BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI
WORK INTEGRATED LEARNING PROGRAMMES
Digital Learning
Part A: Course Design
2017-H2
Course Title
|
Computer Networks
|
Course No(s)
|
IS ZC467
|
Credit Units
|
4
|
Credit Model
|
1: Class Room Hours
2: Students Preparation
1: Lab Work (if 4 credit course)
|
Content Authors
|
Vishal Gupta
|
Course
Objectives
No
|
|
CO1
|
Serves as the
first introductory course in networking. Exposes to the history, evolution
and need for computer networks.
|
CO2
|
Provides the
details of the layered architecture of a computer network and different
protocols that make these layers work.
|
CO3
|
Provides the
details of different types of networks taking examples from wireless
networks, mobile networks, voice and video communication showing the real
world deployments.
|
CO4
|
Lays the
foundation for advanced study in the area of protocol design, wireless
networking, quality of service and network security.
|
Text
Book(s)
T1
|
Kurose James F and Keith W. Ross: Computer Networking: A
Top-Down Approach, Pearson
|
Reference
Book(s) & other resources
R1
|
Forouzan B A: Data
Communications and Networking, McGraw Hill, 4th Edition, 2006.
|
R2
|
Andrew S. Tanenbaum, Computer
Networks, 5th Edition, Pearson
|
R3
|
L. Peterson
and B. Davie,
Computer Networks: A
Systems Approach, 5th
Edition, Morgan-Kaufmann, 2012.
|
Modular
Content Structure
1.
Introduction
1.1.
Introduction
1.1.1.
A Network and the Internet - its different views
1.1.2.
What is a Protocol?
1.2.
Deeper Dive
1.2.1.
The Network Edge and the Network Core
1.2.2.
Types of Networks - Circuit or Packet Switched. Which one to
choose?
1.3.
Characteristics of Packet Switched Networks
1.3.1.
Delay in packets delivery
1.3.2.
Loss of Packets
1.3.3.
Throughput
1.4.
Layered Architecture of a Protocol
1.4.1.
Layered Architecture
1.4.2.
Purpose of different layers
1.4.3.
Packet Encapsulation
2.
Application
Layer
2.1.
What are network applications?
2.1.1.
Architecture
2.1.2.
Communication and Transport
2.1.3.
Application Protocols
2.2.
Few Applications
2.2.1.
HTTP, FTP and SMTP
2.2.2.
DNS
2.2.3.
Peer-To-Peer Applications
2.3.
Introduction to Socket Programming with TCP and UDP
3.
Transport
Layer
3.1.
Concept and operations of transport
3.2.
Connectionless Transport with UDP
3.2.1.
UDP Segment Structure
3.3.
Reliability in Transport
3.3.1.
Principles
3.3.2.
Different aspects to achieve reliability
3.4.
Connection Oriented Transport with TCP
3.4.1.
TCP segment structure
3.4.2.
How TCP provides reliable data transfer
3.4.3.
Flow Control
3.4.4.
Connection management
3.5.
Congestion Control
3.5.1.
Principles
3.5.2.
TCP Congestion control mechanism
4.
Network
Layer
4.1.
Need for the Network Layer
4.2.
How Network works - Forwarding and Routing
4.3.
Circuits and Networks
4.4.
How a router works?
4.5.
IP Datagram and addressing
4.5.1.
IPv4 and IPv6
4.5.2.
Internet Control Message Protocol (ICMP)
4.6.
Routing Algorithms
4.6.1.
Routing Fundamentals
4.6.2.
Routing Algorithms like: Link State (LS), Distance Vector (DV)
and Hierarchical
4.6.3.
Routing Protocols in Internet: Routing Information (RIP, )Border
Gateway (BGP) and Open Shortest Path First (OSPF).
4.7.
Broadcast and Multicast: Difference and Algorithms
5.
Link
Layer
5.1.
Introduction
5.2.
Error Detection and Correction
5.3.
Multiple Access Protocols
5.4.
What is link virtualization?
5.4.1.
Multi Protocol Label Switching (MPLS)
6.
Wireless
and Mobile
networks (select topics)
6.1.
Wireless Networks
6.2.
Mobile Networks
6.3.
Mobility management and
Mobile IP
7.
Multimedia
Communication (select
topics)
7.1.
Fundamentals of Audio and Video.
7.2.
Video Streaming and its types
7.3.
Voice over IP (VoIP)
7.4.
Quality of Service (QoS) in Multimedia Communication
8.
Network
Security (select topics)
8.1.
Principles of Cryptography
8.2.
Security in Application, Transport and Network layers.
8.3.
Network Security Devices - Firewall and Session Border Controllers
Learning Outcomes:
No
|
Learning Outcomes
|
LO1
|
Knowledge to
visualize what all make a computer network work - devices and protocols.
|
LO2
|
Knowledge to
appreciate the layered and modular network architecture to design a computer
network and apply the concepts in the wider variety of networks - wireline,
wireless, and mobile.
|
LO3
|
Foundation
understanding of the advanced concepts like network security, quality of
service and multimedia communication.
|
Part B: Contact Session Plan
Academic Term
|
First Semester 2017-2018
|
Course Title
|
Computer Networks
|
Course No
|
IS ZC467
|
Content Developer
|
Vishal
Gupta
|
Glossary of Terms:
1. Contact
Hour (CH) stands for a hour long live session with students conducted either in
a physical classroom or enabled through technology. In this model of
instruction, instructor led sessions will be for 20 CH.
a. Pre CH =
Self Learning done prior to a given contact hour
b. During
CH = Content to be discussed during the contact hour by the course instructor
c. Post CH
= Self Learning done post the contact hour
2. RL
stands for Recorded Lecture or Recorded Lesson. It is presented to the student
through an online portal. A given RL unfolds as a sequences of video segments
interleaved with exercises
3. SS stands for Self-Study to be done as a study
of relevant sections from textbooks and reference books. It could also include
study of external resources.
4. LE
stands for Lab Exercises
5. HW
stands for Home Work will consists could be a selection of problems from the
text.
Contact
Hour 1
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL1.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 1.1
|
During CH
|
CH1
|
CH1.1 = Network Edge
CH1.2 = Network Core
CH1.3 = Access Network
CH1.4 = Delay, Loss, Throughput
|
T1:
1.4
|
Post CH
|
SS1
|
Different
types of delay
|
|
Post CH
|
HW1
|
As
suggested at the end of CH1
|
|
Post CH
|
LE1
|
Introduction
to Wireshark
|
T1:
Wireshark lab : Chapter 1
|
Contact
Hour 2
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL2.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 2.1
|
During CH
|
CH2
|
CH2.1 = Application Layer introduction and examples
CH2.2 = WWW & HTTP, Web 1.0, 2.0, 3.0
|
T1:
2.2
|
Post CH
|
SS2
|
HTTP
protocol insights
|
|
Post CH
|
HW2
|
Online webpages on HTTP
protocol
|
|
Contact
Hour 3
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL3.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 2.2
|
During CH
|
CH3
|
CH3.1 = File Transfer Protocol
CH3.2 = Simple Mail Transfer Protocol
|
|
Post CH
|
SS3
|
Problems
given on FTP and SMTP
|
|
Post CH
|
HW3
|
Homework
2.2 as provided in content
|
|
Post CH
|
LE3
|
Socket
Programming with TCP and UDP
|
T1
: 2.7
T1:
2.8
|
Contact
Hour 4
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL4.1
|
As
provided in the recorded lecture
|
Recorded
Lecture2.3
|
During CH
|
CH4
|
CH4.1 = Domain Name Systems (DNS)
CH4.2 = Socket Programming with TCP
CH4.3 = Socket Programming with UDP
|
|
Post CH
|
SS4
|
Application
of TCP and UDP
|
|
Post CH
|
HW4
|
As
suggested at the end of CH4
|
|
Post CH
|
LE4
|
Wireshark
lab on TCP and UDP
|
T1:
Wireshark Labs: Chapter 2
|
Contact
Hour 5
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL5.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 3.1
|
During CH
|
CH5
|
CH5.1 = Multiplexing, Demultiplexing
CH5.2 = Sliding Window
CH5.3 = Flow and Error control; connectionless and connection
oriented
|
|
Post CH
|
SS5
|
Flow
and error control mechanisms.
|
|
Post CH
|
HW5
|
As
suggested at the end of CH5
|
|
Contact
Hour 6
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL6.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 3.2
|
During CH
|
CH6
|
CH6.1 = Principles of Reliable Data Transfer (Stop and Wait,
Go-Back-N, and Selective Repeat)
|
|
Post CH
|
SS6
|
Comparison
of transport protocols
|
|
Post CH
|
HW6
|
As
suggested at the end of CH6
|
|
Contact
Hour 7
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL7.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 3.3
|
During CH
|
CH7
|
CH7.1 = TCP: Segment structure, Setup, Termination, State transistions
|
|
Post CH
|
SS7
|
TCP
Protocol
|
|
Post CH
|
HW7
|
As
suggested at the end of CH7
|
|
Post CH
|
LE7
|
Wireshark
lab to interpret TCP segments
|
T1:
Wireshark Labs: Exploring TCP
|
Contact
Hour 8
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL8.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 3.4
|
During CH
|
CH8
|
CH8.1 = TCP Flow Control
CH8.2 = TCP Error Control
CH8.3 = Congestion Control
CH8.4 = Fairness
|
|
Post CH
|
SS8
|
A
research paper on congestion control. It will be provided at appropriate
time.
