GATE Computer Networks Book

Share Embed Donate


Short Description

GATE Computer Networks book is very useful for student who want to prepare for GATE. This book is part of GATE correspon...

Description

Computer Networks for

Computer Science & Information Technology By

www.thegateacademy.com

Syllabus

Computer Networks

Syllabus for Computer Networks ISO/OSI stack, LAN technologies (Ethernet, Token ring), Flow and error control techniques, Routing algorithms, Congestion control, TCP/UDP and sockets, IP(v4), Application layer protocols (ICMP, DNS, SMTP, POP, FTP, HTTP); Basic concepts of hubs, switches, gateways, and routers.

Analysis of GATE Papers (Computer Network) Year

Percentage of marks

2013

7.00

2012

9.00

2011

3.00

2010

8.00

2009

3.33

Overall Percentage

6.513 % 2008

6.00

2007

9.33

2006

7.33

2005

6.00

2004

7.33

2003

5.33

THE GATE ACADEMY PVT.LTD. H.O.: #74, KeshavaKrupa (third Floor), 30th Cross, 10th Main, Jayanagar 4th Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com

Contents

Computer Networks

CONTENTS Chapters

Page No

#1 Introduction

1 – 32



Computer Network

1



Goals/ Advantages of Networking

1–3



Components of Network

3



Criteria of a Network

3



Classification of a Network

3



Types of Network Connection

4



Network Topology

4–6



Transmission Modes

6–7



Data and Data Communication

7



The Model

7 – 20



Networks Connecting Devices

20 – 24



Assignment 1

25 – 28



Assignment 2

29



Answer Keys

30



Explanations

30 – 32

#2 Physical Layers (Data rate, Digital transmission)

33 – 47



Introduction

33



Transmission Impairment

33 – 34



Digital transmission

34 – 38



Transmission Mode

38 – 39



Multiplexing

39 – 40



Transmission Media

40 – 41



Assignment 1

42 – 44



Assignment 2

44 – 45



Answer Keys

46



Explanations

46 – 47 th

th

th

THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com Page i

Contents

Computer Networks

#3

Medium Access Sublayer (LAN Technologies: Ethernet, Token Ring)

48 – 64



Introduction

48



Multiple Access Protocols

48 – 52



Ethernet Cabling

53



The 802.3 MAC sublayer protocol

54



IEEE standard 802.4-Token Bus

54 – 55



IEEE standard 802.5-Token Ring

55 – 58



Assignment 1

59 – 60



Assignment 2

60 – 61



Answer Keys

62



Explanations

62 – 64

#4

The Data Link Layer (Flow and error control techniques)

65 - 99



Data link Layer Design Issues

65 – 68



Error Detection and Error Correction

69 – 78



Flow Control and Error Control

78 – 91



High-level Data Link Control (HDLC) Protocol

91 – 93



Assignment 1

94 – 95



Assignment 2

95 – 96



Answer Keys

97



Explanations

97 – 99

#5

Routing & Congestion Control

100 – 114



Routing

100 – 101



Routing Algorithms:

101 – 107



Assignment 1

108 – 110



Assignment 2

110 – 111



Answer Keys

112



Explanations

112 – 114

th

th

th

THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com Page ii

Contents

Computer Networks

#6

TCP/IP, UDP And Sockets, IP(V4)

115 – 145



Over View of TCP/IP

115 – 117



Network Layer

117 – 121



Addressing on Internet

122 – 126



Subnetting

127 – 131



Other Protocol in the Network Layer

131 – 133



Transport Layer

133 – 137



Assignment 1

138 – 139



Assignment 2

140 – 141



Answer Keys

142



Explanations

142 – 145

#7

Application Layer

146 – 157



The Domian Name Service (DNS)

146 – 147



File Transfer Protocol (FTP)

148 – 149



Trivial File Transfer Protocol (TFTP)

149



Simple Mail Transfer Protocol (SMTP)

149 – 150



Uniform Resource Locator (URL)

150



Multipose Internet Mail Extensions (MIME)

150



Post Office Protocol (POP)

151



Hypertext Transfer Protocol (HTTP)

151



Assignment 1

152 – 153



Assignment 2

154



Answer Keys

155



Explanations

155 – 157

#8

Network Security

158 – 175



Symmetric key or Private key algorithms

158 – 160



Asymmetric key Algorithm (or) Public key Algorithm

160 – 161



Digital Signatures

161 – 162



Firewalls

162 – 168 th

th

th

THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com Page iii

Contents

Computer Networks



Assignment 1

169 – 170



Assignment 2

171 – 172



Answer Keys

173



Explanations

173 – 175

#9

Module Test

176 - 191



Test Questions

176 – 184



Answer Keys

185



Explanations

185 – 191

Reference Books

192

th

th

th

THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com Page iv

Chapter 1

Computer Networks

CHAPTER 1 Introduction Computer Network A computer network is created when several computers and terminal device are connected together by data communication system. A network is basically a communication system for computers. Just as the telephone system allows two people to talk, networks allow computers to communicate. Figure 1.1 illustrate a simple computer network where computer A and B can communicate and share resources through computer C.

A

B

C

Fig. 1.1 Computer A and B can access files on C, and can use the printer connected to C.

