Sei sulla pagina 1di 77

Computer Networks III CSE Ms.J.

Priya

SAMSKRUTI COLLEGE OF ENGINEERING AND TECHNOLOGY


Ghatkesar, Hyderabad, Telangana-501 301

JNTUH Code: A50515 Programme: B.Tech


Year: III Semester : I

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Computer Networks
COURSE FILE

(2016-2017)

Prepared Approved
by by
Ms.J.Priya Ms.G.Radha Devi
Assistant Professor Head of the Department
Course Coordinator

COURSE FILE INDEX

1|Page
Computer Networks III CSE Ms.J.Priya

S.NO. ITEM DESCRIPTION PAGE No.


1. Course Information Sheet 2
2. Syllabus 3
3. Text Books, Reference Book, Web/Internet Sources 4
4. Time Table 5
5. Vision & Mission of the Department 6
6. Programme Specific Outcomes (PSOs) 7
7. Programme Outcomes(PO’s) 8
8. Course Outcomes(CO’s) 9
9. Mapping of Course Outcomes with PO’s and PSO’s 10
10. Course Schedule 11
11. Lecture Plan / Teaching Plan 12
12. Date of Unit Completion & Remarks 14
13. Assignment Questions 15
14. Multiple Choice Questions 16
15. Unit Wise Very Short Answer Questions 24
16. Previous Question Papers 47
17. Tutorial Sheet 50
18. Topics Beyond Syllabus 51
19. Group Discussion 52
20. Peer Group Teaching 54
21. Quiz 56
22. Blooms Taxonomy- Direct Assessment of COs 61
23. Course Exit Survey - Indirect Assessment of COs 62
24. Mid Exam Questions 65
25. Remedial classes (Time table, Attendance, Report) 66
26. Course Assessment Sheet (Direct) 69
27. Course Assessment Sheet (Indirect) 71
28. CO Attainment Calculation (Direct & Indirect) 72
29. PO & PSO Attainment 73
30. Course Outcome Assessment Sheet 74
31. Unit Wise PPT’s& Lecture Notes for 5 Units and content beyond syllabus

COURSE COORDINATOR HOD

2|Page
Computer Networks III CSE Ms.J.Priya

COMPUTER NETWORKS (A50515 )


R13 SYLLABUS

UNIT - I:

Overview of the Internet: Protocol, Layering Scenario, TCP/IP Protocol Suite: The OSI Model,
Internet history standards and administration; Comparioson of the OSI and TCP/IP reference model.

Physical Layer: Guided transmission media, wireless transmission media.

Data Link Layer - design issues, CRC codes, Elementary Data Link Layer Protocols, sliding window
prorocol

UNIT - II:

Multi Access Protocols - ALOHA, CSMA, Collision free protocols, Ethernet- Physical Layer,
Ethernet Mac Sub layer, data link layer switching & use of bridges, learning bridges, spanning tree
bridges, repeaters, hubs, bridges, switches, routers and gateways.

UNIT - III:

Network Layer: Network Layer Design issues, store and forward packet switching connection less and
connection oriented networks-routing alhorithms-optimality principle, shortest path, flooding, Distance
Vector Routing, Control to Infinity Problem, Hierarchical Routing, Congestion cointrol algorithms,
admission control.

UNIT - IV:

Internetworking: Tunneling, Internetwork Routing, Packet fragmentation, IPv4, IPv6 Protocol, IP


addresses, CIDR, IMCP, ARP, RARP, DHCP.

Transport Layer: Services provided to the upper layers elements of transport protocol-addressing
connection establishment, connection release, Connection Release, Crash Recovery.

UNIT - V:

The Internet Transport Protocols UDP-RPC, Real Time Transport Protocols, The Internet Transport
Protocols- Introduction to TCP, The TCP Service Model, The TCP Segment Header, The Connection
Establishment, The TCP Connection Release, The TCP Connection Management Modeling, The TCP
Sliding Window, The TCP Congestion Control, The future of TCP.

Application Layer- Introduction, providing services, Applications layer paradigms, Client server model,
Standard client-server application-HTTP, FTP, electronic mail, TELNET, DNS, SSH

3|Page
Computer Networks III CSE Ms.J.Priya

BOOKS & REFERENCES

TEXT BOOKS:

A1. Data Communications and Networking - Behrouz A. Forouzan, Fifth Edition TMH, 2013.

A2. Computer Networks - Andrew S Tanenbaum, 4th Edition, Pearson Education.

REFERENCES BOOKS:

A3. An Engineering Approach to Computer Networks - S. Keshav, 2nd Edition, Pearson Edication.

A4. Understanding communications and Networks, 3rd Edition, W. A. Shay, Cengage Learning.

A5. Introduction to Computer Networks and Cyber Security, Chwan-Hwa (John) Wu, J. David Irwin,
CRC Press.

A6. Computer Networks, L. L. Peterson and B. S. Davie, 4th edition, ELSEVIER.

A7. Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, K. W.
Ross, 3rd Edition, Pearson Eduction.

WEB SOURCES:

W1: www.cn-materials.com/

W2:www.alljntuworld.in ›
W3: www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=40126856

W4: www.cnbmltd.com/english/zgjc/index.html

4|Page
Computer Networks III CSE Ms.J.Priya

TIME TABLE ACADEMIC YEAR 2016-2017 (w. e. f. 14-12-2017)

CLASS: B.TECH YEAR: III SEM: I BRANCH: CSE

LH: 211

I II III IV V VI VII
DAY 12:35 PM
9:15 AM 10:05 AM 10:55 AM 11:45 AM 1:15 PM 2:15 PM 3:15 PM
TIME 1:15 PM
10:05 AM 10:55 AM 11:45 AM 12:35 PM 2:15 PM 3:15 PM 4:15 PM
MON DS

TUE DS
B
WED DS
R
E
THU
A
K
FRI DS

SAT DS

CODE SUBJECT FACULTY NAME

126AP DS : Distributed Systems Dr.S.Jayanthi

TME TABLE INCHARGE HOD PRINCIPAL

5|Page
Computer Networks III CSE Ms.J.Priya

VISION & MISSION of the Department

Vision:
Achieve academic excellence through education in computing and create intellectual, professional
manpower to explore higher educational, research and social opportunities.

Mission:
 To impart learning by educating students with social awareness, conceptual knowledge and
hands on practices using modern tools and competency skills there by igniting the young minds
for innovative thinking, professional expertise and research.”
 To provide high quality computer education in both the theoretical and applications of
Computer Science and Engineering.
 To train the student effectively to apply coding and programming skills to solve real-world
problems”.

6|Page
Computer Networks III CSE Ms.J.Priya

PROGRAM SPECIFIC OUTCOMES (PSOs)

Upon completion of the Graduation, Graduates of Computer Science and Engineering can be able to

PSO1: Professional Skills: Design and develop hardware and software based systems, evaluate and
recognize potential risks and provide creative solutions.

PSO2: Advanced Computing Skills: Analyze, design, develop, test and apply management principles,
mathematical foundations, algorithmic principles, modeling and design of computer- based
systems in solving engineering problems.
PSO3: Interdisciplinary Solutions: Gain knowledge in diverse areas of Computer Science and
experience for developing innovative applications with societal concerns.

PROGRAM OUTCOMES (POs)

7|Page
Computer Networks III CSE Ms.J.Priya

Upon completion of the program, Engineering Graduates will be able to:

PO1. Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an
engineering specialization to the solution of complex engineering problems.

PO2. Problem analysis: Identify, formulate, review research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.

PO3. Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for the public health and
safety, and the cultural, societal, and environmental considerations.

PO4. Conduct investigations of complex problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data, and synthesis of the information to provide
valid conclusions.

PO5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering
and IT tools including prediction and modeling to complex engineering activities with an understanding of the
limitations.

PO6. The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional
engineering practice.

PO7. Environment and sustainability: Understand the impact of the professional engineering solutions in
societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.

PO8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the
engineering practice.

PO9. Individual and team work: Function effectively as an individual, and as a member or leader in diverse
teams, and in multidisciplinary settings.

PO10. Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear instructions.

PO11. Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage projects
and in multidisciplinary environments.

PO12. Life-long learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.

COURSE OUTCOMES(COs)

8|Page
Computer Networks III CSE Ms.J.Priya

CO1: Students should be understand and explore the basics of computer networks and various
protocols.

CO2: Understanding the concepts of World Wide Concepts

CO3: Students will be in a position to administrate a network and flow of information.

CO4: Students can understand easily the concepts of network security , mobile and adhoc networks.

