GUJARAT TECHNOLOGICAL UNIVERSITY (GTU)#
Competency-focused Outcome-based Green Curriculum-2021 (COGC-2021) 6 TH Semester#
Course Title: Computer Networks & Data Communication#
(Course Code: 4361101)
| Diploma Programme in which this course is offered | Semester in which offered |
|---|---|
| Electronics and Communication | Sixth |
1. RATIONALE#
Computer Networks & Data Communication is crucial for students as it forms the backbone of modern communication systems. Understanding this subject is essential for comprehending how data is transferred and shared across devices and networks. It enables students to grasp the fundamentals of internet protocols, network security, and the seamless flow of information in the digital age. Proficiency in this subject is essential for various careers, ensuring students are well-equipped for the ever-evolving technology landscape. Thus, this course is an important course for students who want to work in network administration, cybersecurity, software development, and systems engineering.
2. COMPETENCY#
The course content should be taught and implemented with the aim to develop various types of related skills leading to the achievement of the following competency
Utilize hardware and software technologies For the purpose of setting up, commissioning and maintaining secure computer networks.
3. COURSE OUTCOMES (COs)#
The theory should be taught and practical should be carried out in such a manner that students are able to acquire different learning outcomes in cognitive, psychomotor and affective domain to demonstrate following course outcomes.
- i. Analyze the key concepts of data communication, the various physical network topologies and layered models.
- ii. Select proper transmission media and devices based on network requirements
- iii. Manage contemporary network infrastructures and configure fundamental network devices based on criteria and analyze communication protocols of hardware layer
- iv. Use Internet protocols and standards.
- v. Understanding of network security, cryptography, IP security, web security, information security standards.
TEACHING AND EXAMINATION SCHEME#
| Teaching Scheme | Teaching Scheme | Teaching Scheme | Total Credits | Examination Scheme | Examination Scheme | Examination Scheme | Examination Scheme |
|---|---|---|---|---|---|---|---|
| (In Hours) | (In Hours) | (In Hours) | (L+T+P/2) | Theory Marks | Theory Marks | Practical Marks | Practical Marks |
| L | T | P | C | CA | ESE | CA ESE | Total Marks |
| 3 | - | 2 | 4 | 30* | 70 | 25 25 | 150 |
(*):Out of 30 marks under the theory CA, 10 marks are for assessment of the micro-project to facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be taken during the semester for assessing the attainment of the cognitive domain UOs required for the attainment of the COs.
Legends: L -Lecture; T - Tutorial/Teacher Guided Theory Practice; P -Practical; C - Credit, CA -Continuous Assessment; ESE -End Semester Examination.
4. SUGGESTED PRACTICAL EXERCISES#
The following practical outcomes (PrOs) are the subcomponents of the COs. . These PrOs need to be attained to achieve the COs.
| S. No. | Practical Outcomes (PrOs) | Unit No. | Approx. Hrs. Required |
|---|---|---|---|
| 1. | Perform and Verify Ring topology using Trainer Kit. | 1 | 02 |
| 2. | Introduction to Network Simulator Tool Packet Tracer Simulator. | 1 | 02 |
| 3. | Building a Simple Network | 1 | 02 |
| 4. | Using Wireshark to View Network Traffic | 2 | 02 |
| 5. | Building Ethernet Straight and Crossover Cable | 2 | 02 |
| 6. | Build a Simple Two Computers Network and Verify the Connectivity in Packet Tracer Simulator. | 2 | 02 |
| 7. | Configure and Verify the Basic Switch Settings by using 2960 Switch. | 2 | 02 |
| 8. | Set Various Passwords on 1941 Router and Verify those Passwords. | 2 | 02 |
| 9. | Configure and Verify the Basic Router Settings by using 1941 Router. | 2 | 02 |
| 10. | Virtual LAN Configuration in Packet Tracer by using 2960 Switch. | 2 | 02 |
| 11. | Inter-virtual LAN Configuration using Legacy Inter-Virtual LAN Routing. | 3 | 02 |
| 12. | Inter-virtual LAN Configuration using Router on Stick Inter-Virtual LAN Routing. | 3 | 02 |
| 13. | Inter-virtual LAN Configuration using Multi-Layer Switch Inter- Virtual LAN Routing. | 3 | 02 |
| 14. | Implement Spanning Tree Protocol using Three Switches. | 3 | 02 |
| 15. | Implement Ether-Channel using LACP and PAGP Protocols. | 3 | 02 |
| 16. | Router as a Server and as a Client Configuration using DHCPv4 Protocol. | 4 | 02 |
| Total | 30 |
Note#
- i. More Practical Exercises can be designed and offered by the respective course teacher to develop the industry relevant skills/outcomes to match the COs. The above table is only a suggestive list .
