BITS WILP Computer Networks Handout 2017-H2


BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI
WORK INTEGRATED LEARNING PROGRAMMES
Digital Learning
Part A: Course Design
2017-H2
Course Title
Computer Networks
Course No(s)
IS ZC467
Credit Units
4
Credit Model
1: Class Room Hours
2: Students Preparation
1: Lab Work (if 4 credit course)
Content Authors
Vishal Gupta

Course Objectives
No

CO1
Serves as the first introductory course in networking. Exposes to the history, evolution and need for computer networks.
CO2
Provides the details of the layered architecture of a computer network and different protocols that make these layers work.
CO3
Provides the details of different types of networks taking examples from wireless networks, mobile networks, voice and video communication showing the real world deployments.
CO4
Lays the foundation for advanced study in the area of protocol design, wireless networking, quality of service and network security.

Text Book(s)
T1
Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach, Pearson India, 5th Edition, 2012.

Reference Book(s) & other resources
R1

Forouzan B A: Data Communications and Networking, McGraw Hill, 4th Edition, 2006.

R2

Andrew S. Tanenbaum, Computer Networks, 5th Edition, Pearson India, 2012.

R3

L.  Peterson  and  B.  Davie,  Computer  Networks:  A  Systems  Approach,  5th  Edition,  Morgan-Kaufmann,  2012.





Modular Content Structure
      1.            Introduction
                        1.1.            Introduction
                                          1.1.1.            A Network and the Internet - its different views
                                          1.1.2.            What is a Protocol?
                        1.2.            Deeper Dive
                                          1.2.1.            The Network Edge and the Network Core
                                          1.2.2.            Types of Networks - Circuit or Packet Switched. Which one to choose?
                        1.3.            Characteristics of Packet Switched Networks
                                          1.3.1.            Delay in packets delivery
                                          1.3.2.            Loss of Packets
                                          1.3.3.            Throughput
                        1.4.            Layered Architecture of a Protocol
                                          1.4.1.            Layered Architecture
                                          1.4.2.            Purpose of different layers
                                          1.4.3.            Packet Encapsulation
      2.            Application Layer
                        2.1.            What are network applications?
                                          2.1.1.            Architecture
                                          2.1.2.            Communication and Transport
                                          2.1.3.            Application Protocols
                        2.2.            Few Applications
                                          2.2.1.            HTTP, FTP and SMTP
                                          2.2.2.            DNS
                                          2.2.3.            Peer-To-Peer Applications
                        2.3.            Introduction to Socket Programming with TCP and UDP
      3.            Transport Layer
                        3.1.            Concept and operations of transport
                        3.2.            Connectionless Transport with UDP
                                          3.2.1.            UDP Segment Structure
                        3.3.            Reliability in Transport
                                          3.3.1.            Principles
                                          3.3.2.            Different aspects to achieve reliability
                        3.4.            Connection Oriented Transport with TCP
                                          3.4.1.            TCP segment structure
                                          3.4.2.            How TCP provides reliable data transfer
                                          3.4.3.            Flow Control
                                          3.4.4.            Connection management
                        3.5.            Congestion Control
                                          3.5.1.            Principles
                                          3.5.2.            TCP Congestion control mechanism
      4.            Network Layer
                        4.1.            Need for the Network Layer
                        4.2.            How Network works - Forwarding and Routing
                        4.3.            Circuits and Networks
                        4.4.            How a router works?
                        4.5.            IP Datagram and addressing
                                          4.5.1.            IPv4 and IPv6
                                          4.5.2.            Internet Control Message Protocol (ICMP)
                        4.6.            Routing Algorithms
                                          4.6.1.            Routing Fundamentals
                                          4.6.2.            Routing Algorithms like: Link State (LS), Distance Vector (DV) and Hierarchical
                                          4.6.3.            Routing Protocols in Internet: Routing Information (RIP, )Border Gateway (BGP) and Open Shortest Path First (OSPF).
                        4.7.            Broadcast and Multicast: Difference and Algorithms




