TCP/IP
115 117
Network Layer
117 121
Addressing on Internet
122 126
Subnetting
127 131
Other Protocol in the Network Layer
131 133
Transport Layer
133 137
Assignment 1
138 139
Assignment 2
140 141
Answer Keys
142
Explanations
142 145
#7
Application Layer
146 157
The Domian Name Service (DNS)
146 147
File Transfer Protocol (FTP)
148 149
Trivial File Transfer Protocol (TFTP)
149
Simple Mail Transfer Protocol (SMTP)
149 150
Uniform Resource Locator (URL)
150
Multipose Internet Mail Extensions (MIME)
150
Post Office Protocol (POP)
151
Hypertext Transfer Protocol (HTTP)
151
Assignment 1
152 153
Assignment 2
154
Answer Keys
155
Explanations
155 157
#8
Network Security
158 175
Symmetric key or Private key algorithms
158 160
Asymmetric key Algorithm (or) Public key Algorithm
160 161
Digital Signatures
161 162
Firewalls
162 168
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11
: 080-65700750, info@thegateacamy.com Copyright reserved. Web: www.thegateacademy.com
Page iii
Contents
Computer Networks
Assignment 1
169 170
Assignment 2
171 172
Answer Keys
173
Explanations
173 175
#9
Module Test
176 - 191
Test Questions
176 184
Answer Keys
185
Explanations
185 191
Reference Books
192
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11
: 080-65700750, info@thegateacamy.com Copyright reserved. Web: www.thegateacademy.com
Page iv
Chapter 1
Computer Networks
CHAPTER 1
Introduction
Computer Network
A computer network is created when several computers and terminal device are connected
together by data communication system.
A network is basically a communication system for computers.
Just as the telephone system allows two people to talk, networks allow computers to
communicate. Figure 1.1 illustrate a simple computer network where computer A and B can
communicate and share resources through computer C.
Fig. 1.1 Computer A and B can access files on C, and
can use the printer connected to C.
Goals / Advantages of Networking
(1)
Program and file sharing
Software resources can also be used more effectively over a network. With stand-alone
computers (i.e. not connected to network), the software used on the computer must be
present on each computers hard disk. It is also difficult and time consuming to install and
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11
: 080-65700750, info@thegateacamy.com Copyright reserved. Web: www.thegateacademy.com
Page 1
Chapter 1
Computer Networks
configure the software individually on every computer. With a network one can centrally
install and configure the software, which can be accessed at the entire connected
computer.
(2)
Network Resource sharing
Network resources include printers, plotters, Fax modems, scanners, floppy disks, CDROMS and storage devices (i.e. Hard disks) which can be shared by terminals connected to
network. For example the sharing of a resource such as a storage device.
(3)
Database sharing
A database program is an ideal application for a network. A network feature called record
locking lets multiple users simultaneously access a file without corrupting the data.
Record locking insures that no two users edit the same record at the same time.
(4)
Economical Expansion of the PC Base
Networks provide an economical way to expand the number of computers in an
organization.
(5)
Ability to use network software
A class of software called Groupware is designed specifically for networks. It lets users
interact and coordinate their activities.
Note: Not all software will use a network even if one is installed. You should check the
software documentation to see what features, if any, the software provides in a network
environment.
(6)
Ability to use electronic mail
Electronic mail lets users easily communicate with one another Messages are dropped in
mailboxes for the recipients to read at a convenient time.
(7)
Creation of workgroups
Groups are important in networks. They can consist of users who work in a department or
who are assigned to special project. With Netware, one can assign users to groups and
then give each group access to special directories and resources not accessible by other
users. This saves the trouble of assigning access to each individual user.
(8)
Centralized Management
Because Netware users dedicated servers can be grouped in one location, along with the
shared resource attached to them, for easier management.
Hardware upgrades, software backups, system maintenance and system protection are
much easier to handle when these devices are in one location.
(9)
Security
A network provides more secure environment for a companys important information.