Mapping of Course Outcomes with PO’s and PSO’s

9|Page
Computer Networks III CSE Ms.J.Priya

CO - PO Correlation Matrix

PO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO

CO1 3 3 3 - - - - - - - - 2
CO2 3 2 2 - 3 - - - - - - 2
CO3 3 2 2 - - - - - - - - 2
CO4 3 3 2 - 3 - - - - - - 2
Average 3 3 2 - 3 - - - - - - 2

CO - PSO Correlation Matrix

PSO
PSO1 PSO2 PSO3
CO
CO1 3 3 3
CO2 3 2 2
CO3 3 2 2
CO4 3 3 2
Average 3 3 2

Correlation Levels

Substantial/ High : 3 Moderate/ Medium: 2 Slight/ Low:1 No correlation-1

Setting targets for Course Outcomes

Course Target attainment


Outcomes 3 2 1
CO1
>= 75% 75-60% 60-55%
CO2 >=65% 55-64% 45-54%
CO3 >=60% 50-59% 40-49%
CO4 >=60% 50-59% 40-49%

COURSE SCHEDULE
Commencement Of Instructions: 12.07.2017 Last Date Of Instruction: 07.11.2017

10 | P a g e
Computer Networks III CSE Ms.J.Priya

Chapters
Total No. of
Unit Topic
Hours
Book1 Book2
Overview of the Internet, Physical
I 1,2 10
Layer & Data Link Layer
II Multi Access Protocols 10, 11 10

III Network Layer 5, 6 4 10

Internetworking & Transport


IV 8,9,10 9
Layer

The Internet Transport Protocols


V 12, 13 10
& Application Layer

Contact classes for Syllabus coverage 49


Number of Hours / lectures available in this Semester / Year :
62
Class hours utilized for student centric learning methods:
Quiz Sessions : 04 Content Beyond Syllabus:2 Group Discussion: 1
Peer Group Teaching:01 Seminar Sessions:01 Revision classes :01 per unit

Important Dates:
1st Mid Term Examinations: 06.09.2016 To 08.09.2017.
2nd Mid Term Examinations: 08.11.2017 To 10.11.2017

LESSON PLAN

11 | P a g e
Computer Networks III CSE Ms.J.Priya

S.no Unit no Topic No of Mode of Reference * Remarks


sessions teaching
planne BB/PPT/OHP
d /MM

1. 1 I Introduction 1 BB A2

2. 2 Protocol And Standards 1 BB A2

3. 3 Layered Scenario 1 BB A2

4. 4 The OSI Model 1 PPT A2

5. 5 Internet history 1 PPT A2

6. 6 TCP/IP Protocol suite & OSI and TCP/IP 1 BB A2


comparison
7. 7 Guided Transmission Media 1 PPT A1

8. 8 Unguided Media: wireless 1 BB A1

9. 9 TCP/IP Protocol suite & OSI and TCP/IP 1 BB A1 Tutorial


comparison
10. 1 Data Link Layer Design Issues & CRC codes 1 BB A1
0

11. 1 Elementary Data Link Protocols & Sliding 1 BB A1


1 window protocols

12. 1 II MAC Introduction 1 BB A1


2

* For the respective topics please choose the proper reference from the list of TEXT/REFERENCE
BOOKS/Web resources in Course Information Sheet.

Text Books
Websites or E-Books

BB Black Board
PPT Power Point Presentation
OHP Over Head Projector
MM Multimedia (Audio - Video )

12 | P a g e
Computer Networks III CSE Ms.J.Priya

No of Mode of teaching
S.no Unit no Topic sessions BB/PPT/OHP/M Reference * Remarks
planned M

13.
1 BB A1
ALOHA
14. Carrier Sense Multiple Access(CSMA)
1 BB A1
15.
1 PPT A1
CSMA/CD & CSMA/CA
16.
1 PPT A1
Collision-Free Protocols
17. Ethernet
1 PPT A1
Physical Layer, Mac Sub layer
18. Ethernet
1 BB A1 Tutorial
Physical Layer, Mac Sub layer
19. Data Link Layer Switching and uses of
1 BB A1
Bridges
20.
1 BB A1
Bridges & Spanning Tree Bridges
21.
1 BB A1
Repeaters, Hubs & Bridges
22.
Routers and Gateway
23. A1
III 1 BB
Network Layer Design Issues
24. A1
1 BB
Store & Forward Packet Switching
25. Implementation of Connection Oriented A1
1 BB
and Connection Less Service
26. Routing Algorithms- Optimally Principle A1
1 BB
27. A1
1 BB
Shortest Path Algorithm & Flooding

For the respective topics please choose the proper reference from the list of TEXT/REFERENCE
*
BOOKS/Webresources in Course Information Sheet.
Text Books,
Websites or e-books

BB Black Board
PPT Power Point Presentation
OHP Over Head Projector
MM Multimedia (Audio - Video )

13 | P a g e
Computer Networks III CSE Ms.J.Priya

No of Mode of teaching
S.no Unit no Topic sessions BB/PPT/OHP/M Reference * Remarks
planned M

28.
1 BB A1
Distance Vector Routing
29.
1 BB A1
Count-to-Infinity Problem
30.
1 BB A1
Hierarchical Routing
31. Distance Vector Routing, Count-to-Infinity
2 PPT A1 Tutorial
Problem & Hierarchical Routing
32.
2 PPT A1
Congestion Control Algorithm
33.
Admission Control
34.
IV 2 PPT A1
Internetworking Introduction
35.
1 BB A1
Tunneling, Internetwork Routing
36.
1 BB A1
Packet of Fragmentation
37.
1 BB A1
IPv4 &IPV6
38.
1 BB A1
IP Addresses & CIDR
39.
1 BB A1
IMCP, ARP, RARP, DHCP
40. Services Provided to the Upper Layers &
1 BB A1
Elements of Transport Protocol Addressing
41. IPV4,IPV6, CIDR,IMCP,ARP, RARP &
DHCP 1 PPT A1 Tutorial

42.
1 BB A1
Connection Establishment
43.
1 BB A1
Connection Release & Crash Recovery
44. The Internet Transport Protocols,
V 1 BB A1
UDP-RPC

For the respective topics please choose the proper reference from the list of TEXT/REFERENCE
*
BOOKS/Webresources in Course Information Sheet.
Text Books,
Websites or e-books

BB Black Board
PPT Power Point Presentation
OHP Over Head Projector
MM Multimedia (Audio - Vedio )

14 | P a g e
Computer Networks III CSE Ms.J.Priya

Mode of
No of
Unit teaching Reference
S.no Topic sessions Remarks
no BB/PPT/OHP *
planned
/MM
45.
1 BB A1
Real Time Transport Protocols
46. The Internet Transport Protocol – TCP
1 BB A1
47.
1 BB A1 Tutorial
The TCP Protocol, TCP Service Model
48. TCP Segment Header, TCP Connection
1 PPT A1
Establishment, TCP Connection Release
49.
1 PPT A1
TCP Connection Management Modeling
50. TCP Sliding Window, TCP Congestion
1 BB A1
Control & The future of TCP
51. Application Layer-Introduction & Services
1 PPT A1
–paradigms-Client server Model
52. Electronic Mail, TELNET
1 BB A1
53.
1 BB A1
HTTP, FTP, DNS & SSH
54. Electronic Mail, TELNET, HTTP, FTP, 1 BB A1 Tutorial
DNS & SSH

For the respective topics please choose the proper reference from the list of
*
TEXT/REFERENCE BOOKS/Web resources in Course Information Sheet.

Text Books
Websites or E-Books

BB Black Board
PPT Power Point Presentation
OHP Over Head Projector
MM Multimedia (Audio - Video )

15 | P a g e
Computer Networks III CSE Ms.J.Priya

DATE OF UNIT COMPLETION & REMARKS

Unit – 1
Date : 26 /07 /2016
Remarks:

Unit 1 has been completed as per the lesson plan without any deviation.

Unit – 2
Date : 11/08/2017
Remarks:

Unit 2 has been completed as per the lesson plan without any deviation. In addition with prescribed
topics, content beyond topic, Methods of Channel Access on Links and Wireless Mesh Network topic has
also been delivered in the class. Quiz Sessions has been conducted on Unit 1 & Unit 2 topics so as to
cultivate student centric learning methods on 14/08/2017 and 15/08/2017.

Unit – 3
Date : 11/09/2017
Remarks:

Unit 3 has been completed as per the lesson plan without any deviation. In addition with prescribed
topics, content beyond topic, Challenges for Mobile Networking topic has also been delivered in the class.
Peer Group Teaching has been done before the Mid Exams for revising the topics on 05.09.2017.
1st Mid Term Examinations: 06.09.2016 To 08.09.2017.
Unit – 4
Date : 04 /10/2017

Remarks:
Unit 4 has been completed as per the lesson plan without any deviation.
Quiz Sessions has been conducted on Unit 3 & Unit 4 topics so as to cultivate student centric
learning methods on 05/10/2017 and 06/10/2017.

