11
MCS20116: COMPUTER NETWORKS Unit 1 Unit 2 Introduction: Uses of Computer Networks: Business Application, Home Applications, Mobile Users - Social Issues. Network Hardware: Local Area Networks - Metropolitan Area Networks- Wide Area Networks - Wireless Networks - Home Networks - Internetworks. Network Software: Protocol Hierarchies - Design Issues for the Layers - Connection Oriented and Connectionless Services - Service Primitives - The relationship of Services to Protocols. Reference Models: The OSI Reference Model- The TCP/IP Reference Model- A Comparison of OSI and TCP/IP reference Model- A Critique of the OSI Model and Protocols - A Critique of the TCP/IP reference model. Example Networks: The Internet - Connection Oriented Networks: x.2S, Frame Relay, and ATM - Ethernet - Wireless LANs Network Standardization: Who 's who in the Telecommunication World - Who's who in the International Standards World - Who 's who in the Internet Standards World? Physical Layer: Guided Transmiss ion Media : Magnetic Media - Twisted Pair - Coaxial Cable - F iber Optics Data Link Layer: Data Link Layer Design Issues: Services Provided to the Network Layer - Framing - Error Control- Flow Control. Error Detection and Correction: Error correcting Codes - Error Detecting Codes. Elementary Data Link Protocols: An unrestricted Simplex Protocol - A simplex Stop- and - wait Protocol - A simplex Protocol for a Noisy channel. Sliding Window Protocols: A one-bit slid ing Window Protocol - A Protocol using Go Back N - A Protocol using selective Repeat. Example Data Link Protocols: HDLC - The Data Link Layer in the Internet. The Medium Access Control Sublayer: Ethernet: Ethernet Cabling - Manchester Encoding - The Ethernet MAC sublayer Protocol - The Binary Exponential Backoff Algorithm - Ethernet ,>- Performance - Switched Ethernet - Fast Ethernet - Gigabit Ethernet - IEEE 802.2 : Logical Link Control - Retrospective on Ethernet. Wireless Lans: The 802.11 Protocol Stack - The 802.11 Physical Layer - The 802.11 MAC sublayer Protocol - The 802.11 Frame Structure. Bluetooth: Bluetooth Architecture - Bluetooth Applications - The Bluetooth Protocol Stack - The Bluetooth Radio Layer - The Bluetooth Baseband Layer - The Bluetooth L2CAP layer - The Bluetooth Frame Structure. Data Link Layer Switching: Bridges from 802 .x to 802 .y - Local Internetworking - Spann ing Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs.

MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

Embed Size (px)

Citation preview

Page 1: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

MCS20116: COMPUTER NETWORKS

Unit 1

Unit 2

Introduction: Uses of Computer Networks: Business Application, Home Applications, Mobile

Users - Social Issues. Network Hardware: Local Area Networks - Metropolitan Area Networks­

Wide Area Networks - Wireless Networks - Home Networks - Internetworks. Network

Software: Protocol Hierarchies - Design Issues for the Layers - Connection Oriented and

Connectionless Services - Service Primitives - The relationship of Services to Protocols.

Reference Models: The OSI Reference Model- The TCP/IP Reference Model- A Comparison of

OSI and TCP/IP reference Model- A Critique of the OSI Model and Protocols - A Critique of the

TCP/IP reference model. Example Networks: The Internet - Connection Or iented Networks:

x.2S, Frame Relay, and ATM - Ethernet - Wireless LANs Network Standardization: Who's who

in the Telecommunication World - Who's who in the International Standards World - Who's

who in the Internet Standards World?

Physical Layer: Guided Transmiss ion Media : Magnetic Media - Tw isted Pair - Coaxial Cable ­

Fiber Optics

Data Link Layer: Data Link Layer Design Issues: Services Provided to the Network Layer ­

Framing - Error Control- Flow Control. Error Detection and Correct ion : Error correcting Codes

- Error Detecting Codes. Elementary Data Link Protocols : An unrestricted Simplex Protocol - A

simplex Stop- and - wait Protocol - A simplex Protocol for a Noisy channel. Sliding Window

Protocols : A one-bit slid ing Window Protocol - A Protocol using Go Back N - A Protocol using

selective Repeat. Example Data Link Protocols: HDLC - The Data Link Layer in the Internet.