Security starts with the login procedure to ensure that a user accesses the network using
his or her own account. This account is tailored (i.e. made according to the user
requirements) to give the user access only to authorized areas of the server and the
network. Login restrictions can force a user a log in at one specific station and only during
specific time frame or period.
(10) Access to more than one operating system
Netware provides connections for many different operating systems, including DOS, OS/2,
UNIX, and Apple Talk. Users of these systems can access files on the Netware server.
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11
: 080-65700750, info@thegateacamy.com Copyright reserved. Web: www.thegateacademy.com
Page 2
Chapter 1
Computer Networks
(11) Enhancement of the corporate structure
Networks can change the structure of an organization and the way it is managed. Users
who work in a specific department and for a specific manager no longer need to be in the
same physical area. Their offices can be located in areas where their expertise is most
needed. The network ties them to their department managers and systems. This
arrangement is useful for special project in which individuals from different departments,
such as research, production and marketing, need to work closely with each other.
Components of Network
Computer networks have the following fundamental components:
1.
2.
3.
4.
5.
Server
Workstations
Network Interface Cards
Cabling system
Shared Resources and Peripherals.
Criteria of a Network
A network must able to meet a certain number of criteria. The most important of these are
follows
(i) Performance: performance can be measured in many ways, including transmit time and
response time. The performance of a network depends upon these following factors:
(i) Number of users
(ii) Types of transmission medium
(iii) Capacity of connected hardware
(iv) Efficiency of the software
(ii) Reliability: In addition to accuracy of delivery. Network reliability is measured by the
frequency of failure, the time it takes for a link to recover from a failure.
(iii) Security: Network security issues include protecting data from the unauthorized access.
Classification of network
It contains two or more computer along with a transmission path to share information and
resource of communication system. By the networking we can make interconnection of two or
more network device
Depending upon the graphical area, we can divide the computer network in 3 parts.
(i) LAN (Local Area Network)
(ii) MAN (Metropolitan Area Network)
(iii) WAN (Wide Area Network)
(i) LAN: It spans over a diameter of 2 km, typically data transfer rate for LAN is 10-100 Mbps,
it is used by a signal organization. It propagates high transmission over unexpensive
media. Example co-axial cable, twisted pair cable.
(ii) MAN: It spans over 10 100km diameter. Data rate for MAN is 10 Mbps. Some special
equipments are required for transmission.
(iii) WAN: It spans across the country or nation. Data transfer rate for WAN is 1.5 mbps. It is
used by multiple organizations
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11
: 080-65700750, info@thegateacamy.com Copyright reserved. Web: www.thegateacademy.com
Page 3
Chapter 1
Computer Networks
Types of Network Connection
In a network two or more device are connected together through link. Link is a path for
communication that transfer data from one device to another.
There are two possible type of connection.
(i) Point to point
(ii) Multi-point
(i)
Point to point: In this case one device is connected to another device.
Link
Work station
Work station
Fig 1.2 Point to Point connection
(ii)
Multi-point: Here two or more device are connected to each other. In a multipoint
connection the capacity of the channel is shared either spatially or temporarily.
Work station
Work station
Main
frame
Work station
Fig 1.3 Multi-point connection
Network Topology
There are two types of topology
1. Physical topology
2. Logical topology
1.
Physical topology: Physical topology represent the physical structure of computer
network. It tells how different computers are connected across its communication
path. There are six basic topology possible.
(i) Mess
(ii) Star
(iii) Ring
(iv) Hybrid
(v) Bus
(vi) Cellular
(i)
Mess Topology: In mesh topology every device has a dedicated point to point link to
every other device. A fully connected mesh network has n(n 1)/2 physical channel
to link n device. To accommodate that many links, every device on the network must
have (n-1) input/output ports.
Advantages
(i) Eliminate traffic problems
(ii) A mesh topology is robust
(iii) It is more secure and private
(iv) Fault identification and fault isolation is easy
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11
: 080-65700750, info@thegateacamy.com Copyright reserved. Web: www.thegateacademy.com
Page 4