      5.            Link Layer
                        5.1.            Introduction
                        5.2.            Error Detection and Correction
                        5.3.            Multiple Access Protocols
                        5.4.            What is link virtualization?
                                          5.4.1.            Multi Protocol Label Switching (MPLS)

      6.            Wireless and Mobile networks (select topics)
                        6.1.            Wireless Networks
                        6.2.            Mobile Networks
                        6.3.            Mobility management and  Mobile IP

      7.            Multimedia Communication (select topics)
                        7.1.            Fundamentals of Audio and Video.
                        7.2.            Video Streaming and its types
                        7.3.            Voice over IP (VoIP)
                        7.4.            Quality of Service (QoS) in Multimedia Communication

      8.            Network Security (select topics)
                        8.1.            Principles of Cryptography
                        8.2.            Security in Application, Transport and Network layers.
                        8.3.            Network Security Devices - Firewall and Session Border Controllers
Learning Outcomes:
No
Learning Outcomes
LO1
Knowledge to visualize what all make a computer network work - devices and protocols.
LO2
Knowledge to appreciate the layered and modular network architecture to design a computer network and apply the concepts in the wider variety of networks - wireline, wireless, and mobile.
LO3
Foundation understanding of the advanced concepts like network security, quality of service and multimedia communication.




Part B: Contact Session Plan

Academic Term
First Semester 2017-2018
Course Title
Computer Networks
Course No
IS ZC467
Content Developer
Vishal Gupta

Glossary of Terms:
1.      Contact Hour (CH) stands for a hour long live session with students conducted either in a physical classroom or enabled through technology. In this model of instruction, instructor led sessions will be for 20 CH.
a.       Pre CH = Self Learning done prior to a given contact hour
b.      During CH = Content to be discussed during the contact hour by the course instructor
c.       Post CH = Self Learning done post the contact hour
2.      RL stands for Recorded Lecture or Recorded Lesson. It is presented to the student through an online portal. A given RL unfolds as a sequences of video segments interleaved with exercises
3.       SS stands for Self-Study to be done as a study of relevant sections from textbooks and reference books. It could also include study of external resources.
4.      LE stands for Lab Exercises
5.      HW stands for Home Work will consists could be a selection of problems from the text.

Contact Hour 1
Time
Type
Sequence
Content Reference
Pre CH
RL1.1
As provided in the recorded lecture

Recorded Lecture 1.1
During CH
CH1
CH1.1 = Network Edge
CH1.2 = Network Core
CH1.3 = Access Network
CH1.4 = Delay, Loss, Throughput
T1: 1.4
Post CH
SS1
Different types of delay

Post CH
HW1
As suggested at the end of CH1

Post CH
LE1
Introduction to Wireshark
T1: Wireshark lab : Chapter 1

Contact Hour 2
Time
Type
Sequence
Content Reference
Pre CH
RL2.1
As provided in the recorded lecture
Recorded Lecture 2.1
During CH
CH2
CH2.1 = Application Layer introduction and examples

CH2.2 = WWW & HTTP, Web 1.0, 2.0, 3.0

T1: 2.2
Post CH
SS2
HTTP protocol insights

Post CH
HW2
Online webpages on HTTP protocol



Contact Hour 3
Time
Type
Sequence
Content Reference
Pre CH
RL3.1
As provided in the recorded lecture
Recorded Lecture 2.2
During CH
CH3
CH3.1 = File Transfer Protocol

CH3.2 = Simple Mail Transfer Protocol


Post CH
SS3
Problems given on FTP and SMTP

Post CH
HW3
Homework 2.2 as provided in content

Post CH
LE3
Socket Programming with TCP and UDP
T1 : 2.7
T1: 2.8


Contact Hour 4
Time
Type
Sequence
Content Reference
Pre CH
RL4.1
As provided in the recorded lecture
Recorded Lecture2.3
During CH
CH4
CH4.1 = Domain Name Systems (DNS)

CH4.2 = Socket Programming with TCP

CH4.3 = Socket Programming with UDP


Post CH
SS4
Application of TCP and UDP

Post CH
HW4
As suggested at the end of CH4

Post CH
LE4
Wireshark lab on TCP and UDP
T1: Wireshark Labs: Chapter 2


Contact Hour 5
Time
Type
Sequence
Content Reference
Pre CH
RL5.1
As provided in the recorded lecture
Recorded Lecture 3.1
During CH
CH5
CH5.1 = Multiplexing, Demultiplexing

CH5.2 = Sliding Window

CH5.3 = Flow and Error control; connectionless and connection oriented

Post CH
SS5
Flow and error control mechanisms.

