Computer Networks

GATE CSE 2022 Syllabus mind map

Get Started. It's Free
or sign up with your email address
Computer Networks by Mind Map: Computer Networks

1. IP address Subnetting Supernetting

1.1. Introduction to Computer network and IP address

1.2. Types of Casting -Unicast,Limited Broadcast,Directed Broadcast

1.3. Subnets,Subnet Mask,Routing

1.4. Variable length subnet masking (VLSM)

1.5. Classless Inter Domain Routing (CIDR)

1.6. Subnetting in CIDR, VLSM in CIDR

1.7. Private IP address.

2. Flow Control Methods

2.1. Delays in CN

2.2. Flow control, Stop and wait.

2.3. Capacity of pipe and pipelining.

2.4. Go Back N

2.5. Selective Repeat and comparison between all sliding window protocols.

2.6. Introduction to Access control methods, TDM and Polling

2.7. CSMA-CD

2.8. Back-off algorithm for CSMA-CD

2.9. Token passing access control method

2.10. Aloha and difference between Flow and access control.

3. Error Control Methods

3.1. Error control and CRC.

3.2. Checksum

4. ISO-OSI Stack

4.1. ISO_OSI LAYERS

4.2. Physical layer

4.3. Introduction to DLL

4.4. Framing at DLL

4.5. Physical addressing

4.6. Introduction to network layer.

4.7. Introduction to transport layer

4.8. How all the layers work together

4.9. session layer and presentation layer

5. LAN Technologies

5.1. Ethernet

5.2. Introduction to Token Ring(Not required for GATE)

5.3. Token Ring Frame Format(Not required for GATE).

5.4. Minimum length of token ring(Not required for GATE).

6. Switching

6.1. Introduction to switching

6.2. Comparison between circuit switching and packet switching

6.3. Packetisation in packet switching

6.4. Virtual circuits and datagrams

7. Internet Protocol

7.1. Introduction to IP header.

7.2. Identification, MF,DF and fragment offset.

7.3. TTL, protocol, Header checksum

7.4. Source IP and destination IP

7.5. Options

8. Fragmentation

8.1. Difference between segmentation and fragmentation

8.2. Fragmentation explained with numerical example

8.3. Reassembly algorithm

9. Protocols and Concept at Network Layer

9.1. Implementation of broadcasting

9.2. ARP

9.3. Special address 127.

9.4. RARP

9.5. Bootp and Dhcp

9.6. Introduction to ICMP

9.7. ICMP feedback messaging

9.8. ICMP request and reply messaging

9.9. Traceroute-- application of ICMP

9.10. PMTDU -- application of ICMP

10. Routing

10.1. Difference between routing and flooding

10.2. Types of routing algorithms

10.3. Distance vector routing

10.4. Count to infinity

10.5. Split horizon

10.6. Link state routing

10.7. Difference between DVR and LSR, RIP and OSPF

11. TCP

11.1. TCP header

11.2. Source port, destination port and socket.

11.3. Sequence number, Acknowledge number and random initial sequence number

11.4. Wrap around time and problems on wrap around time.

11.5. Header length and calculation of acknowledgment number.

11.6. TCP connection establishment

11.7. TCP data transfer after connection establishment.

11.8. TCP connection termination.

11.9. PSH flag

11.10. URG flag and urgent pointer.

11.11. RST flag

11.12. TCP state transition diagram- connection established, release

11.13. TCP flow control using advertisement window

11.14. TCP checksum

11.15. Options in TCP header

11.16. Retransmissions in TCP

11.17. Introduction to TCP congestion control.

11.18. TCP congestion control algorithm

11.19. TCP timer management

11.20. Introduction to timeout timer.

11.21. Basic algorithm for timeout timer computation

11.22. Jacobson's algorithm for timeout computation and Karn's modification.

11.23. Silly window syndrome.

11.24. Traffic shaping

11.25. Leaky Bucket.

11.26. Token Bucket.

12. UDP

12.1. NEED of UDP

13. .Hardware and various devices used in networking

13.1. Cables, Repeaters and Hubs

13.2. Bridges.

13.3. Spanning tree algorithm in Bridges

13.4. Switch

13.5. Collision domain and broadcast domain of all devices

13.6. Routers

13.7. Gateways.

13.8. Firewalls

14. Application Protocols

14.1. Introduction to application layer

14.2. DNS

14.3. HTTP

14.4. FTP

14.5. SMTP and POP

15. Network Security (not in gate)

15.1. Introduction to network security

15.2. passive and active attacker

15.3. Security serivice.

15.4. Cryptography

15.5. symmetric key

15.6. Private and public key

15.7. Modular arithematic

15.8. Multiplicate Inverse

15.9. Euler's Theorem

15.10. Euler's Totient function.

15.11. RSA Algorithm

15.12. Primitive root

15.13. Discrete logortihm

15.14. Diffie hellman algorthim

15.15. Digital signatures

15.16. Firewalls.