|
|
Post CH
|
HW8
|
As
suggested at the end of CH8
|
|
Post CH
|
LE8
|
Wireshark
lab to observe flow rates.
|
|
Contact
Hour 9
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL9.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 3.5
|
During CH
|
CH9
|
CH9.1 = RTT Estimation and Timeout
CH9.2 = TCP Timers and UDP
|
|
Post CH
|
SS9
|
Online pages covering other protocols – SCTP
|
|
Post CH
|
HW9
|
As
suggested at the end of CH9
|
|
Contact
Hour 10
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL10.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 4.1
|
During CH
|
CH10
|
CH10.1 = Functions of Network layer
CH10.2 = Virtual Circuits and Datagram Networks
CH10.3 = What is inside a router?
|
|
Post CH
|
SS10
|
Difference
between input ports and output ports. Solving various unsolved questions in
your textbook on the covered topics.
|
|
Post CH
|
HW10
|
What
is the difference between switch and a router;
As
suggested at the end of CH10
|
|
Post CH
|
LE10
|
Wireshark
Lab
|
T1:
Wireshark Lab : Chapter 4
|
Contact
Hour 11
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL11.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 4.2
|
During CH
|
CH11
|
CH11.1 = NAT, ARP, DHCP
CH11.2 = Forwarding and Addressing in the Internet
|
|
Post CH
|
SS11
|
ARP
protocol and security
|
|
Post CH
|
HW11
|
RARP
protocol;
As
suggested at the end of CH11
|
|
Post CH
|
LE11
|
Wireshark
lab on ARP protocol
|
|
Contact
Hour 12
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL12.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 4.3
|
During CH
|
CH12
|
CH12.1 = Routing Algorithms: Shortest Path, Flooding, Link
State
CH12.2 = Routing algorithms: Distance Vector and Hierarchical
Routing
|
|
Post CH
|
SS12
|
Various
Link state and Distance vector routing algorithms and comparison among them.
|
|
Post CH
|
HW12
|
As
suggested at the end of CH12
|
|
Contact
Hour 13
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL13.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 4.4
|
During CH
|
CH13
|
CH13.1 = Routing in the Internet: RIP, OSPF, Border Gateway Protocol
CH13.2 = Multicasting
|
|
Post CH
|
SS13
|
Applications
of BGP and OSPF protocols
|
|
Post CH
|
HW13
|
Different
routing protocols used by different categories of ISP's;
As
suggested at the end of CH13
|
|
Contact
Hour 14
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL14.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 5.1
|
During CH
|
CH14
|
CH14.1 = Mobile IP
|
|
Post CH
|
SS14
|
Original
research paper on Mobile IP
|
|
Post CH
|
HW14
|
Mobile
IPv6
As
suggested at the end of CH14
|
|
Post CH
|
LE14
|
Wireshark
lab on Mobile IPv4
|
|
Contact
Hour 15
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL15.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 5.2
|
During CH
|
CH15
|
CH15.1 = QOS, Guaranteed delivery
CH15.2 = Delay, Fifo, Leaky Bucket
CH15.3 = Token Bucket, Queue Management
|
|
Post CH
|
SS15
|
Various
parameters on QoS
|
|
Post CH
|
HW15
|
As
suggested at the end of CH15
|
|
Post CH
|
LE15
|
TBA
|
|
Contact
Hour 16
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL16.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 5.3
|
During CH
|
CH16
|
CH16.1 = QOS, RSVP, IntServ, DiffServ
CH16.2 = MPLS
|
|
Post CH
|
SS16
|
Advantages
and overheads of MPLS protocol
|
|
Post CH
|
HW16
|
As
suggested at the end of CH16
|
|
Contact
Hour 17
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL17.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 6.1
|
During CH
|
CH17
|
CH17.1 = Services
CH17.2 = Framing
CH17.3 = Error Detection and Correction Techniques (Parity
Checks, Checksums, CRC)
|
|
Post CH
|
SS17
|
Security
issues with parity checks, checksums, and CRC
|
|
Post CH
|
HW17
|
Algorithms
for CRC;
As
suggested at the end of CH17
|
|
Post CH
|
LE17
|
TBA
|
|
Contact
Hour 18
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL18.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 6.2
|
During CH
|
CH18
|
CH18.1 = TDM, FDM, Slotted ALOHA, ALOHA
CH18.2 = CSMA, Local Area Networks
CH18.3 = Hidden Terminal problem
|
|
Post CH
|
SS18
|
How
and in what situation OFDM is better than TDM and FDM