The Medium Access Control Sublayer: Ethernet: Ethernet Cabling - Manchester Encoding ­

The Ethernet MAC sublayer Protocol - The Binary Exponential Backoff Algorithm - Ethernet ,>­

Performance - Switched Ethernet - Fast Ethernet - Gigabit Ethernet - IEEE 802.2 : Logical Link

Control - Retrospect ive on Ethernet. Wireless Lans: The 802 .11 Protocol Stack - The 802 .11

Physical Layer - The 802 .11 MAC sublayer Protocol - The 802.11 Frame Structure. Bluetooth :

Bluetooth Architecture - Bluetooth Applications - The Bluetooth Protocol Stack - The

Bluetooth Radio Layer - The Bluetooth Baseband Layer - The Bluetooth L2CAP layer - The

Bluetooth Frame Structure. Data Link Layer Switching: Bridges from 802 .x to 802 .y - Local

Internetworking - Spann ing Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges,

Switches, Routers and Gateways - Virtual LANs.

Page 2: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

Unit 3 The Network Layer: Network Layer Design Issues : Store - and Forward Packet Switching ­

Services Provided to the Transport Layer - Implementation of Connect ion less Services ­

Implementation of Connection Oriented Services - Comparison Of Virtual Circuit and Datagram

subnets. Routing Algorithms : The Optimality Principle - Shortest Path Routing - Flooding ­

Distance Vector Routing - Link State Routing - Hierarchical Routing - Broadcast Routing ­

Multicast Routing - Routing for Mobile Hosts. Internet Working : How Networks Differ - How

Networks can be connected - Concatenated Virtual Circuits - Connectionless Internetworking­

Tunneling - Internet work Rout ing - Fragmentation. The Network Layer in the Internet: The IP

Protocol - IP address - Internet Control Protocols - OSPF - The Internet Gateway Routing

Protocol- BGP ­ The Exterior Gateway Routing Protocol.

Unit 4 The Transport Layer: The Transport Service: Services provided to the Upper Layers - Transport

Services Primitives - Berkeley Sockets. Elements of Transport Protocols Addressing­

Connection Establishment - Connection Release - Flow Control and Buffering - Multiplexing­

Crash Recovery. The Internet Transport Protocols :UDP

Introduction to UDP - Remote Procedure Call- The Real Time Transport Protocol. The Internet

Transport Protocols: TCP Introduction to TCP ­ The TCP Service Model- the TCP Protocol- The

TCP segment header ­ TCP connection establishment - TCP connection release - Modeling TCP

connection management- TCP Transmiss ion Policy - TCP congest ion Control - TCP Timer

Management ­ Wireless TCP and UDP - Transactional TCP.

Unit 5 The Application Layer: DNS : The Domain Name System : The DNS Name Space ­ Resource

Records - Name Servers . Electronic Mail: Architecture and Services - The User Agent ­

Message Formats - Message Transfer - Final Delivery. The World Wide Web: Architecture

Overview - Static Web Documents - Dynamic Web Documents - HTIP - The Hyper Text

Transfer Protocol- Performance Enhancements - The Wireless Web . Multimedia : Introduction

to Digital Audio - Audio Compression - Streaming Audio - Internet Radio - Vo ice Over IP ­

Introduction to Video - Video Compression - Video on Demand.

Page 3: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

Text books

Author Title Publisher

1 Andrew S. Tanenbaum Computer Networks Fourth Edit ion, PHI

Chapters : 1.1 to 1.6, 2.2, 3.1 to

3.4,3 .6,4.3,4.4,4.6,4.7,5.1,

5.2 .1 to 5.2.9, 5.5, 5.6.1 to 5.6.5,

6.1.1 to 6.1.3, 6.2, 6.4, 6.5, 7.1 to

7.4

Reference books

Author Title Publi sher

1 James F.Kurose, Keith

W.Ross

Computer Networking Third Edition, Pearson Education

2 Behrouz A Forouzan Data Communications and Networking Fourth Edition, TMH (2007)

3 Michael A. Gallo,

William M. Hancock

Computer Communications and

Networking Technologies

Cengage Learning (2008)

Page 4: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

MCS20216: OPERATIONS RESEARCH

Unit 1 Linear Programming: Introduction, Formulation, Graphical Solution for two variable

Problem, General formulation of L.P.P, Slack and Surplus variables, Simplex Method,

Artificial Variable Teclmiques.