Goals / Advantages of Networking (1)

Program and file sharing Software resources can also be used more effectively over a network. With stand-alone computers (i.e. not connected to network), the software used on the computer must be present on each computer’s hard disk. It is also difficult and time consuming to install and th

th

th

THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com Page 1

Chapter 1

Computer Networks

configure the software individually on every computer. With a network one can centrally install and configure the software, which can be accessed at the entire connected computer. (2)

Network Resource sharing Network resources include printers, plotters, Fax modems, scanners, floppy disks, CDROMS and storage devices (i.e. Hard disks) which can be shared by terminals connected to network. For example the sharing of a resource such as a storage device.

(3)

Database sharing A database program is an ideal application for a network. A network feature called record locking lets multiple users simultaneously access a file without corrupting the data. Record locking insures that no two users edit the same record at the same time.

(4)

Economical Expansion of the PC Base Networks provide an economical way to expand the number of computers in an organization.

(5)

Ability to use network software A class of software called Groupware is designed specifically for networks. It lets users interact and coordinate their activities. Note: Not all software will use a network even if one is installed. You should check the software documentation to see what features, if any, the software provides in a network environment.

(6)

Ability to use electronic mail Electronic mail lets users easily communicate with one another Messages are dropped in “mailboxes” for the recipients to read at a convenient time.

(7)

Creation of workgroups Groups are important in networks. They can consist of users who work in a department or who are assigned to special project. With Netware, one can assign users to groups and then give each group access to special directories and resources not accessible by other users. This saves the trouble of assigning access to each individual user.

(8)

Centralized Management Because Netware user’s dedicated servers can be grouped in one location, along with the shared resource attached to them, for easier management. Hardware upgrades, software backups, system maintenance and system protection are much easier to handle when these devices are in one location.

(9)

Security A network provides more secure environment for a company’s important information. Security starts with the login procedure to ensure that a user accesses the network using his or her own account. This account is tailored (i.e. made according to the user requirements) to give the user access only to authorized areas of the server and the network. Login restrictions can force a user a log in at one specific station and only during specific time frame or period.

(10) Access to more than one operating system Netware provides connections for many different operating systems, including DOS, OS/2, UNIX, and Apple Talk. Users of these systems can access files on the Netware server. th

th

th

THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com Page 2

Chapter 1

Computer Networks

(11) Enhancement of the corporate structure Networks can change the structure of an organization and the way it is managed. Users who work in a specific department and for a specific manager no longer need to be in the same physical area. Their offices can be located in areas where their expertise is most needed. The network ties them to their department managers and systems. This arrangement is useful for special project in which individuals from different departments, such as research, production and marketing, need to work closely with each other.

Components of Network Computer networks have the following fundamental components: 1. 2. 3. 4. 5.

Server Workstations Network Interface Cards Cabling system Shared Resources and Peripherals.

Criteria of a Network A network must able to meet a certain number of criteria. The most important of these are follows (i) Performance: performance can be measured in many ways, including transmit time and response time. The performance of a network depends upon these following factors: (i) Number of users (ii) Types of transmission medium (iii) Capacity of connected hardware (iv) Efficiency of the software (ii) Reliability: In addition to accuracy of delivery. Network reliability is measured by the frequency of failure, the time it takes for a link to recover from a failure. (iii) Security: Network security issues include protecting data from the unauthorized access.

Classification of network It contains two or more computer along with a transmission path to share information and resource of communication system. By the networking we can make interconnection of two or more network device Depending upon the graphical area, we can divide the computer network in 3 parts. (i) LAN (Local Area Network) (ii) MAN (Metropolitan Area Network) (iii) WAN (Wide Area Network) (i) LAN: It spans over a diameter of 2 km, typically data transfer rate for LAN is 10-100 Mbps, it is used by a signal organization. It propagates high transmission over unexpensive media. Example co-axial cable, twisted pair cable. (ii) MAN: It spans over 10 – 100km diameter. Data rate for MAN is 10 Mbps. Some special equipments are required for transmission. (iii) WAN: It spans across the country or nation. Data transfer rate for WAN is 1.5 mbps. It is used by multiple organizations th

th

th

THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com Page 3

Chapter 1

Computer Networks

Types of Network Connection In a network two or more device are connected together through link. Link is a path for communication that transfer data from one device to another. There are two possible type of connection. (i) Point to point (ii) Multi-point (i)

Point to point: In this case one device is connected to another device. Link

Work station

Work station

Fig 1.2 Point to Point connection (ii)

Multi-point: Here two or more device are connected to each other. In a multipoint connection the capacity of the channel is shared either spatially or temporarily. Work station Work station Main frame

Work station Fig 1.3 Multi-point connection

Network Topology There are two types of topology 1. Physical topology 2. Logical topology 1.

Physical topology: Physical topology represent the physical structure of computer network. It tells how different computers are connected across its communication path. There are six basic topology possible. (i) Mess (ii) Star (iii) Ring (iv) Hybrid (v) Bus (vi) Cellular

(i)

Mess Topology: In mesh topology every device has a dedicated point to point link to every other device. A fully connected mesh network has n(n − 1)/2 physical channel to link n device. To accommodate that many links, every device on the network must have (n-1) input/output ports.

Advantages (i) Eliminate traffic problems (ii) A mesh topology is robust (iii) It is more secure and private (iv) Fault identification and fault isolation is easy th

th

th

THE GATE ACADEMY PVT.LTD. H.O.: #74, Keshava Krupa (third Floor), 30 Cross, 10 Main, Jayanagar 4 Block, Bangalore-11 : 080-65700750,  [email protected] © Copyright reserved. Web: www.thegateacademy.com Page 4

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF