BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI



Birla Institute of Technology & Science, Pilani

Work-Integrated Learning Programmes Division

Second Semester 2013-2014

Course Handout

Course No. : BITS ZC481

Course Title : Computer Networks

Instructors : Dr. S.K. Sahay

Course Description

Introduction, History and Development of Computer Networks, Concept of Layered Architecture (e.g. OSI Model and TCP/IP Model), Application Layer: Basic Communication Applications and Protocols, Transport Layer: Services and Protocols, Reliable Protocol Design Concepts, Network Layer: Services, Routing Algorithms and Protocols, Inter domain and Intra domain Routing, Multicasting, IP Addressing, Concept of Sub Networks, Link Layer: Services, Channel Access Protocols, Link layer Addressing, Interconnection devices (e.g. Hub, Bridge, Switch, Routers), ATM and MPLS networks, Concept of LAN, LAN Implementations, Physical Layer: Physical Media, Data Communication Basics, Line Encoding Techniques,

Network Security: Principles, Symmetric and Asymmetric encryption, Confidentiality, Authenticity, Integrity and Non-repudiation.

Scope and Objective

This course will give you a breakdown of the applications, communications protocols, and network services that make a computer network work. It focuses on computer networks underlying architecture using TCP/IP model. We will closely follow the top down approach to computer networking as given in the textbook, which will enable you to understand the most visible part i.e. the applications, and then seeing, progressively, how each layer is supported by the next layer down. Most of the time, our example network will be Internet. Also, some time examples will be from wireless and mobile networks will be covered as currently users access the Internet from offices, from homes, while on move, and from public places wirelessly.

Prescribed Text Book

1. Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach Featuring the Internet, Pearson Education, 3rd Edition, 2005.

Reference Books

1. Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Pearson Education, 2006.

2. William Stallings, Computer Networking with Internet Protocols and Technology, Pearson Education, 2004.

3. L. Peterson and B. Davie, Computer Networks: A Systems Approach, Fourth Edition, Elsevier, 2007 (Book From 24x7 Online Book)

BITS ZC481 (Course Handout) Second Semester 2013-2014 Page 2

Plan of Self Study

|S.No. | TOPIC |Learning Objectives |Chapter References |

|1-2 |Introduction: Uses of Computer Networks, Network Hardware: The |To understand the basic structure of Internet|T1-Ch. 1.1-1.4 |

| |Network Edge, The Network Core, Access Networks |and its various components. Layered |R3-Ch. 1.1-1.2, 1.5 |

| | |architecture of Internet and protocol | |

| | |hierarchy. Internet reference models, OSI and| |

| | |TCP/IP | |

| |ISPs and Internet Backbones, Delay and Loss in Packet Switched | |T1-Ch.1.5-1.7 |

| |Networks, Network Software: Protocol Hierarchies, and their Service| |R3-Ch.1.3 |

| |Models. Reference Models (OSI, TCP/IP) | | |

|3 |Application Layer: Hypertext Transfer Protocol, HTTP Message |To familiar with various communication |T1-Ch. 2.1-2.3 |

| |Format, Cookies, Conditional GET. File Transfer Protocol: FTP, |applications like email, web browser, P2P, |R3-Ch. 9.1 |

| |TFTP. |DNS and the protocols involved. | |

|4 |Mail Transfer Protocols (SMTP, POP3, MIME), Domain Name Systems | |T1-Ch. 2.4-2.6 |

| |(DNS). P2P File Sharing | |R3-Ch. 9.1, 9.4 |

|5 |Transport Layer: Multiplexing, Demultiplexing, User Datagram |To understand the end to end connectivity |T1-Ch. 3.1-3.4 |

| |Protocol (UDP), Principles of Reliable Data Transfer (Go-Back-N, |mechanisms i.e. reliable and unreliable. |R3-Ch. 5.1 |

| |and Selective Repeat). |Simple client server application design for | |

| | |reliable and unreliable protocol | |

| | |implementation using socket programming in C.| |

| | |Protocol design principles for reliable data | |

| | |transfer. Case study of TCP protocol as | |

| | |reliable data transfer. | |

|6 |Introduction to Socket Programming; TCP, UDP, Simple Client Server | |T1-Ch. 2.7-2.8 |

| |Application | |R3-Ch.1.4 |

|7-8 |Transmission Control Protocol (TCP): RTT Estimation and Timeout, | |T1-Ch. 3.5-3.7 |

| |TCP Flow Control. TCP Error Control and Congestion Control. | |R3-Ch. 5.2, Ch.6.3, 6.4|

|9 |Review Session |

| Syllabus for Mid-Semester Test (Closed Book): Topics in S. No. 1 to 9 |

|10-11 |Network Layer: Virtual Circuits and Datagram Networks, Inside a |To understand the data packet forwarding and |T1-Ch.4.1-4.4 |

| |Router, Forwarding and Addressing in the Internet. IPv4 Addressing,|routing from source to destination node. |R3- Ch. 4.1 |

