Unit2 Computer Network
Unit2 Computer Network
Unit: 2
Computer Networks
(ACSE502) Purnima Pal
ECE
B Tech 5th Sem Department
Text books:
1. Behrouz Forouzan, “Data Communication and Networking” Fourth
Edition-2006, Tata McGraw Hill
2. Andrew Tanenbaum “Computer Networks”, Fifth Edition-2011, Prentice
Hall.
3. William Stallings, “Data and Computer Communication”, Eighth
Edition-2008, Pearson.
Reference Books:
1. Kurose and Ross, “Computer Networking- A Top-Down Approach”,
Eighth Edition-2021, Pearson.
2. Peterson and Davie, “Computer Networks: A Systems Approach”, Fourth
Edition-1996, Morgan Kaufmann
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
KCS603.1 3 2 2 2 2 2 3
KCS603.2 3 3 2 3
KCS603.3 3 3 3 3 2 2 2 3
KCS603.4 3 2 2 2 3
KCS603.5 3 3 2 2 3 2 3
KCS603.6 3 2 2 2 2 2 2 2 2 3
13-Sep-23 8
Purnima Pal ACSE502 CN UNIT 2
PSO’s
PSO1: identify, analyze real world problems and design their ethical solutions using
artificial intelligence, robotics, virtual/augmented reality, data analytics, block chain
technology, and cloud computing.
PSO2: design and develop the hardware sensor devices and related interfacing software
systems for solving complex engineering problems.
PSO 4: conduct investigation of complex problem with the help of technical, managerial,
leadership qualities, and modern engineering tools provided by industry sponsored
laboratories.
KCS603.1 2 2 2 2
KCS603.2 2 2 2 2
KCS603.3 2 2 2 3
KCS603.4 2 2 2 2
KCS603.5 2 2 2 2
KCS606 2 2 2 2
PEO 4: To have life-long learning for up-skilling and re-skilling for successful
professional career as engineer, scientist, entrepreneur and bureaucrat for
betterment
13-Sep-23 of society. Purnima Pal ACSE502 CN UNIT 2
11
Result Analysis
• Fundamental of computer
• Types of Network and OSI Model, TCP/IP Model
✔ Encoding
✔ Packet switching
Objective: Study about basic concept of Data link layer functions &
protocols.
MAC
Frame
Ethernet
Segments
Token
Passing
Token
Passing
Token Ring
Frame
Data Frame
Fields
• IEEE 802.6
• DQDB (Distributed Queues, Dual Bus)
• SMDS (Switched Megabit Data Services)
Metropolitan Area Networks : IEEE 802.6
DQDB distributed Queue dual interface
DQDB Buses and
Nodes
DQDB
Rings
DQDB
Rings
HDLC
Modes
Use of P/F
Field
RANDOM ACCESS
Protocols
In random access or contention methods, no station is
superior to another station and none is assigned the control
over another. No station permits, or does not permit, another
station to send. At each instance, a station that has data to
send uses a procedure defined by the protocol to make a
decision on whether or not to send.
• ALOHA
• Carrier Sense Multiple Access
• Carrier Sense Multiple Access with Collision Detection
• Carrier Sense Multiple Access with Collision
Avoidance
Purnima Pal ACSE502 CN
13-Sep-23 91
UNIT 2
Multiple Access Protocols
In CSMA/CA, the IFS can also be used to define the priority of a station or
a frame.
CONTROLLED ACCESS
In controlled access, the stations consult one another to find
which station has the right to send. A station cannot send
unless it has been authorized by other stations. We discuss
three popular controlled-access methods.
• Reservation
• Polling
• Token Passing
Reservation access
method
Objective: Study about basic concept of Flow control and its type.
• Types of Errors
• Detection
• Correction
Error Detection and Correction
Single-bit
error
LRC
Binary
Division
Standard
Polynomials
Error
Detecti
on
• https://www.youtube.com/
watch?v=JFF2vJaN0Cw&list=PLxCzCOWd7aiGFBD2-2joCp
WOLUrDLvVV_
• https://www.youtube.com/watch?v=yNedVgNyE8Q
Purnima
Sanjay Pal CN ACSE502
Nayak CN 2
KCS603 Unit Number
13-Sep-23 151
UNIT 2
Daily Quiz
Books:
1. Forouzen, "Data Communication and Networking",
TMH
Thank
MacmillanPress
You
Purnima Pal ACSE502 CN
13-Sep-23 162
UNIT 2