0% found this document useful (0 votes)
58 views3 pages

Bitszc 481

This document provides information about a course on computer networks taught in the second semester of 2013-2014. The course will introduce concepts related to layered network architectures, protocols, and services. It will cover topics such as the application, transport, network, data link, and physical layers of the OSI model and TCP/IP stack. Students will learn about network applications, routing, addressing, link layer protocols, and security. The course will be evaluated based on assignments, a midterm exam, and a comprehensive final exam.

Uploaded by

rvtymca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views3 pages

Bitszc 481

This document provides information about a course on computer networks taught in the second semester of 2013-2014. The course will introduce concepts related to layered network architectures, protocols, and services. It will cover topics such as the application, transport, network, data link, and physical layers of the OSI model and TCP/IP stack. Students will learn about network applications, routing, addressing, link layer protocols, and security. The course will be evaluated based on assignments, a midterm exam, and a comprehensive final exam.

Uploaded by

rvtymca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Birla Institute of Technology & Science, Pilani

Work-Integrated Learning Programmes Division

Second Semester 2013-2014

Course Handout

Course No. : BITS ZC481

Course Title : Computer Networks

Instructors : Dr. S.K. Sahay

Course Description

Introduction, History and Development of Computer Networks, Concept of Layered Architecture (e.g. OSI
Model and TCP/IP Model), Application Layer: Basic Communication Applications and Protocols, Transport
Layer: Services and Protocols, Reliable Protocol Design Concepts, Network Layer: Services, Routing
Algorithms and Protocols, Inter domain and Intra domain Routing, Multicasting, IP Addressing, Concept of
Sub Networks, Link Layer: Services, Channel Access Protocols, Link layer Addressing, Interconnection
devices (e.g. Hub, Bridge, Switch, Routers), ATM and MPLS networks, Concept of LAN, LAN
Implementations, Physical Layer: Physical Media, Data Communication Basics, Line Encoding Techniques,
Network Security: Principles, Symmetric and Asymmetric encryption, Confidentiality, Authenticity,
Integrity and Non-repudiation.

Scope and Objective

This course will give you a breakdown of the applications, communications protocols, and network services
that make a computer network work. It focuses on computer networks underlying architecture using TCP/IP
model. We will closely follow the top down approach to computer networking as given in the textbook,
which will enable you to understand the most visible part i.e. the applications, and then seeing, progressively,
how each layer is supported by the next layer down. Most of the time, our example network will be Internet.
Also, some time examples will be from wireless and mobile networks will be covered as currently users
access the Internet from offices, from homes, while on move, and from public places wirelessly.

Prescribed Text Book

T1. Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach Featuring the
Internet, Pearson Education, 3rd Edition, 2005.

Reference Books

R1. Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Pearson Education, 2006.

R2. William Stallings, Computer Networking with Internet Protocols and Technology, Pearson
Education, 2004.

R3. L. Peterson and B. Davie, Computer Networks: A Systems Approach, Fourth Edition, Elsevier,
2007 (Book From 24x7 Online Book)
BITS ZC481 (Course Handout) Second Semester 2013-2014 Page 2

