Вы находитесь на странице: 1из 12

BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI

WORK INTEGRATED LEARNING PROGRAMMES


Digital Learning
Part A: Course Design
Course Title Computer Networks
Course No(s) IS ZC467
Credit Units 4
Credit Model 1: Class Room Hours
2: Students Preparation
1: Lab Work (if 4 credit course)
Course Authors Vineet Garg, Lucy J gudino

Course Objectives
No Course Objective

CO1 To learn the principles of computer networking and the Internet

CO2 To learn the conceptual and implementation aspects of network application.

CO3 To learn the key principles of transport layer protocols and its services

CO4 To learn how the network layer implements the host to host communication service
in terms of delivery, forwarding, and routing of packets in the Internet

C05 To learn data link layer services and multiple access techniques

C06 To learn the impact of wireless links and mobility on transport layer protocols and
networked applications

C07 To learn wireless networking, quality of service and network security.

Text Book(s)
T1 Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach, Pearson
India, 5th Edition, 2012.

Reference Book(s) & other resources


R1 Forouzan B A: Data Communications and Networking, McGraw Hill, 4th Edition, 2006.
R2 Andrew S. Tanenbaum, Computer Networks, 5th Edition, Pearson India, 2012.
R3 L. Peterson and B. Davie, Computer Networks: A Systems Approach, 5th Edition,
Morgan-Kaufmann, 2012.
Modular Content Structure
1. Introduction
1.1. Introduction
1.1.1. A Network and the Internet - its different views
1.1.2. What is a Protocol?
1.2. Deeper Dive
1.2.1. The Network Edge and the Network Core
1.2.2. Types of Networks - Circuit or Packet Switched. Which one to choose?
1.3. Characteristics of Packet Switched Networks
1.3.1. Delay in packets delivery
1.3.2. Loss of Packets
1.3.3. Throughput
1.4. Layered Architecture of a Protocol
1.4.1. Layered Architecture
1.4.2. Purpose of different layers
1.4.3. Packet Encapsulation
2. Application Layer
2.1. What are network applications?
2.1.1. Architecture
2.1.2. Communication and Transport
2.1.3. Application Protocols
2.2. Few Applications
2.2.1. HTTP, FTP and SMTP
2.2.2. DNS
2.2.3. Peer-To-Peer Applications
2.3. Introduction to Socket Programming with TCP and UDP
3. Transport Layer
3.1. Concept and operations of transport
3.2. Connectionless Transport with UDP
3.2.1. UDP Segment Structure
3.3. Reliability in Transport
3.3.1. Principles
3.3.2. Different aspects to achieve reliability
3.4. Connection Oriented Transport with TCP
3.4.1. TCP segment structure
3.4.2. How TCP provides reliable data transfer
3.4.3. Flow Control
3.4.4. Connection management
3.5. Congestion Control
3.5.1. Principles
3.5.2. TCP Congestion control mechanism
4. Network Layer
4.1. Need for the Network Layer
4.2. How Network works - Forwarding and Routing
4.3. Circuits and Networks
4.4. How a router works?
4.5. IP Datagram and addressing
4.5.1. IPv4 and IPv6
4.5.2. Internet Control Message Protocol (ICMP)
4.6. Routing Algorithms
4.6.1. Routing Fundamentals
4.6.2. Routing Algorithms like: Link State (LS), Distance Vector (DV) and Hierarchical
4.6.3. Routing Protocols in Internet: Routing Information (RIP, )Border Gateway (BGP)
and Open Shortest Path First (OSPF).
4.7. Broadcast and Multicast: Difference and Algorithms
5. Link Layer
5.1. Introduction
5.2. Error Detection and Correction
5.3. Multiple Access Protocols
5.4. What is link virtualization?
5.4.1. Multi Protocol Label Switching (MPLS)

6. Wireless and Mobile networks (select topics)


6.1. Wireless Networks
6.2. Mobile Networks
6.3. Mobility management and Mobile IP

7. Multimedia Communication (select topics)


7.1. Fundamentals of Audio and Video.
7.2. Video Streaming and its types
7.3. Voice over IP (VoIP)
7.4. Quality of Service (QoS) in Multimedia Communication

8. Network Security (select topics)


8.1. Principles of Cryptography
8.2. Security in Application, Transport and Network layers.
8.3. Network Security Devices - Firewall and Session Border Controllers
9. Learning Outcomes:

