Sei sulla pagina 1di 3

CHETTINAD COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF ECE LESSON PLAN Subject Name: COMPUTER NETWORKS Branch : BE ECE

Subject Co e : EC!"#! Facu(t)


A&M To introduce the concept, terminologies, and technologies for CMOS and its process technology, circuit components and design of CMOS designs in Verilog HDL. Theor) % C(a-- : COMPUTER NETWORKS Un+t & : P.$S&CAL LA$ER Te1t Boo2 :1. Behrouz A. Foruzan, Data co Tar/et .our- : 0

$ear % Sem

: &&&% '&

: P*Senth+(

Facu(t) Co e : FEC,"!

un!cat!on an" Net#or$!n%&, Tata 'cGra#(H!)),*++, *. An"re# -. Tannen.au , Co /uter Net#or$0&, 1ear0on E"ucat!on, Fourth E"!t!on,*++2

S*No

Date

Per+o Re3 * 1 1 1 1 1 1 1 1 1

To4+c- to be Co5ere

Te1t Boo2

Mo e o6 teach+n/

Remar2-

1 # % * / 0 2 3

Data Communications, et!or"s, et!or"s models OS$ model ,Layers in OS$ model TC& ' $& protocol suite ( )ddressing +uided and ,nguided Transmission media S!itching. Circuit s!itched net!or"s Data gram et!or"s ( Virtual circuit net!or"s Ca1le net!or"s for Data transmission. Dialup modems DSL ( Ca1le TV Ca1le TV for Data transfer..

Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7

B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar

&age 1 of %

Theor) % C(a-- : COMPUTER NETWORKS Un+t && : DATA L&NK LA$ER Te1t Boo2 : 1. Behrouz A. Foruzan, Data co S*No 1 # % * / 0 2 3 Date Re3 * 1 1 1 1 1 1 1 1 1

Tar/et .our- : 0

un!cat!on an" Net#or$!n%&, Tata 'cGra#(H!)),*++, *. An"re# -. Tannen.au , Co /uter Net#or$0&, 1ear0on E"ucat!on, Fourth E"!t!on, *++2 Per+o To4+c- to be Co5ere Te1t Boo2 Mo e o6 teach+n/ Remar2Data lin" control. 4raming ( 4lo! and error control &rotocols for oiseless and oisy Channels ( HDLC 5andom access ( Controlled access 6thernet ( $666 standards, standard 6thernet changes in the standard ( 4ast 6thernet ( +iga1it 6thernet. $666 27#.11(8luetooth Connecting de9ices 8ac"1one net!or"s : Virtual L) S )rchitecture and Layers of 4rame 5elay and )TM. Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar

Theor) % C(a-- : COMPUTER NETWORKS Un+t &&& : NETWORK LA$ER Te1t Boo2 : 1. Behrouz A. Foruzan, Data co S*No
1 # % * / 0 2

Tar/et .our- : 0

Date

un!cat!on an" Net#or$!n%&, Tata 'cGra#(H!)),*++, *. An"re# -. Tannen.au , Co /uter Net#or$0&, 1ear0on E"ucat!on, Fourth E"!t!on, *++2 Per+o To4+c- to be Co5ere Te1t Boo2 Mo e o6 teach+n/ Remar2-

Re3 *
1 1 # 1 1 1 1 1

$&9*, $&9/ addresses $nternet!or"ing ( $&9*, $&9/ )ddress mapping ( )5&, 5)5&, 8OOT&, DHC& $CM&, $+M& Deli9ery : 4or!arding 5outing ( ,nicast Multicast routing protocols

Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7

B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar

Theor) % C(a-- : COMPUTER NETWORKS Un+t &' : TRANSPORT LA$ER Te1t Boo2 : 1. Behrouz A. Foruzan, Data co

Tar/et .our- : 0

un!cat!on an" Net#or$!n%&, Tata 'cGra#(H!)),*++, *. An"re# -. Tannen.au , Co /uter Net#or$0&, 1ear0on E"ucat!on, Fourth E"!t!on, *++2

&age # of %

S*No 1 # % * /

Date

Per+o Re3 * 1 # # 1 # 1

To4+c- to be Co5ere
&rocess:to:&rocess deli9ery ,ser Datagram &rotocol ;,D&< Transmission Control &rotocol ;TC&< Congestion Control =uality of ser9ices ;=oS< Techni>ues to impro9e =oS

Te1t Boo2
Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7 Te1t Boo2 7

Mo e o6 teach+n/ B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar

Remar2-

Theor) % C(a-- : COMPUTER NETWORKS Un+t ' : APPL&CAT&ON LA$ER Te1t Boo2 : 1. Behrouz A. Foruzan, Data co S*No 1 # % * / 0 2 3 Date Re3 *
1 1 1 1 1 1 1 1 1

Tar/et .our- : 0 un!cat!on an" Net#or$!n%&, Tata 'cGra#(H!)),*++, *. An"re# -. Tannen.au , Co /uter Net#or$0&, 1ear0on E"ucat!on, Fourth E"!t!on, *++2 Per+o To4+c- to be Co5ere Te1t Boo2 Mo e o6 teach+n/ Remar2Domain ame System ;D S< 6:mail ( 4T& ??? ( HTT& Multimedia et!or" Security. Cryptography Symmetric "ey and &u1lic @ey algorithms Digital signature Management of &u1lic "eys Communication Security )uthentication &rotocols. Te1t Boo2 ! Te1t Boo2 ! Te1t Boo2 ! Te1t Boo2 ! Te1t Boo2 ! Te1t Boo2 ! Te1t Boo2 ! Te1t Boo2 ! Te1t Boo2 ! B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar B(ac2boar

Facu(t) +n 8 Char/e

.OD9ECE

&age % of %

Potrebbero piacerti anche