- ii. The following are some sample ‘Process’ and ‘Product’ related skills (more may be added/deleted depending on the course) that occur in the above listed Practical Exercises of this course required which are in the COs and ultimately the competency.
| S. No. | Sample Performance Indicators for the PrOs | Weightage in % |
|---|---|---|
| 1 | Lab Records | 05 |
| 2 | Question answer or Writing steps exercise | 20 |
| 3 | Executing of exercise | 40 |
| 4 | Printout/ Result | 20 |
| 5 | Viva voice | 15 |
| Total | Total | 100 |
5. MAJOR EQUIPMENT/ INSTRUMENTS REQUIRED#
- I. Computer
- II. Topology Trainer Kit
LIST OF SOFTWARE#
- I. Cisco Packet Tracer
- II. https://www.netacad.com/courses/packet-tracer
6. AFFECTIVE DOMAIN OUTCOMES#
The following sample Affective Domain Outcomes (ADOs) are embedded in many of the above-mentioned COs and PrOs. More could be added to fulfill the development of this competency.
- a) Work as a leader/a team member.
- b) Follow ethical practices.
The ADOs are best developed through the laboratory/field-based exercises. Moreover, the level of achievement of the ADOs according to Krathwohl’s ‘Affective Domain Taxonomy’ should gradually increase as planned below:
- i. ‘Valuing Level’ in 1 st year
- ii. ‘Organization Level’ in 2 nd year.
- iii. ‘Characterization Level’ in 3 rd year.
7. UNDERPINNING THEORY#
Only the major Underpinning Theory is formulated as higher level UOs of Revised Bloom’s taxonomy in order development of the COs and competency is not missed out by the students and teachers. If required, more such higher level UOs could be included by the course teacher to focus on attainment of COs and competency.
:
| Unit | Unit Outcomes (UOs) (4 to 6 UOs at Application and above level) | Topics and Sub-topics |
|---|---|---|
| Unit - I Fundamental s of Networking & Data Communicat ion | 1.a Explain data communication and its significance in the field of information technology. 1.b Explain and distinguish various physical network topologies, including bus, ring, star, mesh, and hybrid configurations, and comprehend their implications for network design and performance. 1.c Define Protocol and standards 1.d Explain the need for layer modeling. 1.e Describe the functions of each layer of OSI Reference model. 1.f Describe the functions of each layer of TCP/IP Reference model. 1.e Describe internet model. 1.f Explain concepts in Data Communication | 1.1 Need, Advantages and Applications of Computer Networks 1.2 Physical topologies of Network Star, Ring, Bus, Mesh, Tree, Hybrid 1.3 Internet Standards: Protocol, Interface, Services, Primitives, semantics, syntax 1.4 Network Classification i. Based on Transmission Technologies: Point-to point, broadcast ii. Based on scale: PAN, LAN, WAN, MAN,VPN, Internet iii. Based on Architecture: Peer to Peer, Client Server, advantages of Client Server over Peer-to-Peer Model 1.5 layering of Models |
Course Code: 4361101
| Unit | Unit Outcomes (UOs) (4 to 6 UOs at Application and above level) | Topics and Sub-topics |
|---|---|---|
| Networking | 1.6 OSI and TCP/IP models and their comparison 1.7 Concept of Internet model. 1.8 Concepts in Data Communication Networking | |
