Computer Networks for
Computer Science & Information Technology By
www.thegateacademy.com
Syllabus
Computer Networks
Syllabus for Computer Networks ISO/OSI stack, LAN technologies (Ethernet, Token ring), Flow and error control techniques, Routing algorithms, Congestion control, TCP/UDP and sockets, IP(v4), Application layer protocols (ICMP, DNS, SMTP, POP, FTP, HTTP); Basic concepts of hubs, switches, gateways, and routers.
Analysis of GATE Papers (Computer Network) Year
Percentage of marks
2013
7.00
2012
9.00
2011
3.00
2010
8.00
2009
3.33
Overall Percentage
6.513 % 2008
6.00
2007
9.33
2006
7.33
2005
6.00
2004
7.33
2003
5.33
THE GATE ACADEMY PVT.LTD. H.O.: #74, KeshavaKrupa (third Floor), 30th Cross, 10th Main, Jayanagar 4th Block, Bangalore-11 : 080-65700750, info@thegateacademy.com © Copyright reserved. Web: www.thegateacademy.com
Contents
Computer Networks
CONTENTS Chapters
Page No
#1 Introduction
1 – 32
Computer Network
1
Goals/ Advantages of Networking
1–3
Components of Network
3
Criteria of a Network
3
Classification of a Network
3
Types of Network Connection
4
Network Topology
4–6
Transmission Modes
6–7
Data and Data Communication
7
The Model
7 – 20
Networks Connecting Devices
20 – 24
Assignment 1
25 – 28
Assignment 2
29
Answer Keys
30
Explanations
30 – 32
#2 Physical Layers (Data rate, Digital transmission)
33 – 47
Introduction
33
Transmission Impairment
33 – 34
Digital transmission
34 – 38
Transmission Mode
38 – 39
Multiplexing
39 – 40
Transmission Media
40 – 41
Assignment 1
42 – 44
Assignment 2
44 – 45
Answer Keys
46
Explanations
46 – 47 th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750, info@thegateacamy.com © Copyright reserved. Web: www.thegateacademy.com Page i
Contents
Computer Networks
#3
Medium Access Sublayer (LAN Technologies: Ethernet, Token Ring)
48 – 64
Introduction
48
Multiple Access Protocols
48 – 52
Ethernet Cabling
53
The 802.3 MAC sublayer protocol
54
IEEE standard 802.4-Token Bus
54 – 55
IEEE standard 802.5-Token Ring
55 – 58
Assignment 1
59 – 60
Assignment 2
60 – 61
Answer Keys
62
Explanations
62 – 64
#4
The Data Link Layer (Flow and error control techniques)
65 - 99
Data link Layer Design Issues
65 – 68
Error Detection and Error Correction
69 – 78
Flow Control and Error Control
78 – 91
High-level Data Link Control (HDLC) Protocol
91 – 93
Assignment 1
94 – 95
Assignment 2
95 – 96
Answer Keys
97
Explanations
97 – 99
#5
Routing & Congestion Control
100 – 114
Routing
100 – 101
Routing Algorithms:
101 – 107
Assignment 1
108 – 110
Assignment 2
110 – 111
Answer Keys
112
Explanations
112 – 114
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750, info@thegateacamy.com © Copyright reserved. Web: www.thegateacademy.com Page ii
Contents
Computer Networks
#6
TCP/IP, UDP And Sockets, IP(V4)
115 – 145
Over View of TCP/IP
115 – 117
Network Layer
117 – 121
Addressing on Internet
122 – 126
Subnetting
127 – 131
Other Protocol in the Network Layer
131 – 133
Transport Layer
133 – 137
Assignment 1
138 – 139
Assignment 2
140 – 141
Answer Keys
142
Explanations
142 – 145
#7
Application Layer
146 – 157
The Domian Name Service (DNS)
146 – 147
File Transfer Protocol (FTP)
148 – 149
Trivial File Transfer Protocol (TFTP)
149
Simple Mail Transfer Protocol (SMTP)
149 – 150
Uniform Resource Locator (URL)
150
Multipose Internet Mail Extensions (MIME)
150
Post Office Protocol (POP)
151
Hypertext Transfer Protocol (HTTP)
151
Assignment 1
152 – 153
Assignment 2
154
Answer Keys
155
Explanations
155 – 157
#8
Network Security
158 – 175
Symmetric key or Private key algorithms
158 – 160
Asymmetric key Algorithm (or) Public key Algorithm
160 – 161
Digital Signatures
161 – 162
Firewalls
162 – 168 th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750, info@thegateacamy.com © Copyright reserved. Web: www.thegateacademy.com Page iii
Contents
Computer Networks
Assignment 1
169 – 170
Assignment 2
171 – 172
Answer Keys
173
Explanations
173 – 175
#9
Module Test
176 - 191
Test Questions
176 – 184
Answer Keys
185
Explanations
185 – 191
Reference Books
192
th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750, info@thegateacamy.com © Copyright reserved. Web: www.thegateacademy.com Page iv
Chapter 1
Computer Networks
CHAPTER 1 Introduction Computer Network A computer network is created when several computers and terminal device are connected together by data communication system. A network is basically a communication system for computers. Just as the telephone system allows two people to talk, networks allow computers to communicate. Figure 1.1 illustrate a simple computer network where computer A and B can communicate and share resources through computer C.
A
B
C
Fig. 1.1 Computer A and B can access files on C, and can use the printer connected to C.