Plan of Self Study

S.No. TOPIC Learning Objectives Chapter


References
1-2 Introduction: Uses of Computer Networks, Network To understand the basic structure of T1-Ch. 1.1-1.4
Hardware: The Network Edge, The Network Core, Internet and its various R3-Ch. 1.1-1.2,
Access Networks components. Layered architecture 1.5
ISPs and Internet Backbones, Delay and Loss in of Internet and protocol hierarchy. T1-Ch.1.5-1.7
Packet Switched Networks, Network Software: Internet reference models, OSI and R3-Ch.1.3
Protocol Hierarchies, and their Service Models. TCP/IP
Reference Models (OSI, TCP/IP)
3 Application Layer: Hypertext Transfer Protocol, To familiar with various T1-Ch. 2.1-2.3
HTTP Message Format, Cookies, Conditional GET. communication applications like R3-Ch. 9.1
File Transfer Protocol: FTP, TFTP. email, web browser, P2P, DNS and
4 Mail Transfer Protocols (SMTP, POP3, MIME), the protocols involved. T1-Ch. 2.4-2.6
Domain Name Systems (DNS). P2P File Sharing R3-Ch. 9.1, 9.4
5 Transport Layer: Multiplexing, Demultiplexing, To understand the end to end T1-Ch. 3.1-3.4
User Datagram Protocol (UDP), Principles of connectivity mechanisms i.e. R3-Ch. 5.1
Reliable Data Transfer (Go-Back-N, and Selective reliable and unreliable. Simple
Repeat). client server application design for
6 Introduction to Socket Programming; TCP, UDP, reliable and unreliable protocol T1-Ch. 2.7-2.8
Simple Client Server Application implementation using socket R3-Ch.1.4
7-8 Transmission Control Protocol (TCP): RTT programming in C. Protocol design T1-Ch. 3.5-3.7
Estimation and Timeout, TCP Flow Control. TCP principles for reliable data transfer. R3-Ch. 5.2,
Error Control and Congestion Control. Case study of TCP protocol as Ch.6.3, 6.4
reliable data transfer.
9 Review Session
Syllabus for Mid-Semester Test (Closed Book): Topics in S. No. 1 to 9
10-11 Network Layer: Virtual Circuits and Datagram To understand the data packet T1-Ch.4.1-4.4
Networks, Inside a Router, Forwarding and forwarding and routing from source R3- Ch. 4.1
Addressing in the Internet. IPv4 Addressing, Sub to destination node. Standard
Netting, IPv6 Addressing routing algorithms like Dijkstra and
12 Routing Algorithms: Shortest Path, Flooding, Link Distance Vector. Basic routing T1-Ch. 4.5
State, Distance Vector, and Hierarchical Routing. protocols for unicast and multicast R3-Ch. 4.2
13 Routing in the Internet: RIP, OSPF, Border Gateway transmission. IP protocol and IP T1-Ch. 4.6-4.7
Protocol, and Multicasting. based addressing mechanism. R3-Ch. 4.4
14 Data Link Layer: Services, Error Detection and To understand the data packet T1-Ch. 5.1-5.2
Correction Techniques (Parity Checks, Checksums, movement from one node to
CRC), Hamming code another. Error detection and
15 Multiple Access Protocol: TDM, FDM, Slotted correction mechanism to ensure the T1-Ch. 5.3, 5.5,
ALOHA, Pure ALOHA, CSMA, CSMA/CD, Local data integrity at link level. Channel 5.7, 5.8
Area Networks, Ethernet, Point to Point Protocol. access protocols (i.e. ALOHA, R3-Ch. 2.3-2.6,
Link Virtualization: Asynchronous Transfer Mode CSMA/CD) in multi-access Ch. 3.3
(ATM), Multi Protocol Label Switching (MPLS) environment. Link layer protocols
16 Link Layer Addressing: MAC Addresses, ARP, Ethernet and PPP. Link T1-Ch. 5.4
RARP, DHCP virtualization using ATM and R3-Ch. 4.1
Interconnections: Hubs, Bridges, and Switches. MPLS networks. Link layer T1-Ch. 5.6
addressing of the nodes and R3-Ch. 3.2
Physical Media: The theoretical basis for data protocol involved like ARP, DHCP R3-Ch. 2.1-2.2
communication, Guided physical media. Line coding and RARP. Working of Lecture Notes
Schemes: NRZ, Manchester, Differential Manchester. Interconnecting devices. Various
physical media used to access
network. Line encoding techniques
used to transmit the data.
17 Network Security: Principles, Symmetric and To understand the cryptography T1: Ch. 7.1-7.4
Asymmetric encryption, Confidentiality, applied for network security. Lecture Notes
Authenticity, Integrity and Non-repudiation
18 Review Session
Syllabus for Comprehensive Exam (Open Book): All topics given in Plan of Self Study above.
BITS ZC481 (Course Handout) Second Semester 2013-2014 Page 3

Evaluation Scheme:

EC Evaluation Duration Weigh- Day, Date, Session,Time


No. Component & tage
Type of Examination
EC-1 Assignment/Quiz ** Details to be announced 15% ** Details to be announced
on LMS Taxila website by on LMS Taxila website by
Instructor Instructor
EC-2 Mid-Semester Test 2 Hours 35% Sunday, 16/02/2014 (AN)*
(Closed Book)* 2 PM – 4 PM
EC-3 Comprehensive Exam 3 Hours 50% Sunday, 06/04/2014 (AN)*
(Open Book)* 2 PM – 5 PM

** Please check the details by January 10, 2014 on LMS Taxila web site.

AN: AfterNoon Session; FN: ForeNoon Session

Closed Book Test: No reference material of any kind will be permitted inside the exam hall.
Open Book Exam: Use of any printed / written reference material (books and notebooks) will be
permitted inside the exam hall. Loose sheets of paper will not be permitted. Computers of any kind
will not be allowed inside the exam hall. Use of calculators will be allowed in all exams. No
exchange of any material will be allowed.

Note:
It shall be the responsibility of the individual student to be regular in maintaining the self study
schedule as given in the course handout, attend the online/on demand lectures as per details that
would be put up in the BITS LMS Taxila website www.taxila.bits-pilani.ac.in and take all the
prescribed components of the evaluation such as Assignment (Course Page on LMS Taxila), Mid
Semester Test and Comprehensive Examination according to the Evaluation Scheme given in the
respective Course Handout. If the student is unable to appear for the Regular Test/Examination due
to genuine exigencies, the student must refer to the procedure for applying for Make-up
Test/Examination, which will be available through the Important Information link on the BITS
LMS Taxila website www.taxila.bits-pilani.ac.in on the date of the Regular Test/Examination.
The Make-up Tests/Exams will be conducted only at selected exam centres on the dates to be
announced later.

Instructor-in-Charge

You might also like