Computer Networks Premium Lecture Notes, Prepared by Sukanya. Specially for Computer Science Engineering and Information Technology. Syllabus Covered based on Anna University B.E CSE and B.Tech I.T.
COMPUTER NETWORK
UNIT-1 (Pages: 28)
DATA COMMUNICATION
UNIT-2 (Pages: 44)
ERROR DETECTION AND CORRECTION
UNIT-3 (Pages:9)
NETWORK LAYER
UNIT-4 (Pages: 10)
TRANSPORT LAYER
Attachment: click here
UNIT-1
DATA COMMUNICATION
Need for complier network
Data communication
Effective of data communication
Components of data communication
Definition for computer network
Application of data communication and networking
Protocols and standards
Standard organization
Basic concepts
Network topology
1. Mesh
2. Star
3. Tree
4. Bus
5. Ring
Hybrid topology
Transmission mode in data communication system
Categories of network
Inter networks
OSI model
Function of the layer
Application layer
Network layer
Transport layer
Presentation layer
Single representation in data communication
Analog conversion
Digital to analog conversion
Transmission of digital data
MODEM standards
Transmission media
Advantages
Disadvantages
Co-axial cable
Fiber optic cable
Propagation mode
Unguided transmission media
UNIT-2
ERROR DETECTION AND CORRECTION
Errors
Error detection method
VRC
Error correction method
Hamming code
Data link control
Flow control
Advantages
Disadvantages
Error control method
Sliding window ARQ
Selective repeat ARQ
Data link protocols
HDLC
Types of station
Modes of response
HDLC frames
Piggy banking
Local area network
Token bus
Application of token bus
Token ring
Token frame
Access method in token ring
FDDI
SONET
Layer of SONET
Bridges
Operation of bridges
Transparent bridges
Station types in wireless network
Collision avoidance by NAV
UNIT-3
NETWORK LAYER
Switching
Circuit switching
Pocket switching
Datagram approach
Virtual circuit approach
Data transfer
PVC
Message switching
IP addressing
Dotted decimal notation
Masking in networking
Masking methods
UNIT-4
TRANSPORT LAYER
Duties of transport layer
Addressing
Modes of end to end delivery
Block cipher
DES
Asymmetric key cryptography
RSA
DNS
Limitation of SMTP
Post office protocol
HTTP
Attachment: click here