| Unit - II Network Devices | 2.a Explain functions of following network devices: Repeater, Hub, Bridge, Switch Router, B-router, Gateway, Network Adapter, Access point, Wireless Access points and role of them at layer 2 and layer 3. 2.b Differentiate all network devices. 2.c Function firewall in network security. 2.d Describe a network management system with functions of OS, CLI, Administrative Functions, Interfaces. 2.e Explain and distinguish Ethernet, Fast Ethernet, Gigabit Ethernet. 2.f Explain wireless LAN. 2.g Explain FDDI & CDDI | , 2.1 Classification of Transmission Media: Role of different devices 2.2 Repeaters, Hubs, Bridges, Switches (layer 2 and layer 3) 2.3 Routers 2.4 Access Points 2.5 Firewall 2.6 Introduction to Network management system (OS, CLI, Administrative Functions, Interfaces) 2.7 Ethernet, Fast Ethernet, Gigabit Ethernet 2.8 Wireless LAN |
| Unit- III Hardware Layer | 3.a Explain characteristics of guided and unguided transmission media. 3.b Sketch constructional details of twisted pair, coaxial cable and fiber optic cable with labels. 3.c Explain the significance of the wireless medium as a physical layer in data communication. Discuss the key characteristics and challenges associated with using wireless communication as the physical layer. 3.d Describe ISM band and range of frequencies in it. 3.e Describe DSL technology with its types, advantages and limitations. 3.f Explain cable modem. 3.g Explain error control and flow control at data link layer in detail. 3.h Discuss error control and flow control at the data link layer. 3.i Explain HDLC, PPP, Multiple Access, CSMA, CSMA/CD and CSMA/CA. 3.j Describe and differentiate circuit switching and packet switching approach. 3.k Describe and distinguish Static and Dynamic Routing Algorithms. 3.l Explain IP addressing scheme (all types- Classless and classful) with examples. 3.m Explain CIDR. How does it differ from traditional IP address allocation methods? 3.n Describe NAT and the different types of NAT. | 2.9 FDDI & CDDI 3.1 Physical Layer: Transmission media (Twisted pair, Coaxial cable, Fiber optic cable) 3.2 Physical Layer Interfaces: Types of Connectors and Signals 3.3 Wireless Medium as Physical layer, 3.3 ISM Band 3.4 Circuit switching 3.5 DSL technology types-xDSLs 3.6 Cable modem 3.7 Sub Layers of Data Link Layer and functions: Error control, Flow control examples 3.8 data link protocol HDLC, PPP, Multiple Access, CSMA, CSMA/CD, CSMA/CA. 3.9 Network Layer: Packet Switching, 3.10 Virtual circuits, and datagram, Static and Dynamic Routing Algorithms 3.11 Types IP Addressing: gateway addressing, network and broadcast addressing, dotted decimal notation, loopback addressing 3.12 CIDR & NAT 3.13 IP layer protocols (ICMP, ARP, RARP, DHCP, BOOTP) 3.14 IPv4 and IPv6 comparison 3.15 Line coding types |
Course Code: 4361101
| Unit | Unit Outcomes (UOs) (4 to 6 UOs at Application and above level) | Topics and Sub-topics |
|---|---|---|
| 3.o Explain the role of ICMP. 3.p Describe and distinguish ARP and RARP. 3.q Describe and distinguish DHCP and BOOTP. 3.r Explain how these protocols (ICMP, ARP, RARP, DHCP, BOOTP) contribute to the overall functioning of the Internet and local networks. 3.s Distinguish various components of IPv4 and IPv6 protocol. 3.t Explain different Line coding types | ||
| Unit- IV Software Layer | 4.a Explain TCP and UDP protocol in transport layer in relation to connection oriented and connection less network. 4.b Role of DNS- Domain Name System. 4.c Describe the process of DNS resolution. 4.d Explain WWW and browsers 4.d Difference between IMAP and POP3 in the context of E-mail.Discuss SMTP protocol. 4.e Explain FTP and the difference between active and passive FTP modes and Remote Login 4.f Describe VoIP 4.g Describe Social Services , Forums , blogs | 4.1 Transport Layer: Elements of Transport protocols - TCP & UDP, connection oriented and connection less network. 4.2 Application Layer: 4.2.1 DNS- Domain Name System 4.2.2 Internet Services: World Wide Web: Web browser, HTML 4.2.3 Electronic Mail: Functions of E- mail system, User agent, Message format , Mail Protocols (SMTP, POP3),FTP, Remote Login 4.3 Voice and Video over IP 4.4 Social services: Forum, Newsgroup, blog |