Unit – 5
Date : 25/10/2017
Remarks:
Unit 5 has been completed as per the lesson plan without any deviation.
Group Discussion 26/10/2017 and 28/10/2017
Seminar Session is conducted on 31/10/2017
Classes from 01/11/2017 to 05/11/2017 have been utilized for revising the topics, unit wise.
Classes on 06/11/2017 & 07/11/2017 have been utilized for peer group teaching.

2nd Mid Term Examinations : 08.11.2017 To 10.11.2017

16 | P a g e
Computer Networks III CSE Ms.J.Priya

ASSIGNMENT QUESTIONS

ASSIGNMENT 1

1. Explain the following elementary data link CO1


i. layer protocols.
ii. Simplex Protocols
iii. Stop-and-wait Protocols

2. Explain the following sliding window CO2


protocols
i. Stop and Wait ARQ
ii. Goback N
iii. Selective Repeat

ASSIGNMENT 2

1. Explain in detail about following CO3


i. Congestion Control Algorithm
ii. Leaky Bucket algorithm
iii. Token Bucket algorithm

2. Distance Vector Routing CO4

3. Count-to-infinity problem with an example CO1

1. Shortest path routing algorithm & CO2


Hierarchical routing algorithm.

17 | P a g e
Computer Networks III CSE Ms.J.Priya

Multiple Choice Questions for CRT & Competitive Examinations

1. Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above
2. What is a Firewall in Computer Network?
A. The physical boundary of Network
B. An operating System of Computer Network
C. A system designed to prevent unauthorized access
D. A web browsing Software
3. How many layers does OSI Reference Model has?
A. 4
B. 5
C. 6
D. 7
4. DHCP is the abbreviation of
A. Dynamic Host Control Protocol
B. Dynamic Host Configuration Protocol
C. Dynamic Hyper Control Protocol
D. Dynamic Hyper Configuration Protocol
5. IPV4 Address is
A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit
6. DNS is the abbreviation of
A. Dynamic Name System
B. Dynamic Network System
C. Domain Name System
D. Domain Network Service
7. What is the meaning of Bandwidth in Network?
A. Transmission capacity of a communication channels
B. Connected Computers in the Network
C. Class of IP used in Network
D. None of Above

18 | P a g e
Computer Networks III CSE Ms.J.Priya

8. ADSL is the abbreviation of


A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line
9. What is the use of Bridge in Network?
A. to connect LANs
B. to separate LANs
C. to control Network Speed
D. All of the above
10. Router operates in which layer of OSI Reference Model?
A. Layer 1 (Physical Layer)
B. Layer 3 (Network Layer)
C. Layer 4 (Transport Layer)
D. Layer 7 (Application Layer)
11. Each IP packet must contain
A. Only Source address
B. Only Destination address
C. Source and Destination address
D. Source or Destination address
12. Bridge works in which layer of the OSI model?
A. Appliation layer
B. Transport layer
C. Network layer
D. Datalink layer
13. provides a connection-oriented reliable service for sending messages
A. TCP
B. IP
C. UDP
D. All of the above
14. Which layers of the OSI model are host-to-host layers?
A. Transport, Session, Persentation, Application
B. Network, Transport, Session, Presentation
C. Datalink, Network, Transport, Session
D. Physical, Datalink, Network, Transport
15. Which of the following IP address class is Multicast
A. Class A
B. Class B
C. Class C
D. Class D
16. Which of the following is correct regarding Class B Address of IP address
A. Network bit – 14, Host bit – 16
B. Network bit – 16, Host bit – 14

19 | P a g e
Computer Networks III CSE Ms.J.Priya

C. Network bit – 18, Host bit – 16


D. Network bit – 12, Host bit – 14
17. The last address of IP address represents
A. Unicast address
B. Network address
C. Broadcast address
D. None of above
18. How many bits are there in the Ethernet address?
A. 64 bits
B. 48 bits
C. 32 bits
D. 16 bits
19. How many layers are in the TCP/IP model?
A. 4 layers
B. 5 layers
C. 6 layers
D. 7 layers
20. Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer
B. Network layer
C. Session layer
D. Transport layer
21. Why IP Protocol is considered as unreliable?
A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
22. What is the minimum header size of an IP packet?
A. 16 bytes
B. 10 bytes
C. 20 bytes
D. 32 bytes
23. Which of following provides reliable communication?
A. TCP
B. IP
C. UDP
D. All of the above
24. What is the address size of IPv6 ?
A. 32 bit
B. 64 bit
C. 128 bit
D. 256 bit

25. What is the size of Network bits & Host bits of Class A of IP address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits 24
C. Network bits 7, Host bits 23

20 | P a g e
Computer Networks III CSE Ms.J.Priya

D. Network bits 8, Host bits 23


26. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
27. The Internet is an example of
A. Cell switched network
B. circuit switched network
C. Packet switched network
D. All of above
28. What does protocol defines?
A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above
29. What is the uses of subnetting?
A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above
30. Repeater operates in which layer of the OSI model?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer

31. What is the benefit of the Networking?


A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
32. Which of the following is not the Networking Devices?
A. Gateways
B. Linux
C. Routers
D. Firewalls
33. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
34. Which of the following can be Software?
A. Routers
B. Firewalls
C. Gateway

21 | P a g e
Computer Networks III CSE Ms.J.Priya

D. Modems
35. What is the use of Ping command?
A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
36. MAC Address is the example of
A. Transport Layer
B. Data Link Layer
C. Application Layer
D. Physical Layer
37. Routing tables of a router keeps track of
A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination
38. Layer-2 Switch is also called
A. Multiport Hub
B. Multiport Switch
C. Multiport Bridge
D. Multiport NIC
39. Difference between T568A and T568B is
A. Difference in wire color
B. Difference in number of wires
C. Just different length of wires
D. Just different manufacturer standards
40. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted

41. Which of the following is not the External Security Threats?


A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)

42. What is the Demilitarized Zone?


A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
43. What is the full form of RAID ?
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks

22 | P a g e
Computer Networks III CSE Ms.J.Priya

D. Random Access of Important Disks


44. What is the maximum header size of an IP packet?
A. 32 bytes
B. 64 bytes
C. 30 bytes
D. 60 bytes
45. What is the size of Host bits in Class B of IP address?
A. 04
B. 08
C. 16
D. 32
46. What is the usable size of Network bits in Class B of IP address?
A. 04
B. 08
C. 14
D. 16
47. In which type of RAID, data is mirrored between two disks.
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 3
48. What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
49. Which of the following is/are Protocols of Application?
A. FTP
B. DNS
C. Telnet
D. All of above
50. Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C

51. What is the IP Address range of APIPA?


A. 169.254.0.1 to 169.254.0.254
B. 169.254.0.1 to 169.254.0.255
C. 169.254.0.1 to 169.254.255.254
D. 169.254.0.1 to 169.254.255.255
52. Which of the following is correct in VLSM?
A. Can have subnets of different sizes
B. Subnets must be in same size
C. No required of subnet

23 | P a g e
Computer Networks III CSE Ms.J.Priya

D. All of above
53. What does the port number in a TCP connection specify?
A. It specifies the communication process on the two end systems

B. It specifies the quality of the data & connection


C. It specify the size of data
D. All of the above
54. The class-based addressing is also known as
A. Modern Model
B. Classful Model
C. Classless Model
D. Heterogeneous Model
55. Which of the following is correct in CIDR?
A. Class A includes Class B network
B. There are only two networks
C. There are high & low class network
D. There is no concept of class A, B, C networks
56. What is the size of Source and Destination IP address in IP header?
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
57. Which of the following is reliable communication?
A. TCP
B. IP
C. UPD
D. All of them
58. What is the typical range of Ephemeral ports?
A. 1 to 80
B. 1 to 1024
C. 80 to 8080
D. 1024 to 65535
59. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message
60. What is the natural mask for a class C Network?
A. 255.255.255.1
B. 255.255.255.0
C. 255.255.255.254
D. 255.255.255.255

Unit Wise Very Short Answer Questions

24 | P a g e
Computer Networks III CSE Ms.J.Priya

PART A UNIT I

1. Define data communication.


It is the exchange of data between two devices via some form of Transmission medium (such as copper
cable, twisted pair cable etc).