Transportation Problem: Introduction, N- W corner Method, Matrix minima method,

Vogel's Approximation Method, MOD Method (U-V Method), Assigrunent Problem.

Unit 2

Unit 3 Game Theory: Introduction, Pure Strategy, Mixed Strategy, Two - person zero sum

game, MINIMAX- MAXIMIN Criteria, Game with Saddle point, Game without Saddle

point - solution of 2x2 game Dominance, Graphical Method For 2xn and mx2.

Deterministic Inventory Models: Introduction, Concept of Economic ordering quality

(EOQ), the EOQ model without shortage, economic lot size with finite rate of

Replenishment, The EOQ model with shortages , the production lot size model with

shortage.

Project Management: Introduction, Network diagram representation, Rules, forward

pass computation, Backward pass computation, float and slack times, Critical path,

Project - Evaluation and Review Technique (PERT).

Unit 4

Unit 5

Text books

Author Title Publisher

1 S.D. Sharma Operations Research Kedar Nath Ram Nath & Co.

Reference books

Author Title Publisher

1 Belly E. Gillett Introduction to Operations Research - A

computer-oriented algorithmic

approach

Operation Research theory and

applications

TMH (2008)

Third edition, McMillan2 J K Sharma

l\.A\4~ '''~.\ a.: - ,..\.{<\\ ; i'J; ' •• t

Page 5: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

MCS20316: THEORY OF COMPUTATION

Unit 1 Automata : The Methods and the Madness, Finite Automata

Unit 2 Regular Expressions and Languages, Properties of Regular Languages

Unit 3 Context-Free Grammars and Languages, Push Down Automata

Unit 4 Properties of Context Free Languages, Introduction to Turing Machines

Unit 5 Undecidability

Text books

Author Title Publisher

1 J E Hopcroft, Rajeev Motwani , Jeffrey D.UIlman

Introduction to Automata Theory, Languages and Computation

Pearson Education, 2nd Edition

Reference books

Author Title Publisher

1 Daniel I. A. Cohen Introduction to Computer Theory 2 Peter Linz Theory of Computation

Page 6: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

MCS20416: OBJECT ORIENTED SOFTWARE ENGINEERING

Unit 1

Unit 2

Unit 3

The Scope of Object Oriented Software Engineering: Historical Aspects, Economic

Aspe cts , Maintenance Aspects, Requirements, Analysis and Design Aspects, The Object­

Oriented Paradigm, Terminology, Ethical Issues

Software Life-Cycle Models : Software Development In Theory, Risks and other

aspects of Iteration and Incrementation, Managing Iteration and Incrementation, Other

Life-C ycle Models : Code-and-Fix, Waterfall, Rapid-Prototyping, Open Source, Agile

Processes , Synchronize-and-Stabilize, Spiral Model s, Comparison of Life-Cycle Models.

The Software Process : The Unified Process, Iteration and Incrementation, The

Requirements Workflow, The Analysis workflow, The Desi gn workflow, The

Implementation Workflow, The Test workflow, Post Delivery Maintenance, Retirement,

The Phases of the unified Process, One- versus Two-Dimensional Life cycle models,

Improving the Software process, Capability Maturity Models , Costs and Benefits of

software process improvement.

Teams: Team Organization, Democratic Team Approach, Chief Programmer Team

Approach, Synchronize and Stabilize Teams, Teams for Agile Processes, Open Source

Programming Teams, People Capability Maturity Model, Choosing an appropriate Team

Testing: Quality Issues, Non -Execution-Based Testing, Execution-Based Testing, What

should be Tested ?, Testing versus Correctness proofs, who should perform Execution­

Based Testing ?, When Testing Stops

Modules to Objects: What is a Module ?, Cohesion, Coupling, Data Encapsulation,

Abstract Data Types , Information Hiding, Objects, Inheritance , Polymorphism and

Dynamic Binding, The Object-Oriented Paradigm

Reusability and Portability: Objects and Reuse, Reuse during design and

Implementation, Reuse and Post Delivery Maintenance, Portability, Techniques for

achieving portability.