| Unit -V Network Security | 5.a key aspects related to the Copyright Act in India 5.b Define the terms “encryption” and “decryption” in the context of cryptography. 5.c Difference between symmetric and asymmetric encryption algorithms. 5.d Explain IP security 5.e Explain ISO standards and how it contributes to information security? 5.f Briefly describe the Information Technology (Amendment) Act, 2008, and its impact on cyber laws in India. 5.g Explain Social Issues , Hacking & Precautions. | 5.1 Introduction to Network Security, Cryptography, symmetric and asymmetric encryption algorithms 5.2 IP security: SSH and Web security, 5.2 Information Security Standards - ISO, IT Act, Copyright Act, Cyber Laws in India. 5.3 IT Act 2000 Provisions and latest amendments 5.4 Social issues, Hacking, precautions |
8. SUGGESTED SPECIFICATION TABLE FOR QUESTIONPAPER DESIGN#
| R Level | U Level | A Level | Total Marks | |||
|---|---|---|---|---|---|---|
| 1 | Unit - I Fundamentals of Networking & Data Communication | 7 | 4 | 5 | 3 | 12 |
| 2 | Unit - II Network Devices | 8 | 6 | 4 | 4 | 14 |
| 3 | Unit- III Hardware Layer | 12 | 6 | 6 | 6 | 18 |
| 4 | Unit -IV Software Layer | 10 | 6 | 6 | 4 | 16 |
| 5 | Unit -V Network Security | 5 | 4 | 2 | 4 | 10 |
| Total | Total | 42 | 26 | 23 | 21 | 70 |
Legends: R=Remember, U=Understand, A=Apply and above (Revised Bloom’s taxonomy)
9. SUGGESTED STUDENT ACTIVITIES#
Other than the laboratory learning, following are the suggested student-related co-curricular activities which can be undertaken to accelerate the attainment of the various outcomes in this course: Students should conduct following activities in groups and prepare reports of each activity.
- i. Prepare journals based on practical performance in the laboratory.
- ii. Students are encouraged to register themselves in various MOOCs such as: Swayam, edx, Coursera, Udemy etc to further enhance their learning
- iii. Prepare chart to represent the Network Topology Diagrams, Protocol Stack Diagrams, Flowcharts for Protocols, Error and Flow Control Graphs, Bandwidth Utilization Charts, Network Performance Metrics, Comparison Charts for Data Link Protocols, Routing Algorithm Comparison Graphs, IP Addressing Schemes, Network Security Charts, Comparison of Wireless Technologies, Network Management Tools Comparison, Data Communication Medium Comparison, Ethical Hacking Incidents etc
- iv. Explore real-world case studies of network implementations, failures, or security breaches, encouraging students to analyze and propose solutions.
- v. To design a network in your department such as one drive can be accessible from any other system.
- vi. Prepare LAN cable and test it.( Practice cable stripping, untwisting, and proper crimping techniques, Learn about different types of LAN cables, such as Cat5e, Cat6, or Cat6a, and their applications, Create a simple diagram or documentation illustrating the cable connections.)
- vii. List different types of Network operating system.
- viii. Identify the type of Network in your Institute.