2. What are the elements of data communication?


The elements of data communication are

 Sender
 Receiver
 Transmission medium
 Message
 Protocol

3. How we can check the effectiveness of data communication?


The effectiveness of data communication can be checked by

 Accuracy
 Delivery
 Timeliness

4. What are the classes of transmission media?


The classes of transmission media are

 Guided transmission media


 Unguided transmission media

5. Define Optical fiber


It is a method of transmitting information from one place to another by sending light through an optical
fiber.

6. Define distributed processing


A task is divided among multiple computers. Instead of single large machine handling all the process,
each separate computer handles the subset

7. What do you mean by OSI?


Open system interconnection model is a model for understanding and designing a network architecture.
It is not a protocol.

8. Define Network.
A network is a set of devices connected by physical media links. A network is recursively is a

25 | P a g e
Computer Networks III CSE Ms.J.Priya

connection of two or more nodes by a physical link or two or more networks connected by one or more
nodes

9. What is a Link?
At the lowest level, a network can consist of two or more computers directly connected by some
physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link.

10 What is point-point link?


If the physical links are limited to a pair of nodes it is said to be point-point link.

11. What is Multiple Access?


If the physical links are shared by more than two nodes, it is said to be Multiple Access.

12. Define Switch


Switches are hardware or software devices capable of creating temporary Connections between two or
more devices

13. What are the types of switching?


The types of switching are

 Circuit switching
 Packet switching
 Message switching

14. What do you mean by Crossbar switches?


It connects m inputs to n outputs in a grid using electronic micro switches at each cross points.

15. Define Blocking


The reduction in the number of cross points result in a phenomenon called Blocking

16. Define packet switching


In packet switching data are transmitted in discrete units of potentially variable length blocks called
Packets

17. What are the approaches of packet switching?


The approaches of packet switching are

 Virtual circuit
 Datagram

18. What do you mean by Permanent Virtual circuit?


The same Virtual circuit is provided between two users on a continuous basis. The circuit is dedicated
to the specific user

26 | P a g e
Computer Networks III CSE Ms.J.Priya

19. What do you mean by DSL?


It is a new technology that uses the existing telecommunication network to accomplish high speed
delivery of data, voice & video etc.

20. What is the purpose of Physical layer?


The physical layer coordinates the functions required to transmit a bit stream over a physical medium.

UNIT II
PART – A

1. What do you mean by Automatic Repeat Request (ARQ)?


ARQ means retransmission of data in three cases:

 Damaged Frame
 Lost Frame
 Lost Acknowledge

2. What are the responsibilities of Data Link Layer?


The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is
responsible for node-node delivery.

 Framing
 Physical Addressing
 Flow Control
 Error Control
 Access Control

3. What are the three protocols used for noisy channels?


The three protocols used for noisy channels

1. Stop – and – Wait ARQ


2. Go – back – N ARQ
3. Selective Repeat ARQ

4. What is CSMA/CD?
Carrier Sense Multiple Access with Collision Detection is a protocol used to sense whether a medium is
busy before transmission and it also has the ability to detect whether the packets has collided with
another

5. What are the various types of connecting devices?


There are five types of connecting devices

1. Repeaters
2. Hubs

27 | P a g e
Computer Networks III CSE Ms.J.Priya

3. Bridges
4. Routers
5. Switches.

6. Define Flow control


It refers to a set of procedures used to restrict the amount of data the sender can sent before waiting for
an acknowledgement

7. What are the categories of Flow control?


The categories of Flow control are

 Stop& wait
 Sliding Window

8. Mention the disadvantages of stop& wait. 

 Inefficiency
 Slow process

9. What are the functions of data link layer?


The functions of data link layer are

 Flow control
 Error control

10. Define Link Discipline


It coordinates the link system. It determines which device can send and when it can send.

11. What do you mean by polling?


When the primary device is ready to receive data, it asks the secondary to send data. This is called
polling.

12.What are the various controlled access methods?


The various controlled access methods are

1. Reservation
2. Token passing
3. Polling

13 What are the various Random access methods?\


The various Random access methods are

 Slotted ALOHA
 CSMA
 CSMA/CD,CSMA/CA

28 | P a g e
Computer Networks III CSE Ms.J.Priya

14. Define Piconet


A Bluetooth network is called Piconet .It can have up to eight stations one of which is called the master
and the rest are called slaves,

15. What is the frequency range of Bluetooth devices?


The frequency range of Bluetooth device is 2.4 GHZ

16. What is the need of connecting devices?


To connect LANs or segments of LAN we use connecting devices. These devices can operate in
different layers of internet model.

17. What type of address a data link layer is using?


The data link layer is using a physical address

18. What do you mean by Backbone networks?


It allows several LANs to be connected. The architecture used are Star and Bus

19. What is the need of frame relay?


It is a Virtual circuit wide area network that was designed to respond to demands for a new type of
WAN.

20. What is the maximum length of a datagram?


The maximum length of a datagram is 65,535 bytes.

UNIT III

PART A

1. What are the responsibilities of Network Layer?


The Network Layer is responsible for the source-to-destination delivery of packet possibly across
multiple networks (links).
a. Logical Addressing
b. Routing.

2. What is DHCP?
The Dynamic Host Configuration Protocol has been derived to provide dynamic configuration. DHCP
is also needed when a host moves from network to network or is connected and disconnected from a
network.

3. Define ICMP?
Internet Control Message Protocol is a collection of error messages that are sent back to the source host
whenever a router or host is unable to process an IP datagram successfully.

4. What is BOOTP?
BOOTSTRAP Protocol is a client/server protocol designed to provide the following four information

29 | P a g e
Computer Networks III CSE Ms.J.Priya

for a diskless computer or a computer that is booted for the first time. IP address, Subnet mask, IP
address of a router, IP address of a name server.

5. What is the need of internetwork?


To exchange data between networks, they need to be connected to make an Internetwork.

6. What are the types of class full addressing?


The types are Class A, Class B, Class C, Class D, Class E

7. What do you mean by ARP?


ARP stands for Address resolution protocol, maps an IP address to a MAC address

8. What do you mean by RARP?


RARP stands for Reverse Address resolution protocol, maps an MAC address to a IP address

9. Define Delivery of a packet.


It refers to the way a packet is handled by the underlying network under the control of network layer

10. What are the types of delivery?


There are two types of delivery
1. Direct delivery
2. Indirect delivery

11. What is class less addressing?


Classless addressing requires hierarchical and geographical routing to prevent immense routing tables

12. What is Unicast & Multicast communication?


Unicast communication is one source sending a packet to one destination. Multicast communication is
one source sending a packet to multiple destinations.

13. What do you mean by Net id & Host id?


The Internet address (or IP address) is 32 bits (for IPv4) that uniquely and universally defines a host or
router on the Internet. The portion of the IP address that identifies the network is called the net id. The
portion of the IP address that identifies the host or router on the network is called the host id.

14. Define forwarding.


It refers to a way a packet is delivered to next station. It requires a host or a Router to have a routing
table

15. What are the common notations used for address?


The two common notations used for address are

 Binary notations
 Dotted decimal notations

16. What are the advantages of IPV6 over IPV4?

30 | P a g e
Computer Networks III CSE Ms.J.Priya

 Larger address space


 Better header format
 New options
 Support for more security

17. Define static mapping.


It creating a table that associates an IP address with a MAC address

18. Compare direct delivery & indirect delivery


In direct delivery source and destination node belong to e same network In indirect delivery source and
destination node belong to different network

19. What are the rules of non boundary-level masking?

 The bytes in the IP address that corresponds to 255 in the mask will be repeated in the Sub
network address
 The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the sub network
address
 For other bytes, use the bit-wise AND operator

20. What is Fragmentation?


Fragmentation is the division of a datagram into smaller units to accommodate the MTU of a data link
protocol.

UNIT IV

PART - A

1. What are the responsibilities of Transport Layer?


The Transport Layer is responsible for source-to-destination delivery of the entire
message.
a. Service-point Addressing
b. Segmentation and reassembly
c. Connection Control
d. Flow Control
e. Error Control

2. Define Congestion
It will occur if the number of packets sent to the network is greater than the Capacity
of the network.

3. What do you mean by Congestion control?


It is a mechanism and technique to control the congestion

4. What are the types of congestion control?


There are two types of congestion control

31 | P a g e
Computer Networks III CSE Ms.J.Priya

 Open loop congestion control


 Closed loop congestion control

5. What are the two factors that measure network performance?


The two factors that measure network performance are

 Delay
 Throughput

6. Compare Open loop Congestion Control & Closed loop congestion control
In Open loop congestion control, policies are applied to prevent congestion before it happens.
In Closed loop congestion control, policies are applied to reduce congestion after it happens.

7. What is meant by quality of service?


The quality of service defines a set of attributes related to the performance of the is connection. For
each connection, the user can request a particular attribute each service class associated with a set of
attributes.