No Learning Outcomes
LO1 Students will be able to describe the underlying principles of computer networking
LO2 Students will be able to articulate the details and functionality of TCP/IP network
architecture
LO3 Students will be able to compare different protocols and modes of operation for wired and
wireless networks.
L04 Students will be able to describe security issues and techniques to overcome them.
L05 Students will be able to use networking tools to understand and analyse the behaviours of
networking protocols

Part B: Contact Session Plan

Academic Term Second Semester 207-2018


Course Title Computer Networks
Course No IS ZC467
Instructor-In-charge Amit Dua

Glossary of Terms:
1. Contact Hour (CH) stands for a hour long live session with students conducted either in a physical
classroom or enabled through technology. In this model of instruction, instructor led sessions will be
for 20 CH.
a. Pre CH = Self Learning done prior to a given contact hour
b. During CH = Content to be discussed during the contact hour by the course instructor
c. Post CH = Self Learning done post the contact hour
2. RL stands for Recorded Lecture or Recorded Lesson. It is presented to the student through an online
portal. A given RL unfolds as a sequences of video segments interleaved with exercises
3. SS stands for Self-Study to be done as a study of relevant sections from textbooks and reference
books. It could also include study of external resources.
4. LE stands for Lab Exercises
5. HW stands for Home Work will consists could be a selection of problems from the text.

Contact Hour 1
Time Type Sequence Content Reference

Pre CH RL1.1 As provided in the recorded lecture Recorded Lecture 1.1

During CH1 CH1.1 = Network Edge T1: 1.4


CH CH1.2 = Network Core
CH1.3 = Access Network
CH1.4 = Delay, Loss, Throughput

Post CH SS1 Different types of delay

Post CH HW1 As suggested at the end of CH1

Post CH LE1 Introduction to Wireshark T1: Wireshark lab : Chapter 1

Contact Hour 2
Time Type Sequence Content Reference

Pre CH RL2.1 As provided in the recorded lecture Recorded Lecture 2.1

During CH2 CH2.1 = Application Layer T1: 2.2


CH introduction and examples

CH2.2 = WWW & HTTP, Web


1.0, 2.0, 3.0

Post CH SS2 HTTP protocol insights

Post CH HW2 Online webpages on HTTP


protocol

Contact Hour 3
Time Type Sequence Content Reference

Pre CH RL3.1 As provided in the recorded lecture Recorded Lecture 2.2

During CH3 CH3.1 = File Transfer Protocol


CH
CH3.2 = Simple Mail Transfer
Protocol
Post CH SS3 Problems given on FTP and SMTP

Post CH HW3 Homework 2.2 as provided in


content

Post CH LE3 Socket Programming with TCP T1 : 2.7


and UDP T1: 2.8

Contact Hour 4
Time Type Sequence Content Reference

Pre CH RL4.1 As provided in the recorded lecture Recorded Lecture2.3

During CH4 CH4.1 = Domain Name Systems


CH (DNS)

CH4.2 = Socket Programming with


TCP

CH4.3 = Socket Programming with


UDP

Post CH SS4 Application of TCP and UDP

Post CH HW4 As suggested at the end of CH4

Post CH LE4 Wireshark lab on TCP and UDP T1: Wireshark Labs: Chapter 2

Contact Hour 5
Time Type Sequence Content Reference

Pre CH RL5.1 As provided in the recorded lecture Recorded Lecture 3.1

During CH5 CH5.1 = Multiplexing,


CH Demultiplexing

CH5.2 = Sliding Window

CH5.3 = Flow and Error control;


connectionless and connection
oriented

Post CH SS5 Flow and error control


mechanisms.

Post CH HW5 As suggested at the end of CH5

Contact Hour 6
Time Type Sequence Content Reference
Pre CH RL6.1 As provided in the recorded lecture Recorded Lecture 3.2

During CH6 CH6.1 = Principles of Reliable


CH Data Transfer (Stop and Wait, Go-
Back-N, and Selective Repeat)

Post CH SS6 Comparison of transport protocols

Post CH HW6 As suggested at the end of CH6

Contact Hour 7
Time Type Sequence Content Reference

Pre CH RL7.1 As provided in the recorded lecture Recorded Lecture 3.3

During CH7 CH7.1 = TCP: Segment structure,


CH Setup, Termination, State
transistions

Post CH SS7 TCP Protocol

Post CH HW7 As suggested at the end of CH7

Post CH LE7 Wireshark lab to interpret TCP T1: Wireshark Labs: Exploring TCP
segments

Contact Hour 8
Time Type Sequence Content Reference

Pre CH RL8.1 As provided in the recorded lecture Recorded Lecture 3.4

During CH8 CH8.1 = TCP Flow Control


CH
CH8.2 = TCP Error Control

CH8.3 = Congestion Control

CH8.4 = Fairness

Post CH SS8 A research paper on congestion


control. It will be provided at
appropriate time.