Planning and Estimating: Planning and the software Process , Estimating Duration and

Cost , Components of a software project Management plan , Software project

Management Plan Framework, Planning Testing, Training Requirements , Documentation

Stand ards.

Page 7: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

Unit 4 The Requirements Workflow : Determining what client needs, Overview of the

Requirements, Understanding the Domain, The Business Model, Initial requirements,

What are Object-oriented Requirements, Rapid Prototyping, Human Factors, Reusing the

rapid prototype, Metrics for the Requirement Workflow, Challenges of the Requirements

Workflow

The Analysis Workflow: The Specification Document, Informal Specifications, The

Analysis Workflow, Extracting the Entity Classes, Challenges of the Analysis workflow.

The Design Workflow : Object-Oriented Design, The Design Workflow, Formal

techniques for Detailed Design, Real -time Design Techniques, CASE tools for Design,

Metrics for Design, Challenges of the Design Workflow.

Unit 5 The Implementation workflow Choice of Programming Language, Good

Programming practice, Coding Standards , Code Reuse, Integration, The Implementation

Workflow, Test case selection, Black-Box Unit Testing Techniques, Glas s-Box Unit

Testing Techniques, Code walkthroughs and Inspections, Comparison of Unit testing

techniques, Clean room, Testing Issues, Integration Testing, Product Testing, Acceptance

Testing, Metrics for the Implementation workflow, Challenge of the Implementation

Workflow.

Postdelivery Maintenance : Why postdelivery maintenance IS necessary, what is

required of postdelivery Maintenance Programmers ?, Management of Postdelivery

Maintenance, Maintenance Issues, Reverse Engineering, Testing during postdelivery

Maintenance, Metrics for Postdelivery Maintenance, Challenges for the Postdelivery

Maintenance

Text books

Author Title Publisher

1 Stephen R.Schach Object Oriented Software

Engineering

McGraw Hill Higher

Education

Reference books '

Author Title Publisher

I Timothy

C.Lethbridge &

Robert Laganiere

Object Oriented Software

Engineering

2nd Edition, MsGraw Hill

Education

t .. , :J

utel ,'Y SI T "

I • ~ L' 0 I

Page 8: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

MCS20516: OPERATING SYSTEMS

Unit 1 Introduction: What Operating Systems Do - Computer System Orgranization - Computer

system Architecture - Operating System Structure - Operating System Operations - Process

Management - Memory Management - Storage Management - Protection and Security ­

Distributed Systems - Special purpose Systems - Computing Environments.

System Structure: Operating System Services - User Operating System Interface - System Calls

- Types of System Calls - System Programs - Operating System Design and Implementation ­

Operating System Structure - Virtual Machine - Operating System Generation - System Boot.

Process Concept: Overview - Process Scheduling - Operations on Processes - Interprocess

Communication - Examples of IPC Systems - Communication in Client Server Systems .

Unit 2 Multithreaded Programming: Overview - Multithreading Models - Thread Libraries ­

Thread ing Issues - Operating System Examples.

Process Scheduling: Basic Concepts - Scheduling Criteria - Scheduling Algorithms - Multiple

Processor Scheduling - Thread Scheduling.

Synchronization: Background - The Crit ical Section Problem - Peterson's solut ion ­

Synchronization Hardware - Semaphores - Classic Problem of Synchronization - Monitors ­

Synchronization Examples - Atom ic Transaction .

Unit 3 Deadlocks: System Model - Deadlock Characterization - Methods for Handling Deadlocks

Deadlock Prevention - Deadlock Avoidance - Deadlock Detection - Recovery from Deadlock.

­

Memory Management Strategies: Background - Swapping - Contiguous Memory Allocat ion ­

Paging - Structure of the Page Table - Segmentation - Example: The Intel Pentium.