8. What do you mean by TCP?


TCP guarantees the reliable, in order delivery of a stream of bytes. It is a full-duplex protocol, meaning
that each TCP connection supports a pair of byte streams, one flowing in each direction.

9. Explain the three types of addresses in TCP/IP?


Three types of addresses are used by systems using the TCP/IP protocol: the physical address, the
internetwork address (IP address), and the port address

10. What are the flow characteristics related to QOS?


The flow characteristics related to QOS are

 Reliability
 Delay
 Jitter
 Bandwidth

11. What are the techniques to improve QOS?


The techniques to improve QOS are

 Scheduling
 Traffic shaping
 Resource reservation
 Admission control

12. Define Socket address


The combination of IP address and port address is called Socket address

32 | P a g e
Computer Networks III CSE Ms.J.Priya

13. What are the two types of protocols used in Transport layer?
The two types of protocols used in Transport layer are

 TCP
 UDP

14.Define Throughput.
It is defines as a number of packets passing through the network in a unit of time

15.Define UDP
User datagram protocol is a Unreliable, connectionless protocol, used along with the IP protocol

16.What is the need of port numbers?


Port numbers are used as a addressing mechanism in transport layer

17. What are the types of port numbers used in transport layer?

 Well-known port
 Registered port
 Dynamic port

18. Why TCP services are called Stream delivery services?


TCP allows the sending process to deliver data as a stream of bytes and the receiving process to deliver
data as a stream of bytes. so it is called as stream of bytes.

19 .Define jitter
It is the variation in delay for packets belonging to same flow .

20. Compare connectionless service & connection oriented service


In connection less service there is no connection between transmitter & receiver Ex: TCP
In connection oriented service there is a connection between transmitter & receiver Ex: UDP

UNIT V
PART - A

What are the responsibilities of Application Layer?


The Application Layer enables the user, whether human or software, to access the network. It provides
user interfaces and support for services such as e-mail, shared database management and other types of
distributed information services

 Network virtual Terminal


 File transfer, access and Management (FTAM)
 Mail services
 Directory Services

33 | P a g e
Computer Networks III CSE Ms.J.Priya

2. What is Encapsulation and De-capsulation ?


To send a message from one application program to another, the TCP/UDP protocol encapsulates and
de-capsulate messages.

3. What is DNS?
Domain name service is the method by which Internet address in mnemonic form such assun.it.ac.in are
converted into the equivalent numeric IP address such as 134.220.4.1

4. What is Fully Qualified Domain Name?


If a label is terminated by a null string is called a Fully Qualified Domain Name,

5. What is Generic Domains?


Generic domain define registered hosts according to their generic behaviour. Each node in the tree
defines a domain, which is an index to the domain name space database
Eg. com – Commercial organizations
edu – Educational institutions
gov – Government institutions

6. What is simple mail transfer protocol?


The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail Transfer
Protocol (SMTP). It is a system for sending messages to other computer users based on email
addresses.

7. What is User Agent?


A user Agent is defined in SMTP, but the implementation details are not. The UA is normally a
program used to send and receive mail

8. What do you mean by File transfer protocol?


It is a standard mechanism provided by the internet for copying a file from one host to another

9. What are the two types of connections in FTP?


The two types of connections in FTP are

 Control connection
 Open connection

10. Define HTTP.


It is used mainly to access data on the World Wide Web. The protocol transfer data in the form of
plaintext, hypertext, audio, video and so on

11. What are the types of messages in HTTP transaction?


The types of messages in HTTP transaction are

 Request messages
 Response messages

34 | P a g e
Computer Networks III CSE Ms.J.Priya

12. What are the parts of a browser?


The parts of a browser are

 A controller
 A client program
 Interpreter

13. Name the four aspects of security.

 Privacy
 Authentication
 Integrity
 Non-repudiation

14. Define Cryptography.


The science and art of manipulating messages to make them secure.

15, Define authentication.


It means that the receiver is sure of the sender identity.

16. What do you mean by encryption?


The process of converting plain text to cipher text.

17. Define Privacy


It means that sender and receiver expect confidentiality.

18. What do you mean by Symmetric key cryptography?


In Symmetric key cryptography both the parties will use the same key.

19. What are steps to transfer a mail message?


The steps in transferring a mail message are
a) Connection establishment
b) Mail transfer
c) Connection termination

20. What is POP?


Post Office Protocol, version3 (POP3) and Internet Mail Access Protocol version4 (IMAP4) are
protocol used by a mail server in conjunction with SMTP to receive and hold mail for hosts.

21. What do you mean by topology? What are the most popular topologies?
Ans. Topology refers to the way which the workstations attached to the network are interconnected.
The most popular topologies are: Bus, Ring ,Star,Tree

35 | P a g e
Computer Networks III CSE Ms.J.Priya

PREVIOUS UNIVERSITY QUESTION PAPERS

36 | P a g e
Computer Networks III CSE Ms.J.Priya

37 | P a g e
Computer Networks III CSE Ms.J.Priya

38 | P a g e
Computer Networks III CSE Ms.J.Priya

39 | P a g e
Computer Networks III CSE Ms.J.Priya

40 | P a g e
Computer Networks III CSE Ms.J.Priya

41 | P a g e
Computer Networks III CSE Ms.J.Priya

42 | P a g e
Computer Networks III CSE Ms.J.Priya

43 | P a g e
Computer Networks III CSE Ms.J.Priya

44 | P a g e
Computer Networks III CSE Ms.J.Priya

45 | P a g e
Computer Networks III CSE Ms.J.Priya

46 | P a g e
Computer Networks III CSE Ms.J.Priya

47 | P a g e
Computer Networks III CSE Ms.J.Priya

48 | P a g e
Computer Networks III CSE Ms.J.Priya

TUTORIAL SHEET

Tutorials allow group discussion of lecture content and assessment, and presentation and debate
on themes and concepts related to the course. Tutorials are a fantastic way to explore ideas and get new
perspectives. Tutorials also allow for close progress monitoring, so tutors can quickly provide
additional support if necessary.
The details about Tutorial Classes and its schedule for Computer Networks is shown below

Unit-I Topics Discussed


Topic Name Date
TCP/IP Protocol suite & OSI and TCP/IP comparison 24/07/2017

Unit-II Topics Discussed


Topic Name Date
Ethernet, Physical Layer, Mac Sub layer 07/08/2017

Unit-III Topics Discussed


Topic Name Date
Distance Vector Routing, Count-to-Infinity Problem & Hierarchical 31/08/2017
Routing
Unit-IV Topics Discussed
Topic Name Date
IPV4,IPV6, CIDR,IMCP,ARP, RARP & DHCP 22/09/2017

Unit-V Topics Discussed


Topic Name Date
Electronic Mail, TELNET, HTTP, FTP, DNS & SSH 21/10/2017

49 | P a g e
Computer Networks III CSE Ms.J.Priya

TOPICS BEYOND SYLLABUS

Unit No Proposed topics Reason for Introduction

Unit 1 Nil Nil

Before learning about Internet


Methods of Channel Access on Links
Unit 2 Protocols this techniques must be
and Wireless Mesh Network
taught to students.

To create more interest among students


Unit 3 Challenges for Mobile Networking about practicality of Computer
Networks

Unit 4 Nil Nil

Unit 5 Nil Nil

50 | P a g e
Computer Networks III CSE Ms.J.Priya

GROUP DISCUSSION

Group 1:
Topic: Discuss about the importance of logical time and logical clock in distributed systems.
Batch List: 14U11A0530, 15U11A0501, 15U11A0502, 15U11A0503, 15U11A0506, 15U11A0507,
15U11A0508,
Group 2 :
Topic: Discuss about Consensus and Related Problems.
Batch List: 15U11A0509, 15U11A0510, 15U11A0511, 15U11A0512, 15U11A0513, 15U11A0514,
15U11A0515
Group 3:
Topic: Discuss about Resource Sharing and the Web Challenges
Batch List: 15U11A0516, 15U11A0518, 15U11A0519, 15U11A0520, 15U11A0521, 15U11A0522,
15U11A0523,

Group 4:
Topic: Discuss about major challenges in RPC and RMI
Batch List: 15U11A0525, 15U11A0526, 15U11A0527, 15U11A0528, 15U11A0529, 15U11A0530,
15U11A0531, 15U11A0535
Group 5:
Topic: Discuss about the challences in Name Services and Directory services
Batch List: 15U11A0536, 15U11A0537, 15U11A0541, 15U11A0542, 15U11A0544, 15U11A0545,
15U11A0546, 15U11A0547

Group 6:
Topic: Discuss about the various concurrency control methods
Batch List: 15U11A0548, 15U11A0550, 16U15A0502, 16U15A0503, 16U15A0504, 16U15A0505,
16U15A0507

51 | P a g e
Computer Networks III CSE Ms.J.Priya

PEER GROUP TEACHING


Peer Group Teaching is encouraged with the assumption that Students who work in pairs and
groups typically perform better on tests that involve reasoning and critical thinking. This is largely
because students must become active learners, discussing and rationalizing lesson concepts in their own
words. So Peer Group Teaching is done the previous day of Mid-Examination for revising the concepts.