Post CH HW8 As suggested at the end of CH8

Post CH LE8 Wireshark lab to observe flow


rates.

Contact Hour 9
Time Type Sequence Content Reference

Pre CH RL9.1 As provided in the recorded lecture Recorded Lecture 3.5

During CH9 CH9.1 = RTT Estimation and


CH Timeout

CH9.2 = TCP Timers and UDP

Post CH SS9 Online pages covering other


protocols – SCTP

Post CH HW9 As suggested at the end of CH9

Contact Hour 10
Time Type Sequence Content Reference

Pre CH RL10.1 As provided in the recorded lecture Recorded Lecture 4.1

During CH10 CH10.1 = Functions of Network


CH layer

CH10.2 = Virtual Circuits and


Datagram Networks

CH10.3 = What is inside a router?

Post CH SS10 Difference between input ports and


output ports. Solving various
unsolved questions in your
textbook on the covered topics.

Post CH HW10 What is the difference between


switch and a router;
As suggested at the end of CH10

Post CH LE10 Wireshark Lab T1: Wireshark Lab : Chapter 4

Contact Hour 11
Time Type Sequence Content Reference

Pre CH RL11.1 As provided in the recorded lecture Recorded Lecture 4.2

During CH11 CH11.1 = NAT, ARP, DHCP


CH
CH11.2 = Forwarding and
Addressing in the Internet

Post CH SS11 ARP protocol and security


Post CH HW11 RARP protocol;
As suggested at the end of CH11

Post CH LE11 Wireshark lab on ARP protocol

Contact Hour 12
Time Type Sequence Content Reference

Pre CH RL12.1 As provided in the recorded lecture Recorded Lecture 4.3

During CH12 CH12.1 = Routing Algorithms:


CH Shortest Path, Flooding, Link State

CH12.2 = Routing algorithms:


Distance Vector and Hierarchical
Routing

Post CH SS12 Various Link state and Distance


vector routing algorithms and
comparison among them.

Post CH HW12 As suggested at the end of CH12

Contact Hour 13
Time Type Sequence Content Reference

Pre CH RL13.1 As provided in the recorded lecture Recorded Lecture 4.4

During CH13 CH13.1 = Routing in the Internet:


CH RIP, OSPF, Border Gateway
Protocol
CH13.2 = Multicasting

Post CH SS13 Applications of BGP and OSPF


protocols

Post CH HW13 Different routing protocols used by


different categories of ISP's;
As suggested at the end of CH13

Contact Hour 14
Time Type Sequence Content Reference

Pre CH RL14.1 As provided in the recorded lecture Recorded Lecture 5.1

During CH14 CH14.1 = Mobile IP


CH
Post CH SS14 Original research paper on Mobile
IP

Post CH HW14 Mobile IPv6


As suggested at the end of CH14

Post CH LE14 Wireshark lab on Mobile IPv4

Contact Hour 15
Time Type Sequence Content Reference

Pre CH RL15.1 As provided in the recorded lecture Recorded Lecture 5.2

During CH15 CH15.1 = QOS, Guaranteed


CH delivery

CH15.2 = Delay, Fifo, Leaky


Bucket

CH15.3 = Token Bucket, Queue


Management

Post CH SS15 Various parameters on QoS

Post CH HW15 As suggested at the end of CH15

Post CH LE15 TBA

Contact Hour 16
Time Type Sequence Content Reference

Pre CH RL16.1 As provided in the recorded lecture Recorded Lecture 5.3

During CH16 CH16.1 = QOS, RSVP, IntServ,


CH DiffServ

CH16.2 = MPLS

Post CH SS16 Advantages and overheads of


MPLS protocol

Post CH HW16 As suggested at the end of CH16

Contact Hour 17
Time Type Sequence Content Reference

Pre CH RL17.1 As provided in the recorded lecture Recorded Lecture 6.1


During CH17 CH17.1 = Services
CH
CH17.2 = Framing

CH17.3 = Error Detection and


Correction Techniques (Parity
Checks, Checksums, CRC)

