Semester-IV: Computer Networking Course Code: 4340703
Semester-IV: Computer Networking Course Code: 4340703
Semester-IV: Computer Networking Course Code: 4340703
1. RATIONALE
Computers and computer networks are the sole of the computer-based information systems. In
present times, whether it is small or big organization they own their private computer networks to
handle computer-based information systems. Therefore in every organisation, establishing,
commissioning (making operational) and maintaining secure computer networks has becomes one
of the essential jobs of a diploma computer engineer too. This course is therefore designed to help
the computer engineering diploma holders to develop this competency
2. COMPETENCY
The course content should be taught and implemented with the aim to develop various types of
related skills leading to the achievement of the following competency
The practical experiences and relevant soft skills associated with this course are to be taught and
implemented, so that the student demonstrates the following industry-oriented COs associated with
the above-mentioned competency:
a) Classify various types of networks base on their construction, usage and scope
b) Differentiate OSI and TCP/IP models
c) Select proper transmission media and devices based on network requirements.
d) CompareIPv4 and IPv6 addressing scheme
e) Identify various types of network security threats
Approx.
Unit
Sr.No Practical Outcomes (PrOs) Hrs.
No.
Req
Connect computer using given topology with wired media. I 02
Assume six devices are arranged, if in:
3 Prepare and Test Straight UTP Cable and Cross UTP Cable. III 02
Study and Test various Network devices available at III 04
4 Department/Institute. (Repeater, Hub, Switch, Bridge, Router
and Gateway).
Determine whether following IPv4 address are valid or invalid. IV 02
If valid IPv4 address then find class, Network and Host ID of an
IPv4 address. If invalid IPv4 address then write reason for the
same.
5 a) 1.4.5.5 b) 75.45.301.14
c) 111.56.045.78 d) 192.226.12.11
e) 130.45.151.154 f) 11100010.23.14.67
g) 221.34.7.8.20 h) 240.230.220.89
Note
i.More Practical Exercises can be designed and offered by the respective course teacher to
develop the industry relevant skills/outcomes to match the COs. The above table is only a
suggestive list.
ii.The following are some sample ‘Process’ and ‘Product’ related skills (more may be
added/deleted depending on the course) that occur in the above listed Practical Exercises of
this course required which are embedded in the COs and ultimately the competency.
S. PrO. No.
Equipment Name with Broad Specifications
No.
1 Computer with latest configuration with variousNetwork 3,4,5
management software.
2 Various Network devices, different types of network cables, 3,4,5
Network Interface Card, CrimpingTool, UTPCableTester, Layer
2Switch., WirelessAccess pointandWirelessrouter, ImpactingTool,
Networkcableconnectors. NetworkTrainerKit
The ADOs are best developed through the laboratory/field-based exercises. Moreover, the
level of achievement of the ADOs according to Krathwohl’s ‘Affective Domain Taxonomy’
should gradually increase as planned below:
i. ‘Valuing Level’ in 1st year
ii. ‘Organization Level’ in 2nd year.
iii. ‘Characterization Level’ in 3rd year.
8. UNDERPINNING THEORY
The major Underpinning Theory is formulated as given below and only higher level UOs of
Revised Bloom’s taxonomy are mentioned for development of the COs and competency in
the students by the teachers. (Higher level UOs automatically includes lower level UOs in
them). If required, more such higher level UOs could be included by the course teacher to
focus on attainment of COs and competency.
Unit –1: 1 a. List the applications of 1.1 Definition & need of networks
Basics of Computer Networks. 1.2 Categories of Computer Networks base
Computer on scope and connection
Network 1 b. Differentiate various line 1.3 Line Configuration
configurations. 1.4 Network Topology
Unit– 2: 2 a. List all layers of OSI and TCP/IP. 2.1 OSI model & function of each Layer
The Reference 2.2 TCP/ IP model& function of each Layer
Model for 2 b. Describe functions of each layer. 2.3 Comparison of OSI & TCP/IP Models
network
communication 2 c. Compare OSI and TCP/IP Model.
Note: The UOs need to be formulated at the ‘Application Level’ and above of Revised Bloom’s
Taxonomy’ to accelerate the attainment of the COs and the competency.
Total 42 22 34 16 70
Legends: R=Remember, U=Understand, A=Apply and above (Revised Bloom’s taxonomy)
Note: This specification table provides general guidelines to assist student for their learning
and to teachers to teach and question paper designers/setters to formulate test
items/questions assess the attainment of the UOs. The actual distribution of marks at
different taxonomy levels (of R, U and A) in the question paper may vary from above table.
A suggestive list of micro-projects is given here. This should relate highly with competency of
the course and the COs. Similar micro-projects could be added by the concerned course
teacher:
a) Develop a small Network. (Hands on Training.)
b) Install Windows 2003/Windows 2008 Network operating System
c) Install & Configure File Server.
d) Install & Configure Print Server.
e) Install & Configure Mail Server.
f) Install & Configure Proxy Server.
g) Install & Configure Web Server
h) Install a small wireless network using access points.
i) Set, Configure& Test secured network.
j) Case study on any one layer of OSI model.
k) Case study on various Line Configuration in Computer Networks
l) Case study on guided and unguided transmission media.
m) Case study on different types of Network devices.
n) Case study onDifference between Layer 2 and Layer 3 Switches.
o) Case study on various Network Services.
p) Case study on various Network Applications
q) Case study on IPv4 Address scheme
r) Case study on IPv4 Address – subnetting
s) Case study on various types of threats that exist for computers and networks
t) Case study on different methods of dealing with threats that exist for computers and
networks
u) Case study on various physical security components that can protect any computer
and network.
v) Case study on various types of malicious software that exists.
w) Case study on FIREWALLs.
x) Configure Web browser security settings.
y) Configure a system for various security experiments.
z) Case study on Demonstration of wireless network between mobile device and PC for
file transfer.
aa) Animate any one Network topology.
S. Name and
Institute Contact No. Email
No. Designation
Shri P. P. Kotak Government Polytechnic, Kotakp2003@yahoo.c
1 9825469617
Principal Rajkot om
Smt. M. P. Mehta Government Polytechnic, manishamehtain@gm
2 9879578273
HOD Himatnagar ail.com
Mr. Jiger P. Acharya, Government jigeracharya@gmail.co
3 9429462026
Lecturer Polytechnic,Ahmedabad m
Ms. Pravina Mehta, Government Polytechnic, pravina6mehta@gmail
4 9825446175
Lecturer Himatnagar .com