10. SUGGESTED SPECIAL INSTRUCTIONAL STRATEGIES (if any)#
These are sample strategies, which the teacher can use to accelerate the attainment of the various outcomes in this course:
- a) Massive open online courses ( MOOCs ) may be used to teach various topics/subtopics.
- b) Guide student(s) in undertaking micro-projects.
- c) Some of the topics/subtopics are relatively simple and very easy for the students for selflearning , but to be assessed using different assessment methods.
- d) With respect to section No.09 , teachers need to ensure to create opportunities and provisions for co-curricular activities .
- e) Guide students for using the latest Technical Magazine.
- f) Arrange visit to relevant industry
g) Show video lectures to explore various network management tools, including both graphical user interfaces (GUI) and command-line interfaces (CLI), emerging technologies, such as 5G, IoT, or SDN, and their impact on network communication with help of the internet.
h) Invite industry experts to deliver guest lectures on current trends, challenges, and best practices in computer networks and data communication
11. SUGGESTED MICRO-PROJECTS#
Only one micro-project is planned to be undertaken by a student that needs to be assigned to him/her in the beginning of the semester. In the first four semesters, the micro-project is group-based. However, in the fifth and sixth semesters, it should be preferably be individually undertaken to build up the skill and confidence in every student to become problem solver so that s/he contributes to the projects of the industry. In special situations where groups have to be formed for micro-projects, the number of students in the group should not exceed three.
The micro-project could be industry application based, internet-based, workshop-based, laboratory-based or field-based. Each micro-project should encompass two or more COs which are in fact, an integration of PrOs, UOs and ADOs. Each student will have to maintain a dated work diary consisting of individual contributions in the project work and give a seminar presentation of it before submission. The total duration of the micro-project should not be less than 16 (sixteen) student engagement hours during the course. The student ought to submit a micro-project by the end of the semester to develop the industry-oriented COs.
A suggestive list of micro-projects is given here. This has to match the competency and the COs. Similar micro-projects could be added by the concerned course teacher.
MICRO PROJECT: Prepare following Designs.#
- Dynamic Cloud Network Control Under Reconfiguration Delay and Cost.
- Measuring Web Latency and Rendering Performance.
- Configuration to a DHCP Server
- Implement and Verify Static Routes
- Connectivity Tests with Traceroute
- Configure Dynamic NAT using Packet Tracer
- configure Switch and Router VTY,Privilege and enable Password Assignment
- Implement and Verify Default Routes
- Client-Server based Instant Messenger.
- Configure VLAN in Switch
- Configure Web browser security settings.
- Case study on Demonstration of wireless network between mobile device and PC for file transfer.
- Install a small wireless network using access points.
- Develop a small Network. (Hands on Training.)
Students can do any other project suggested by faculties or any suggested student activity.
12. SUGGESTED LEARNING RESOURCES#
| S. No. | Title of Book | Author | Publication with place, year and ISBN |
|---|---|---|---|
| 1 | Data Communication and Networking | Forouzen | Tata McGraw Hill, Education New Delhi (Latest edition) |
| S. No. | Title of Book | Author | Publication with place, year and ISBN |
|---|---|---|---|
| 2 | Computer Networks | Tannebaum Andrew S Wetherall David J. | Pearson, New Delhi, 5th Edition, 2011 |
| 3 | Data and Computer Communication | Stallings Williams | PHI Learning, New Delhi (Latest edition) |
| 4 | Data Communication Networks | Sharma Sanjay | S.K.Kataria and Sons, New Delhi (Latest edition) |
| 5 | Computer Networks | Trivedi Bhushan | Oxford University Press, New Delhi 2013 |
13. SOFTWARE/LEARNING WEBSITES#
- a) https://www.netacad.com/courses/packet-tracer
- b) https://www.javatpoint.com/computer-network-architecture
- c) https://www.geeksforgeeks.org/
- d) https://www.cisco.com/c/en_in/products/security/what-is-network-security.html
14. PO-COMPETENCY-CO MAPPING#
Program Outcomes (POs):#
- Basic & Discipline specific knowledge : An applied knowledge of basic mathematics, science and engineering fundamentals and engineering specialization to solve the engineering problems.