Goals / Advantages of Networking (1)
Program and file sharing Software resources can also be used more effectively over a network. With stand-alone computers (i.e. not connected to network), the software used on the computer must be present on each computer’s hard disk. It is also difficult and time consuming to install and th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750, info@thegateacamy.com © Copyright reserved. Web: www.thegateacademy.com Page 1
Chapter 1
Computer Networks
configure the software individually on every computer. With a network one can centrally install and configure the software, which can be accessed at the entire connected computer. (2)
Network Resource sharing Network resources include printers, plotters, Fax modems, scanners, floppy disks, CDROMS and storage devices (i.e. Hard disks) which can be shared by terminals connected to network. For example the sharing of a resource such as a storage device.
(3)
Database sharing A database program is an ideal application for a network. A network feature called record locking lets multiple users simultaneously access a file without corrupting the data. Record locking insures that no two users edit the same record at the same time.
(4)
Economical Expansion of the PC Base Networks provide an economical way to expand the number of computers in an organization.
(5)
Ability to use network software A class of software called Groupware is designed specifically for networks. It lets users interact and coordinate their activities. Note: Not all software will use a network even if one is installed. You should check the software documentation to see what features, if any, the software provides in a network environment.
(6)
Ability to use electronic mail Electronic mail lets users easily communicate with one another Messages are dropped in “mailboxes” for the recipients to read at a convenient time.
(7)
Creation of workgroups Groups are important in networks. They can consist of users who work in a department or who are assigned to special project. With Netware, one can assign users to groups and then give each group access to special directories and resources not accessible by other users. This saves the trouble of assigning access to each individual user.
(8)
Centralized Management Because Netware user’s dedicated servers can be grouped in one location, along with the shared resource attached to them, for easier management. Hardware upgrades, software backups, system maintenance and system protection are much easier to handle when these devices are in one location.
(9)
Security A network provides more secure environment for a company’s important information. Security starts with the login procedure to ensure that a user accesses the network using his or her own account. This account is tailored (i.e. made according to the user requirements) to give the user access only to authorized areas of the server and the network. Login restrictions can force a user a log in at one specific station and only during specific time frame or period.
(10) Access to more than one operating system Netware provides connections for many different operating systems, including DOS, OS/2, UNIX, and Apple Talk. Users of these systems can access files on the Netware server. th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750, info@thegateacamy.com © Copyright reserved. Web: www.thegateacademy.com Page 2
Chapter 1
Computer Networks
(11) Enhancement of the corporate structure Networks can change the structure of an organization and the way it is managed. Users who work in a specific department and for a specific manager no longer need to be in the same physical area. Their offices can be located in areas where their expertise is most needed. The network ties them to their department managers and systems. This arrangement is useful for special project in which individuals from different departments, such as research, production and marketing, need to work closely with each other.
Components of Network Computer networks have the following fundamental components: 1. 2. 3. 4. 5.
Server Workstations Network Interface Cards Cabling system Shared Resources and Peripherals.
Criteria of a Network A network must able to meet a certain number of criteria. The most important of these are follows (i) Performance: performance can be measured in many ways, including transmit time and response time. The performance of a network depends upon these following factors: (i) Number of users (ii) Types of transmission medium (iii) Capacity of connected hardware (iv) Efficiency of the software (ii) Reliability: In addition to accuracy of delivery. Network reliability is measured by the frequency of failure, the time it takes for a link to recover from a failure. (iii) Security: Network security issues include protecting data from the unauthorized access.
Classification of network It contains two or more computer along with a transmission path to share information and resource of communication system. By the networking we can make interconnection of two or more network device Depending upon the graphical area, we can divide the computer network in 3 parts. (i) LAN (Local Area Network) (ii) MAN (Metropolitan Area Network) (iii) WAN (Wide Area Network) (i) LAN: It spans over a diameter of 2 km, typically data transfer rate for LAN is 10-100 Mbps, it is used by a signal organization. It propagates high transmission over unexpensive media. Example co-axial cable, twisted pair cable. (ii) MAN: It spans over 10 – 100km diameter. Data rate for MAN is 10 Mbps. Some special equipments are required for transmission. (iii) WAN: It spans across the country or nation. Data transfer rate for WAN is 1.5 mbps. It is used by multiple organizations th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750, info@thegateacamy.com © Copyright reserved. Web: www.thegateacademy.com Page 3
Chapter 1
Computer Networks
Types of Network Connection In a network two or more device are connected together through link. Link is a path for communication that transfer data from one device to another. There are two possible type of connection. (i) Point to point (ii) Multi-point (i)
Point to point: In this case one device is connected to another device. Link
Work station
Work station
Fig 1.2 Point to Point connection (ii)
Multi-point: Here two or more device are connected to each other. In a multipoint connection the capacity of the channel is shared either spatially or temporarily. Work station Work station Main frame
Work station Fig 1.3 Multi-point connection
Network Topology There are two types of topology 1. Physical topology 2. Logical topology 1.
Physical topology: Physical topology represent the physical structure of computer network. It tells how different computers are connected across its communication path. There are six basic topology possible. (i) Mess (ii) Star (iii) Ring (iv) Hybrid (v) Bus (vi) Cellular
(i)
Mess Topology: In mesh topology every device has a dedicated point to point link to every other device. A fully connected mesh network has n(n − 1)/2 physical channel to link n device. To accommodate that many links, every device on the network must have (n-1) input/output ports.
Advantages (i) Eliminate traffic problems (ii) A mesh topology is robust (iii) It is more secure and private (iv) Fault identification and fault isolation is easy th
th
th
THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750, info@thegateacamy.com © Copyright reserved. Web: www.thegateacademy.com Page 4