Group 1:
Batch List: 14U11A0530, 15U11A0501, 15U11A0502, 15U11A0503, 15U11A0506
Group 2 :
Batch List: 15U11A0507, 15U11A0508,15U11A0509, 15U11A0510, 15U11A0511
Group 3:
Batch List: 15U11A0512, 15U11A0513, 15U11A0514, 15U11A0515, 15U11A0516
Group 4:
15U11A0518, 15U11A0519, 15U11A0520, 15U11A0521, 15U11A0522, 15U11A0523
Group 5:
Batch List: 15U11A0525, 15U11A0526, 15U11A0527, 15U11A0528, 15U11A0529
Group 6:
Batch List: 15U11A0530,, 15U11A0531, 15U11A0535, 15U11A0536, 15U11A0537,
Group 7:
15U11A0541, 15U11A0542, 15U11A0544, 15U11A0545, 15U11A0546, 15U11A0547
Group 8:
Batch List: 15U11A0548, 15U11A0550, 16U15A0502, 16U15A0503, 16U15A0504, 16U15A0505,
16U15A0507

52 | P a g e
Computer Networks III CSE Ms.J.Priya

QUIZ

QUIZ TEAMS
Team 1:
14U11A0530, 15U11A0501, 15U11A0502, 15U11A0503, 15U11A0506, 15U11A0507,
15U11A0508, 15U11A0509, 15U11A0510, 15U11A0511

Team 2 :
15U11A0512, 15U11A0513, 15U11A0514, 15U11A0515, 15U11A0516, 15U11A0518,
15U11A0519, 15U11A0520, 15U11A0521, 15U11A0522

Team 3:
15U11A0523, 15U11A0525, 15U11A0526, 15U11A0527, 15U11A0528, 15U11A0529,
15U11A0525, 15U11A0526

Team 4:
15U11A0527, 15U11A0528, 15U11A0529, 15U11A0530, 15U11A0531, 15U11A0535,
15U11A0536, 15U11A0537, 15U11A0541, 15U11A0542

Team 5:
15U11A0544, 15U11A0545, 15U11A0546, 15U11A0547, 15U11A0548, 15U11A0550,
16U15A0502, 16U15A0503, 16U15A0504, 16U15A0505, 16U15A0507

53 | P a g e
Computer Networks III CSE Ms.J.Priya

COMPUTER NETWORKS QUIZ-I


1. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11

b) 5

c) 10

d) 1

2. If the value in protocol field is 17, the transport layer protocol used is .
a) TCP

b) UDP

c) Either of the mentioned


d) None of the mentioned
3. The data field can carry which of the following?
a) TCP segemnt

b) UDP segment

c) ICMP messages
d) None of the mentioned
4. What should be the flag value to indicate the last fragment?
a) 0

b) 1
c) TTl value
d) None of the mentioned
5. Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
c) offer unreliable service
d) None of the mentioned
6. Fragmentation has following demerits
a) complicates routers

b) open to DOS attack


c) overlapping of fragments.
54 | P a g e
Computer Networks III CSE Ms.J.Priya

d) All of the mentioned


7. Which field helps to check rearrangement of the fragments?
a) offset

b) flag

c) TTL
d) identifer

8. The size of IP address in IPv6 is


a) 4bytes
b) 128bits

c) 8bytes

d) 100bits
9. The header length of an IPv6 datagram is .
a) 10bytes

b) 25bytes

c) 30bytes

d) 40bytes

10. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching

c) ToS field
d) Option field View Answer

11. IPv6 does not use type of address


a) Broadcast

b) Multicast

c) Anycast

d) None of the mentioned


12. These are the features present in IPv4 but not in IPv6.
a) Fragmentation

b) Header checksum
c) Options
d) All of the mentioned

55 | P a g e
Computer Networks III CSE Ms.J.Priya

13. The field determines the lifetime of IPv6 datagram


a) Hop limit
b) TTL

c) Next header
d) None of the mentioned
14. Dual-stack approach refers to
a) Implementing Ipv4 with 2 stacks
b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
d) None of the mentioned
15. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to
each other by intervening IPv4 routers. The best solution here is
a) use dual-stack approach

b) Tunnelling

c) No solution
d) Replace the system
16. Teredo is an automatic tunnelling technique. In each client the obfuscated IPv4 address is
represented by bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79

17. Which of this is not a constituent of residential telephone line?


a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) None of the mentioned
18. In DSL Telco provides these services
a) Wired phone access
b) ISP
c) All of the mentioned
d) None of the mentioned

56 | P a g e
Computer Networks III CSE Ms.J.Priya

19. The function of DSLAM is


a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) None of the mentioned
20. The following term is not associated with DSL
a) DSLAM
b) CO
c) Splitter
d) CMTS
21. HFC contains
a) Fibre cable
b) Coaxial cable
c) Both of the mentioned
d) None of the mentioned
22. Choose the statement which is not applicable for cable internet access
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
23. Among the optical-distribution architectures that is essentially switched ehternet is
a) AON
b) PON
c) NON
d) None of the mentioned
24. StarBand provides
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
25. Home Access is provided by

57 | P a g e
Computer Networks III CSE Ms.J.Priya

a) DSL
b) FTTP
c) Cable
d) All of the mentioned
26. ONT is connected to splitter using
a) High speed fibre cable
b) HFC

c) Optical cable
d) None of the mentioned
27. These factors affect transmission rate in DSL
a) The gauge of the twisted-pair line
b) Degree of electrical interference
c) Shadow fading
d) Both a and b
28. This is not a application layer protocol
a) HTTP
b) SMTP
c) FTP
d) TCP
29. The packet of information at the application layer is called
a) Packet
b) Message
c) Segment
d) Frame
30. This is one of the architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both a and b

COMPUTER NETWORKS QUIZ-II

58 | P a g e
Computer Networks III CSE Ms.J.Priya

1. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned

2. Application layer offers service


a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned
3. E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
4. Pick the odd one out
a) File transfer
b) File download
c) E-mail
d) Interactive games
5. Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
6. To deliver a message to the correct application program running on a host, the address
must be consulted
a) IP

b) MAC

c) Port

59 | P a g e
Computer Networks III CSE Ms.J.Priya

d) None of the mentioned


7. This is a time-sensitive service
a) File transfer
b) File download
c) E-mail

d) Internet telephony

8. Transport services available to applications in one or another form


a) Reliable data transfer
b) Timing

c) Security

d) All of the mentioned


9. Electronic mail uses this Application layer protocol
a) SMTP
b) HTTP

c) FTP

d) SIP

10. The number of objects in a Web page which consists of 4 jpeg images and HTML text is
a) 4

b) 1

c) 5

d) None of the mentioned


11. The default connection type used by HTTP is
a) Persistent

b) Non-persistent

c) Either of the mentioned


d) None of the mentioned
12. The time taken by a packet to travel from client to server and then back to the client is called

a) STT

b) RTT

c) PTT

d) None of the mentioned

60 | P a g e
Computer Networks III CSE Ms.J.Priya

13. The HTTP request message is sent in part of three-way handshake.


a) First
b) Second

c) Third

d) None of the mentioned


14. In the process of fetching a web page from a server the HTTP request/response takes RTTs.
a) 2

b) 1

c) 4

d) 3
15. The first line of HTTP request message is called
a) Request line
b) Header line
c) Status line
d) Entity line
16. The values GET, POST, HEAD etc are specified in of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
17. The method when used in the method field, leaves entity body empty.
a) POST

b) GET

c) Both of the mentioned


d) None of the mentioned
18. The HTTP response message leaves out the requested object when method is used
a) GET

b) POST

c) HEAD

d) PUT

19. Find the oddly matched HTTP status codes


a) 200 OK

61 | P a g e
Computer Networks III CSE Ms.J.Priya

b) 400 Bad Request


c) 301 Moved permanently
d) 304 Not Found
20. Which of the following is not correct ?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects
21. The conditional GET mechanism

a) Imposes conditions on the objects to be requested


b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned
22. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL

c) Method

d) None of the mentioned


23. Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
24. Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig
25. ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig

62 | P a g e
Computer Networks III CSE Ms.J.Priya

d) Both a and b
26. command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
27. If you want to find the number of routers between a source and destination, the utility to be used
is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
28. Which of the following is related to ipconfig in Microsoft Windows ?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned
29. This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) None of the mentioned
30. Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters

DIRECT ASSESSMENT OF COURSE OUTCOMES

63 | P a g e
Computer Networks III CSE Ms.J.Priya

64 | P a g e
Computer Networks III CSE Ms.J.Priya

COURSE EXIT SURVEY - INDIRECT ATTAINMENT OF COs


DISTRIBUTED SYSTEMS
2017-2018
Samskruti College of Engineering and Technology has developed this survey to assess the
effectiveness of our engineering program. The department is deeply committed to continuous quality
improvement, and this survey is an integral part of our assessment process. Please take a few minutes to
help us in this important endeavour. Thank you very much for your cooperation.