- Problem Analysis: Identify and analyze well defined engineering problems using codified standard methods.
- Design/ Development of Solution: Design solutions for well-defined technical problems and assist with the design of systems, components or processes to meet specified needs.
- Engineering Tools, Experimentation and Testing: Apply modern engineering tools and relevant techniques to conduct standard tests and measurements.
- Engineering practices for Society, Environment and sustainability : Apply relevant technology in context of Society, sustainability, environment and ethical practices.
- Project Management : Use engineering management principles individually, as a team member or a leader to manage projects and effectively communicate about well-defined engineering activities.
- Life-long learning : Ability to analyze individual needs and engage in updating in the context of technological changes.
Program Specific Outcomes (PSOs):#
- Develop proficiency in Installation, maintenance and troubleshooting of electronics and communication systems.
- Create customized solutions to real-life problems using hardware and software.
| Semester VI | Computer Networks & Data Communication (4361101) POs and PSOs | Computer Networks & Data Communication (4361101) POs and PSOs | Computer Networks & Data Communication (4361101) POs and PSOs | Computer Networks & Data Communication (4361101) POs and PSOs | Computer Networks & Data Communication (4361101) POs and PSOs | Computer Networks & Data Communication (4361101) POs and PSOs | Computer Networks & Data Communication (4361101) POs and PSOs | Computer Networks & Data Communication (4361101) POs and PSOs |
|---|---|---|---|---|---|---|---|---|
| Competency & Course Outcomes | PO 1 Basic & Discipline specific knowledge | PO 2 Problem Analysis | PO 3 Design/ developme nt of solutions | PO 4 Engineering Tools, Experimentati n &Testing | PO 5 Engineering practices for society, sustainability & environmen | PO 6 Projec PO 7 Life PSO 1 Managemen long learnin | PSO 2 | |
| Competency |
| Analyze the key concepts of data communication, the various physical network topologies and layered models. | 3 | 2 | 2 | 1 | 2 | 2 | 2 | 1 | 3 |
|---|---|---|---|---|---|---|---|---|---|
| Select proper transmission media and devices based on network requirements | 3 | 2 | 2 | 2 | 1 | 1 | 3 | 2 | 2 |
| Managecontemporary network infrastructures and configure fundamental network devices based on criteria and analyze communication protocols of hardware layer | 3 | 2 | 2 | 2 | 1 | 2 | 3 | 1 | 3 |
| Use Internet protocols and standards. | 3 | 2 | 2 | 1 | 1 | 3 | 3 | 2 | 3 |
| Understanding of network security, cryptography, IP security, web security, information security standards. | 3 | 3 | 1 | 2 | 2 | 3 | 3 | 2 | 3 |
Legend: ’ 3’ for high, ’ 2 ’ for medium, ‘1’ for low or ‘-’ for the relevant correlation of each competency, CO, with PO/ PSO
15. COURSE CURRICULUM DEVELOPMENT COMMITTEE#
GTU Resource Persons#
| S. No. | Name and Designation | Institute | Contact No. Email |
|---|---|---|---|
| 1 | Prof. U V Buch | GP, Ahmedabad | 9825346922 uvbuch@gmail.com |
| 2 | Prof. B S Bhatt | AVPTI Rajkot | 9974400964 mr.bhagirath@gmail.com |
| 3 | Prof. M D Doshi | GP, Gandhinagar | 8511109144 mddoshi@gpahmedabad.ac.in |
BoS Resource Persons#
| Sr. No. | Name and Designation | Institute | Contact No. | |
|---|---|---|---|---|
| 1 | Dr. A S Pandya, Principal BoS Chairman Electrical & Allied Branches | BPTI, Bhavnagar | 9426201171 | aspandya22@rediffmail.com |
| 2 | Dr. S N Sampat HoD & BoS Member EC | LE College Morbi. | 9033777389 | snsampat@gmail.com |