|
|
Post CH
|
HW18
|
As
suggested at the end of CH18
|
|
Contact
Hour 19
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL19.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 6.3
|
During CH
|
CH19
|
CH19.1 = Interconnections: Hubs, and Switches
CH19.2 = VLANs
CH19.3 = Journey From Application Layer to Data Link Layer
|
|
Post CH
|
SS19
|
Different
internetworking devices: similarities and differences between them
|
|
Post CH
|
HW19
|
Homework
6.1 as provided in the content
|
|
Contact
Hour 20
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL20.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 7.1
|
During CH
|
CH20
|
CH20.1 = basis for data communication (Fourier Analysis,
Bandwidth Limited Signals, Maximum Data Rate of a Channel)
CH20.2 = Guided physical media
|
|
Post CH
|
SS20
|
Throughput
parameters and ways of measuring them
|
|
Post CH
|
HW20
|
As
suggested at the end of CH20
|
|
Post CH
|
LE20
|
Lab
on different parameters to measure throughput
|
|
Contact Hour
21
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL21.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 7.2
|
During CH
|
CH21
|
CH21.1 = satellite and optical communication
|
|
Post CH
|
SS21
|
Online
web pages on optical communication and its advantages over other
communication technologies.
|
|
Post CH
|
HW21
|
As
suggested at the end of CH21
|
|
Contact
Hour 22
Time
|
Type
|
Sequence
|
Content Reference
|
Pre CH
|
RL22.1
|
As
provided in the recorded lecture
|
Recorded
Lecture 8.1
|
During CH
|
CH22
|
CH22.1 = Security Needs and Aspects
CH22.2 = Introduction to Key Distribution
|
|
Post CH
|
SS22
|
Various
security threats for a network
|
|
Post CH
|
HW22
|
As
suggested at the end of CH22
|
|
Evaluation Scheme:
Legend: EC =
Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
No
|
Name
|
Type
|
Duration
|
Weight
|
Day,
Date, Session, Time
|
EC-1
|
Quiz-I
|
Online
|
-
|
5%
|
August 26 to
September 4, 2017
|
|
Quiz-II
|
Online
|
|
5%
|
September 26 to
October 4, 2017
|
|
Assignment-I
|
Online
|
|
10%
|
October 20 to 30,
2017
|
EC-2
|
Mid-Semester
Test
|
Closed
Book
|
2
hours
|
30%
|
24/09/2017
(AN) 2 PM TO 4 PM
|
EC-3
|
Comprehensive
Exam
|
Open
Book
|
3
hours
|
50%
|
05/11/2017
(AN) 2 PM TO 5 PM
|
Note to faculty: For sample assignment questions, refer Computer
Networking Courses LabExercises.doc and Computer Networks Lab Exercises.docx
Syllabus for
Mid-Semester Test (Closed Book): Topics in Session Nos. 1 TO 11
Syllabus for
Comprehensive Exam (Open Book): All topics (Session Nos. 1 to 22)
Important
links and information:
Elearn portal: https://elearn.bits-pilani.ac.in
Students are
expected to visit the Elearn portal on a regular basis and stay up to date with
the latest announcements and deadlines.
Contact sessions:
Students should attend the online lectures as per the schedule provided on the
Elearn portal.
Evaluation Guidelines:
1. EC-1
consists of either two Assignments or three Quizzes. Students will attempt them
through the course pages on the Elearn portal. Announcements will be made on
the portal, in a timely manner.
2. For
Closed Book tests: No books or reference material of any kind will be
permitted.
3. For Open
Book exams: Use of books and any printed / written reference material (filed or
bound) is permitted. However, loose sheets of paper will not be allowed. Use of
calculators is permitted in all exams. Laptops/Mobiles of any kind are not
allowed. Exchange of any material is not allowed.
4. If a
student is unable to appear for the Regular Test/Exam due to genuine exigencies,
the student should follow the procedure to apply for the Make-Up Test/Exam
which will be made available on the Elearn portal. The Make-Up Test/Exam will
be conducted only at selected exam centres on the dates to be announced later.
It shall be the
responsibility of the individual student to be regular in maintaining the self
study schedule as given in the course handout, attend the online lectures, and
take all the prescribed evaluation components such as Assignment/Quiz,
Mid-Semester Test and Comprehensive Exam according to the evaluation scheme
provided in the handout.
No comments:
Post a Comment