1. In this section you are asked to rate your capability in each of the Course Learning Outcomes(CO)
on a 1 to 5 numerical scale. Please take a few moments to acquaint yourself with these criteria.
5 = Strongly Agree 4 = Agree 3 = Neutral 2 = Disagree 1 = Strongly Disagree

Please circle the most appropriate number for each item

Course Learning Outcomes


(The course provides me the ability to …….)

S.N
o Course Outcomes Scale Percentage

1. CO1 Are you able to: Describe the concepts of distributed file
systems, database systems, and transaction processing 5 4 3 2 1 86.4
systems.
2. CO2 Are you able to: Design and analyze client-server based
systems using Coordination and Agreement with Time 5 4 3 2 1 64
and Global States.
3. CO3 Are you able to: Make critique and assessment on the
fundamental concepts of distributed systems and design 5 4 3 2 1 75.2
principles.
4. CO4 Are you able to: Design and analyze fault tolerance
transaction processing systems on top of the file systems. 5 4 3 2 1 80

2. In this section you are asked to rate your capability in each of the Program Learning
Outcomes(PO) on a 1 to 5 numerical scale. Please take a few moments to acquaint yourself with these
criteria.

5 = Strongly Agree 4 = Agree 3 = Neutral 2 = Disagree 1 = Strongly Disagree


Please circle the most appropriate number for each item.

Program Learning Outcomes


(The course provides me the ability to …….)

65 | P a g e
Computer Networks III CSE Ms.J.Priya

5. PO1 Engineering knowledge: Apply the knowledge of mathematics,


science, engineering fundamentals, and an engineering 5 4 3 21
specialization to the solution of complex engineering problems.
6. PO2 Problem analysis: Identify, formulate, review research literature,
and analyze complex engineering problems reaching
5 4 3 21
substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.
7. PO3 Design/development of solutions: Design solutions for complex 5 4 3 21
engineering problems and design system components or
processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural,
societal, and environmental considerations
8. PO5 Modern tool usage: Create, select, and apply appropriate 5 4 3 21
techniques, resources, and modern engineering and IT tools
including prediction and modeling to complex engineering
activities with an understanding of the limitations.
9. PO12 Life-long learning: Recognize the need for, and have the 5 4 3 21
preparation and ability to engage in independent and life-long
learning in the broadest context of technological change.
Course Delivery
10. On an average, how effectively the faculty engaged the lecture/practical
5 4 3 21
timing to teach you the concepts?
11. Are you satisfied with the overall content presentation & delivery skills
5 4 3 21
of the faculty?
12. Are you satisfied with the activities conducted by faculty to make you
5 4 3 21
actively participate during the lectures/practical’s?
13. Are the resource materials of the course made available to you on time? 5 4 3 21
14. Are the resource materials provided by the faculty useful to you for
5 4 3 21
understanding the concepts better after lecture?
15. Is the faculty of the course available to address your queries after lecture
5 4 3 21
hours?
16. Is the faculty of the course solving your queries to your satisfaction? 5 4 3 21
17. Your rating on the subject knowledge of the faculty? 5 4 3 21
18. What was your overall satisfaction level with the faculty of the course? 5 4 3 21
Course Evaluation

19. How correctly is the faculty assessing your course work through 5 4 3 21
assessments & evaluations?
20. Are you satisfied with the levels of Question paper? 5 4 3 21
21. Are the assessments & evaluations completed on time? 5 4 3 21
22. Rate your satisfaction level on the evaluation of the course’s end 5 4 3 21
semester exam.
Suggestions
23. Your dislikes about the course/faculty!!!

66 | P a g e
Computer Networks III CSE Ms.J.Priya

24. What do you think, if this is done can improve the course/faculty much better in future!!!
Mention your suggestions.

25. What did you like most about the course/faculty?

Thank you for taking to time to fill up this survey

67 | P a g e
Computer Networks III CSE Ms.J.Priya

SAMSKRUTI COLLEGE OF ENGINEERING AND TECHNOLOGY


I Mid Term Examinations
Distributed Systems
III Year II Semester
Date: 09/02/2018 Subject Code: A60521

Answer any two. (2*5=10)


1. Explain in detail about Architectural model. (CO1)
2. Explain in detail about Interaction model. (CO2)
3. Explain about Failure Model. (CO3)

SAMSKRUTI COLLEGE OF ENGINEERING AND TECHNOLOGY


II Mid Term Examinations
Distributed Systems
III Year II Semester
Date: 07/04/2018 Subject Code: A60521
Answer any two. (2*5=10)
1. Explain in detail about Deadlock. (CO4)
2. Explain in detail about Atomic Commit Protocol. (CO5)
3. Explain in detail about RPC and RMI (CO6)

68 | P a g e
Computer Networks III CSE Ms.J.Priya

Samskruti College of Engineering and Technology


Kondapur(V), Ghatkesar(M), R.R.Dist, Hyderabad.

10/02/2018
CIRCULAR

All the students are hereby informed that remedial classes will be conducted for the students
for those who failed in MidI Examination from 12.02.2018 during 4.15 p.m to 5.15 p.m.

I II III IV V VI VII 4:15 PM


DAY 12:35 PM
9:15 AM 10:05 AM 10:55 AM 11:45 AM 1:15 PM 2:15 PM 3:15 PM 5:15 PM
TIME 1:15 PM
10:05 AM 10:55 AM 11:45 AM 12:35 PM 2:15 PM 3:15 PM 4:15 PM
WT
MON
OOAD
TUE

WED STM

THU IS

FRI MEFA
DS
SAT

HOD

CODE SUBJECT FACULTY NAME


126AP DS : Distributed Systems Dr.S.Jayanthi
126EP WT : Web Technologies Mr. Syed Azahad
126EQ OOAD : Object Oriented Analysis and Design Mr. M. Raghavendra Rao
126ER STM : Software Testing Methodologies Mrs. P. Divya
126AQ IS : Information Security Mrs. P. Yamuna
MEFA : Managerial Economics And Financial
126EJ Ms. G. Sailatha
Analysis

CC: Principal
CC: Director
CC: All Faculty
CC: File Copy

69 | P a g e
Computer Networks III CSE Ms.J.Priya

SAMSKRUTI COLLEGE OF ENGINEERING AND TECHNOLOGY


COMPUTER SCIENCE AND ENGINEERING
DISTRIBUTED SYSTEMS (2017-2018)

REMEDIAL CLASS ATTENDANCE SHEET FOR SLOW LEARNERS

Hall Ticket
S.No Name 17/02 24/02 03/03 17/03 24/03 31/03 07/03 21/03 28/03
No
1. 15U11A0509 Erva karthik A A
2. 15U11A0514 Sai Anusha A A A
3. 15U11A0515 Jamalpur A
vandana A

4. 15U11A0516 Jogu bhavani A


5. 15U11A0518 Kunchala
sandhya A

Faculty Incharge HOD

70 | P a g e
Computer Networks III CSE Ms.J.Priya

REMEDIAL CLASSES REPORT

Remedial Classes are conducted after analyzing the results of MidI Examinations for slow learners,
who have failed in more than three subjects in MIDI-Exams, during 4.15.p.m-5.15p.m.