| |Sub Netting, IPv6 Addressing |Standard routing algorithms like Dijkstra and| |

| | |Distance Vector. Basic routing protocols for | |

| | |unicast and multicast transmission. IP | |

| | |protocol and IP based addressing mechanism. | |

|12 |Routing Algorithms: Shortest Path, Flooding, Link State, Distance | |T1-Ch. 4.5 |

| |Vector, and Hierarchical Routing. | |R3-Ch. 4.2 |

|13 |Routing in the Internet: RIP, OSPF, Border Gateway Protocol, and | |T1-Ch. 4.6-4.7 |

| |Multicasting. | |R3-Ch. 4.4 |

|14 |Data Link Layer: Services, Error Detection and Correction |To understand the data packet movement from |T1-Ch. 5.1-5.2 |

| |Techniques (Parity Checks, Checksums, CRC), Hamming code |one node to another. Error detection and | |

| | |correction mechanism to ensure the data | |

| | |integrity at link level. Channel access | |

| | |protocols (i.e. ALOHA, CSMA/CD) in | |

| | |multi-access environment. Link layer | |

| | |protocols Ethernet and PPP. Link | |

| | |virtualization using ATM and MPLS networks. | |

| | |Link layer addressing of the nodes and | |

| | |protocol involved like ARP, DHCP and RARP. | |

| | |Working of Interconnecting devices. Various | |

| | |physical media used to access network. Line | |

| | |encoding techniques used to transmit the | |

| | |data. | |

|15 |Multiple Access Protocol: TDM, FDM, Slotted ALOHA, Pure ALOHA, | |T1-Ch. 5.3, 5.5, 5.7, |

| |CSMA, CSMA/CD, Local Area Networks, Ethernet, Point to Point | |5.8 |

| |Protocol. Link Virtualization: Asynchronous Transfer Mode (ATM), | |R3-Ch. 2.3-2.6, Ch. 3.3|

| |Multi Protocol Label Switching (MPLS) | | |

|16 |Link Layer Addressing: MAC Addresses, ARP, RARP, DHCP | |T1-Ch. 5.4 |

| | | |R3-Ch. 4.1 |

| |Interconnections: Hubs, Bridges, and Switches. | |T1-Ch. 5.6 |

| | | |R3-Ch. 3.2 |

| |Physical Media: The theoretical basis for data communication, | |R3-Ch. 2.1-2.2 |

| |Guided physical media. Line coding Schemes: NRZ, Manchester, | |Lecture Notes |

| |Differential Manchester. | | |

|17 |Network Security: Principles, Symmetric and Asymmetric encryption, |To understand the cryptography applied for |T1: Ch. 7.1-7.4 |

| |Confidentiality, Authenticity, Integrity and Non-repudiation |network security. |Lecture Notes |

|18 |Review Session | | |

|Syllabus for Comprehensive Exam (Open Book): All topics given in Plan of Self Study above. |

BITS ZC481 (Course Handout) Second Semester 2013-2014 Page 3

Evaluation Scheme:

|EC No. |Evaluation Component & |Duration |Weigh-tage |Day, Date, Session,Time |

| |Type of Examination | | | |

|EC-1 |Assignment/Quiz |** Details to be announced on LMS |15% |** Details to be announced on LMS Taxila |

| | |Taxila website by Instructor | |website by Instructor |

|EC-2 |Mid-Semester Test |2 Hours |35% |Sunday, 16/02/2014 (AN)* |

| |(Closed Book)* | | |2 PM – 4 PM |

|EC-3 |Comprehensive Exam |3 Hours |50% |Sunday, 06/04/2014 (AN)* |

| |(Open Book)* | | |2 PM – 5 PM |

** Please check the details by January 10, 2014 on LMS Taxila web site.

AN: AfterNoon Session; FN: ForeNoon Session

Closed Book Test: No reference material of any kind will be permitted inside the exam hall.

Open Book Exam: Use of any printed / written reference material (books and notebooks) will be permitted inside the exam hall. Loose sheets of paper will not be permitted. Computers of any kind will not be allowed inside the exam hall. Use of calculators will be allowed in all exams. No exchange of any material will be allowed.

Note:

It shall be the responsibility of the individual student to be regular in maintaining the self study schedule as given in the course handout, attend the online/on demand lectures as per details that would be put up in the BITS LMS Taxila website taxila.bits-pilani.ac.in and take all the prescribed components of the evaluation such as Assignment (Course Page on LMS Taxila), Mid Semester Test and Comprehensive Examination according to the Evaluation Scheme given in the respective Course Handout. If the student is unable to appear for the Regular Test/Examination due to genuine exigencies, the student must refer to the procedure for applying for Make-up Test/Examination, which will be available through the Important Information link on the BITS LMS Taxila website taxila.bits-pilani.ac.in on the date of the Regular Test/Examination. The Make-up Tests/Exams will be conducted only at selected exam centres on the dates to be announced later.

Instructor-in-Charge

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download