0% found this document useful (0 votes)
7 views4 pages

Computer Networks Full Summary

The document provides a comprehensive overview of computer network topics, covering various topologies, reference models, and data link layer issues. It discusses protocols, error detection methods, network layer services, transport layer functionalities, and security measures, along with examples for each concept. Additionally, it addresses attacks on different layers and their countermeasures, supported by diagrams where relevant.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Computer Networks Full Summary

The document provides a comprehensive overview of computer network topics, covering various topologies, reference models, and data link layer issues. It discusses protocols, error detection methods, network layer services, transport layer functionalities, and security measures, along with examples for each concept. Additionally, it addresses attacks on different layers and their countermeasures, supported by diagrams where relevant.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

COMPUTER NETWORK TOPICS SUMMARY

1. Computer Network Topologies

- Bus, Star, Ring, Mesh, Tree, Hybrid.

- Example: Star topology with a central switch.

- Pros and cons of each.

2. Reference Models

- OSI and TCP/IP.

- Layers and their functions.

- Example: Mapping HTTP over TCP/IP.

3. Data Link Layer Design and Issues

- Framing, Error control, Flow control, Addressing.

- Example: Stop-and-wait protocol.

4. Error Detection and Correction

- Parity, Checksums, CRC, Hamming code.

- Example problem with CRC calculation.

5. Example Data Link Protocol

- HDLC, PPP.

- Example: HDLC frame format and use.

6. ALOHA Protocol

- Pure and Slotted ALOHA.


- Throughput analysis and collision handling.

7. Wired MAC Layer

- Ethernet, CSMA/CD, Token Ring.

- Example: Ethernet frame.

8. IEEE 802.2 Logical Link Control

- LLC sublayer functions, services.

- Example: SNAP header.

9. Wireless MAC Layer

- IEEE 802.11, CSMA/CA, RTS/CTS.

- Example: WiFi access point coordination.

10. Network Layer Services

- Connectionless, connection-oriented, QoS.

- Example: IP packet delivery.

11. Datagram and Virtual Circuit

- IP datagrams, virtual circuits (X.25).

- Example: Comparison of switching approaches.

12. Routing Algorithms

- Distance-vector, Link-state, Hierarchical, Multicast.

- Example: Dijkstra's algorithm.

13. Congestion Control Algorithms


- Leaky Bucket, Token Bucket, Choke packets.

- Example: TCP congestion control.

14. Internetworking

- Tunneling, Fragmentation, NAT.

- Example: IPv4 and IPv6 interoperability.

15. Transport Layer Services

- Process-to-process delivery, reliability.

- Example: TCP vs UDP.

16. Elements of Transport Protocols

- Multiplexing, Connection establishment, Flow control.

- Example: TCP 3-way handshake.

17. Internet Transport Protocols: UDP & TCP

- Features, header formats, use cases.

- Example: DNS over UDP, HTTP over TCP.

18. DNS

- Hierarchical naming, resolvers, caching.

- Example: Translating www.example.com to IP.

19. WWW and HTTP

- Web architecture, HTTP methods.

- Example: GET and POST requests.


20. Electronic Mail System

- SMTP, POP3, IMAP.

- Example: Email delivery path.

21. File Transfer Protocol

- FTP commands, active/passive mode.

- Example: Uploading files to a server.

22. Network Security

- Confidentiality, Integrity, Availability.

- Example: Encryption, Firewalls.

23. Attacks on Different Layers and Countermeasures

- Physical to Application layers.

- Example: ARP spoofing defense.

Diagram descriptions and details were included where appropriate.

You might also like