Virtual Memory Management: Background - Demand Paging - Copy on Write - Page

Replacement - Allocation of Frames - Thrashing.

Unit 4 File System: File Concept - Access Methods ­ Directory Structure - File System Mounting ­ File

Sharing - Protection .

Implementing File Systems :File System Structure - File System Implementation - Directory

~ GIoard of Stu iet in Com

KRISHNA UNIVERSITY MACHILIPATNAM - 521 101 ,

Page 9: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

Unit 5

Implementation - Allocat ion Methods - Free Space Management - Efficiency and Performance

- Recovery - Log structured File Systems.

Secondary Storage Structure: Overview of Mass - Storage Structure - Disk Structure - Disk

Attachment - Disk Scheduling - Disk Management - Swap Space Management - RAID structure.

I/O Systems: Overview - I/O Hardware - Application I/O Interface - Kernal I/O Interface ­

Transforming I/O requests to Hardware Operations - Streams - Performance .

Text books

Author Title Publisher

1 Abraham Silberschatz,

Peter Baer Galvin, Greg

Gagne

Operating System Principles Seventh Edition, Wiley.

Chapters: 1.1 - 1.12,2 .1 - 2.10,

3.1 - 3.6, 4.1 - 4.5, 5.1 - 5.5, 6.1

- 6.9, 7.1 - 7.7, 8.1 - 8.7, 9.1 -

9.6, 10.1 - 10.6, 11.1 - 11.8, 12.1

- 12.7, 13.1- 13.7

Reference books

Author Title Publisher

1 William Stallings Operating Systems - Internals and

Design Principles

Fifth Edition, Pearson Education

(2007)

2 Achyut S Godbole Operating Systems Second Edition, TMH (2007) .

3 Flynn/McHoes Operating Systems Cengage Learning (2008).

4 Deitel & Deitel Operating Systems Third Edition, Pearson Education

(2008)

Page 10: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

MCS20616: OBJECT ORIENTED SOFTWARE ENGINEERING LAB

Case Studies: Design Following Systems in Object Oriented Approach using UML with open source tools (Eclipse UML2 or any other Open source tools) :

Online Examination System

2 Online Railway Reservation

3 Library Maintenance System

4 Any E-Commerce Portal

5 Biometric Attendance System

Note: Student is expected to analyze the system in object oriented manner and design the system

in object oriented approach using UML with open source tools

Page 11: MCS20116: COMPUTER NETWORKS - Krishna … - Spanning Tree Bridges - Remote Bridges - Repeaters, Hubs, Bridges, Switches, Routers and Gateways - Virtual LANs. Unit 3 The Network Layer:

MCS20716: OPERATING SYSTEMS & COMPUTER NETWORKS LAB

I Operating Systems I

LJ Simulate the following CPU Scheduling Algorithms:

a)FCFS b) SJF c)Priority d)Round Robin

LJ Simulate the following memory allocation techniques:

a)First Fit b)Best Fit c)Worst Fit

LJ Simulate the following file allocation Strategies :

a)Sequential b) Indexed c)Linked

EJISimulate MVT and IVIFT I-. Simulate the following page replacement algorithms:

a)FIFO b)LRU c)Optimal d)LFU

~ Simulate Banker's Algorithm for Deadlock avoidance

~I Simulate Banker's Algorithm for Deadlock prevention . I

~ Simulate Dining Philosopher's problem using semaphores in Linux

[0 Simulate Readers-writers problem using semaphores in Linux

~ Simulate Producer-Consumer problem using semaphores in Linux

I Computer Networks I ~I Program to implement bit stuffing and de-stuffing ICI::::JIProgram to print factorial using RMI I

[IJ Program to obtain information about host, network, protocols and Domain from URL

4 . I Echo server program using TCP I 5. I Client-Server program using TCP I 6. I Client-Server program using UDP I ~I Program to encrypt and decrypt using cipher. I

LJ Simulate the following packet routing algorithm using NS2 simulator

i. Djkstra's algorithm ii. Distance vector algorithm

U Simulate the following congestion control algorithm using NS2 simulator

i.Leaky Bucket ii. Token Bucket