Post CH SS17 Security issues with parity checks,


checksums, and CRC

Post CH HW17 Algorithms for CRC;


As suggested at the end of CH17

Post CH LE17 TBA

Contact Hour 18
Time Type Sequence Content Reference

Pre CH RL18.1 As provided in the recorded lecture Recorded Lecture 6.2

During CH18 CH18.1 = TDM, FDM, Slotted


CH ALOHA, ALOHA
CH18.2 = CSMA, Local Area
Networks
CH18.3 = Hidden Terminal
problem

Post CH SS18 How and in what situation OFDM


is better than TDM and FDM

Post CH HW18 As suggested at the end of CH18

Contact Hour 19
Time Type Sequence Content Reference

Pre CH RL19.1 As provided in the recorded lecture Recorded Lecture 6.3

During CH19 CH19.1 = Interconnections: Hubs,


CH and Switches

CH19.2 = VLANs

CH19.3 = Journey From


Application Layer to Data Link
Layer

Post CH SS19 Different internetworking devices:


similarities and differences
between them

Post CH HW19 Homework 6.1 as provided in the


content

Contact Hour 20
Time Type Sequence Content Reference

Pre CH RL20.1 As provided in the recorded lecture Recorded Lecture 7.1

During CH20 CH20.1 = basis for data


CH communication (Fourier Analysis,
Bandwidth Limited Signals,
Maximum Data Rate of a Channel)

CH20.2 = Guided physical media

Post CH SS20 Throughput parameters and ways


of measuring them

Post CH HW20 As suggested at the end of CH20

Post CH LE20 Lab on different parameters to


measure throughput

Contact Hour 21
Time Type Sequence Content Reference

Pre CH RL21.1 As provided in the recorded lecture Recorded Lecture 7.2

During CH21 CH21.1 = satellite and optical


CH communication

Post CH SS21 Online web pages on optical


communication and its advantages
over other communication
technologies.

Post CH HW21 As suggested at the end of CH21

Contact Hour 22
Time Type Sequence Content Reference

Pre CH RL22.1 As provided in the recorded lecture Recorded Lecture 8.1

During CH22 CH22.1 = Security Needs and


CH Aspects
CH22.2 = Introduction to Key
Distribution

Post CH SS22 Various security threats for a


network

Post CH HW22 As suggested at the end of CH22

Evaluation Scheme:
Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
No Name Type Duration Weight Day, Date, Session, Time
EC-1 Quiz-I Online - 5% February 1 to 10, 2018
Quiz-II Online 5% March 1 to 10, 2018
Assignment-I Online 10% March 20 to 30, 2018
EC-2 Mid-Semester Test Closed 2 hours 30% 04/03/2018 (AN) 2 PM TO 4 PM
Book
EC-3 Comprehensive Open 3 hours 50% 22/04/2018 (AN) 2 PM TO 5 PM
Exam Book

Note to faculty: For sample assignment questions, refer Computer Networking Courses LabExercises.doc
and Computer Networks Lab Exercises.docx

Syllabus for Mid-Semester Test (Closed Book): Topics in Session Nos. 1 TO 11


Syllabus for Comprehensive Exam (Open Book): All topics (Session Nos. 1 to 22)
Important links and information:
Elearn portal: https://elearn.bits-pilani.ac.in
Students are expected to visit the Elearn portal on a regular basis and stay up to date with the latest
announcements and deadlines.
Contact sessions: Students should attend the online lectures as per the schedule provided on the Elearn
portal.
Evaluation Guidelines:
1. EC-1 consists of either two Assignments or three Quizzes. Students will attempt them through the
course pages on the Elearn portal. Announcements will be made on the portal, in a timely manner.
2. For Closed Book tests: No books or reference material of any kind will be permitted.
3. For Open Book exams: Use of books and any printed / written reference material (filed or bound) is
permitted. However, loose sheets of paper will not be allowed. Use of calculators is permitted in all
exams. Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
4. If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the student
should follow the procedure to apply for the Make-Up Test/Exam which will be made available on
the Elearn portal. The Make-Up Test/Exam will be conducted only at selected exam centres on the
dates to be announced later.
It shall be the responsibility of the individual student to be regular in maintaining the self study schedule as
given in the course handout, attend the online lectures, and take all the prescribed evaluation components
such as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the evaluation scheme
provided in the handout.

Вам также может понравиться