Unit Number Date Conducted Topics Revised


17/02/2018
Architectural Models
Unit-I
24/02/2018 Fundamental Models
03/03/2018
Unit-II Logical Time And Logical Clocks

17/03/2018 Elections
External Data Representation And
Unit-III 24/03/2018 Marshalling

31/03/2018 Remote Procedure Call


07/03/2018
File Service Architecture
Unit-IV
21/03/2018
Global Name Services
Unit-V 28/03/2018 Locks, Optimistic Concurrency Control

Faculty Incharge HOD

71 | P a g e
Computer Networks III CSE Ms.J.Priya

COURSE OUTCOME ASSESSMENT SHEETS


Direct Assessment
Continuous Internal Evaluation Assignment JNTUH Exam
TEST-1 TEST-2 Assignment Assignment
No1 No2
Sl. No. Reg .No Name of Student
CO1 CO2 CO3 CO4 CO1 CO2 CO3 CO4

Max marks allotted


5 5 5 5 5 5 5 5 75
THRESHOLD VALUE
3.5 3.5 3.5 3.5 4 4 4 4 50
1 14U11A0530 Kalavena Aditya 4 4 0 5 5 5 5 68
2 15U11A0501 Avunoori Kalyan 3 0 3 5 5 5 5 60
3 15U11A0502 Baja shyam 4 3.5 4 5 5 5 5 56
4 15U11A0503 Battu mahesh 4 5 4 0 5 5 5 5 60
5 15U11A0506 Chunchu manasa 4.5 2.5 3.5 0 5 5 5 4 55
6 15U11A0507 Cirra santosh 4 4 4 4 5 5 5 5 20
7 15U11A0508 Erra niharika 2.5 0 2.5 4 5 4 5 56
8 15U11A0509 Erva karthik 4 0 4 5 4 5 5 60
9 15U11A0510 G vandana 4.5 4.5 0 5 5 5 5 56
10 15U11A0511 Ggaddameedi saikumar
4.5 4 4.5 4 5 5 5 5 30
11 15U11A0512 Gundeboina jayachandra 4.5 4.5 4 4.5 5 5 5 5 60
12 15U11A0513 Gundu shashidhar 3.5 3.5 0 5 5 5 5 32
13 15U11A0514 Inavilli srinaga sai anusha 3.5 0 4.5 5 5 5 5 30
14 15U11A0515 Jamalpur vandana 3.5 4 3.5 4 5 4 5 5 67
15 15U11A0516 Jogu bhavani 2.5 2.5 0 5 5 5 5 30

72 | P a g e
Computer Networks III CSE Ms.J.Priya

16 15U11A0518 Kunchala sandhya 4.5 4.5 0 5 5 5 4 45


17 15U11A0519 Mamilla manideep yadav 4.5 0 4.5 5 5 5 5 50
18 15U11A0520 Mushugumpula prabhavathi
4.5 0 4.5 5 5 5 5 70
19 15U11A0521 Panjala sowmyasree
4.5 0 4 5 4 5 4 40
20 15U11A0522 Potharaju sai rohan 3.5 0 3.5 5 5 5 5 67
21 15U11A0523 Ramagiri vandana 4 4.5 3.5 4.5 5 5 5 5 45
22 15U11A0525 Samreen begum 4 3.5 0 5 5 4 5 67
23 15U11A0526 Sankepally ajith reddy 4 0 4 5 5 5 5 45
24 15U11A0527 Thakur vishal singh 3 3.5 3 3.5 5 5 5 5 20
25 15U11A0528 Thatipamula rushma
4 4 4 4 5 5 5 5 60
No of Students attended the questions 20 14 16 17 25 25 25 25 25
No of students scored more than target value
18 12 15 15 20 21 24 23 15

DIRECT - CO- ATTAINMENT % 90 85.71 93.75 88.23 80 84 96 92 60

20% of CIE, 5% of Assignment, 75% of University Exam 18 17 19 18 4 4 5 5 45

Formula for Direct Attainment of CO


=20% CIE + 5%Assignment + 75%University Exam Results

73 | P a g e
SAMSKKRTUI COLLEGE OF ENGINEERING AND TECHNOLOGY
COMPUTER SCIENCE AND ENGINERING
Course Outcome Assessment - Indirect Assessment - Course Exit Survey
Distributed Systems
Sl. Reg .No Name of Student CO1 CO2 CO3 CO4
No.
1 14U11A0530 Kalavena Aditya 10 8 8 6
2 15U11A0501 Avunoori Kalyan 8 6 8 10
3 15U11A0502 Baja shyam 10 6 8 6
4 15U11A0503 Battu mahesh 8 6 8 10
5 15U11A0506 Chunchu manasa 10 8 8 6
6 15U11A0507 Cirra santosh 8 6 8 10
7 15U11A0508 Erra niharika 10 6 8 6
8 15U11A0509 Erva karthik 8 6 4 10
9 15U11A0510 G vandana 8 6 8 10
10 15U11A0511 Ggaddameedi saikumar 10 10 8 6
11 15U11A0512 Gundeboina jayachandra 8 6 8 10
12 15U11A0513 Gundu shashidhar 10 8 8 6
13 15U11A0514 Inavilli srinaga sai anusha 8 6 8 10
14 15U11A0515 Jamalpur vandana 10 8 8 6
15 15U11A0516 Jogu bhavani 8 6 8 10
16 15U11A0518 Kunchala sandhya 10 6 8 6
17 15U11A0519 Mamilla manideep yadav 8 6 8 10
18 15U11A0520 Mushugumpula prabhavathi 8 6 8 10
19 15U11A0521 Panjala sowmyasree 10 6 4 6
20 15U11A0522 Potharaju sai rohan 8 6 8 10
21 15U11A0523 Ramagiri vandana 8 6 8 6
22 15U11A0525 Samreen begum 8 6 8 10
23 15U11A0526 Sankepally ajith reddy 8 6 8 10
24 15U11A0527 Thakur vishal singh 10 6 8 6
25 15U11A0528 Thatipamula rushma 4 4 4 4
No of Students Opted on 5 point likert scale 10 10 1 0 13
Marks
(5=10 marks, 4=8 marks, 3=6 marks, 2=4 8 14 4 22 0
marks, 1=0 marks) Marks
4 0 19 0 11
Marks
2 1 1 3 1
Marks
0 0 0 0 0
Marks
No of Students attended the questions 25 25 25 25
CO- ATTAINMENT 8.64 6.4 7.52 8

74
CO Attainment Calculation (Direct & Indirect)

DIRECT ATTAINMENT

CO Attainment
Assessment
Weightage CO1 CO2 CO3 CO4
Mid Semester
20% 18 17 20 19
Examination
Assignment 5% 4 4 5 5
End Semester Exam 75% 45 45 45 45
Direct CO Attainment
67 66 70 69

Direct CO Attainment % =25%CIE+ 5%Assignment + 75%( End Semester Examination)

INDIRECT ATTAINMENT
Course Exit Survey Options
Map Indirect
Formula Indirect CO Attainment CO
with = (((A*10)+ (B*8) + (C*6) + (D*4) + (E*0)/Total Strength)*10) Attainment
CO A B C D E %
(Weightage 10) (Weightage 8) (Weightage 6) (Weightage 4) (Weightage 0)
CO1 10 14 0 1 0 86.4
CO2 1 4 19 1 0 64
CO3 0 22 0 3 0 75.2
CO4 13 0 11 1 0 80

CO Attainment =80%Direct Attainment + 20%Indirect Attainment


Direct Indirect CO Attainment
Assessment Direct Indirect
(80%) (20%) 0.80*DA+0.20*IDA
CO1 67 86.4 53.6 17.28 70.88
CO2 66 64 52.8 12.8 65.6
CO3 70 75.2 56 15.04 71.04
CO4 69 80 55.2 16 71.2

75
PROGRAM OUTCOME ATTAINMENT

PO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO

CO1 2 2 2 - - - - - - - - 3

CO2 3 3 3 - 3 - - - - - - 3

CO3 3 3 3 - - - - - - - - 3

CO4 3 3 3 - 3 - - - - - - 3
PO Attainment (Avg
3 3 3 - 3 - - - - - - 3
Value)

PROGRAM SPECIFIC OUTCOMES(PSO) ATTAINMENT


PSO
PSO1 PSO2 PSO3
CO
CO1 2 2 2
CO2 3 3 3
CO3 3 3 3
CO4 3 3 3
PO Attainment(Avg
3 3 3
Value)

76
Course Outcome Assessment Sheet

% of Attainment (till date): Assessment after declaring results


Base Value of:
COs
CO
Attainment Gap Remarks/Gap Analysis Recommendations
Total
Level
Students were unable to recall Conduct more quiz sessions or
the terminology active learning activities to
CO1 75% 70.8 2 --5.2
enable the students to recall the
terminologies

CO2 65% 65.6 3 Nil Nil Nil

CO3 60% 71.04 3 Nil Nil Nil

CO4 60% 71.2 3 Nil Nil Nil

Total CO attainment: 71.12 Nil Nil


Resolutions made (By Faculty/ Department): Status:
1. The recommendations will be put in to practice from the next academic year 1. NIL
2. 2.
3.

FACULTY INCHARGE HOD

77

Potrebbero piacerti anche