Post CH
HW5
As suggested at the end of CH5



Contact Hour 6
Time
Type
Sequence
Content Reference
Pre CH
RL6.1
As provided in the recorded lecture
Recorded Lecture 3.2
During CH
CH6
CH6.1 = Principles of Reliable Data Transfer (Stop and Wait, Go-Back-N, and Selective Repeat)


Post CH
SS6
Comparison of transport protocols

Post CH
HW6
As suggested at the end of CH6




Contact Hour 7
Time
Type
Sequence
Content Reference
Pre CH
RL7.1
As provided in the recorded lecture
Recorded Lecture 3.3
During CH
CH7
CH7.1 = TCP: Segment structure, Setup, Termination, State transistions


Post CH
SS7
TCP Protocol

Post CH
HW7
As suggested at the end of CH7

Post CH
LE7
Wireshark lab to interpret TCP segments
T1: Wireshark Labs: Exploring TCP


Contact Hour 8
Time
Type
Sequence
Content Reference
Pre CH
RL8.1
As provided in the recorded lecture
Recorded Lecture 3.4
During CH
CH8
CH8.1 = TCP Flow Control

CH8.2 = TCP Error Control

CH8.3 = Congestion Control

CH8.4 = Fairness

Post CH
SS8
A research paper on congestion control. It will be provided at appropriate time.

Post CH
HW8
As suggested at the end of CH8

Post CH
LE8
Wireshark lab to observe flow rates.



Contact Hour 9
Time
Type
Sequence
Content Reference
Pre CH
RL9.1
As provided in the recorded lecture
Recorded Lecture 3.5
During CH
CH9
CH9.1 = RTT Estimation and Timeout

CH9.2 = TCP Timers and UDP


Post CH
SS9
Online pages covering other protocols – SCTP

Post CH
HW9
As suggested at the end of CH9



Contact Hour 10
Time
Type
Sequence
Content Reference
Pre CH
RL10.1
As provided in the recorded lecture
Recorded Lecture 4.1
During CH
CH10
CH10.1 = Functions of Network layer

CH10.2 = Virtual Circuits and Datagram Networks

CH10.3 = What is inside a router?

Post CH
SS10
Difference between input ports and output ports. Solving various unsolved questions in your textbook on the covered topics.

Post CH
HW10
What is the difference between switch and a router;
As suggested at the end of CH10

Post CH
LE10
Wireshark Lab
T1: Wireshark Lab : Chapter 4



Contact Hour 11
Time
Type
Sequence
Content Reference
Pre CH
RL11.1
As provided in the recorded lecture
Recorded Lecture 4.2
During CH
CH11
CH11.1 = NAT, ARP, DHCP

CH11.2 = Forwarding and Addressing in the Internet


Post CH
SS11
ARP protocol and security

Post CH
HW11
RARP protocol;
As suggested at the end of CH11

Post CH
LE11
Wireshark lab on ARP protocol



Contact Hour 12
Time
Type
Sequence
Content Reference
Pre CH
RL12.1
As provided in the recorded lecture
Recorded Lecture 4.3
During CH
CH12
CH12.1 = Routing Algorithms: Shortest Path, Flooding, Link State

CH12.2 = Routing algorithms: Distance Vector and Hierarchical Routing

Post CH
SS12
Various Link state and Distance vector routing algorithms and comparison among them.

Post CH
HW12
As suggested at the end of CH12




Contact Hour 13
Time
Type
Sequence
Content Reference
Pre CH
RL13.1
As provided in the recorded lecture
Recorded Lecture 4.4
During CH
CH13
CH13.1 = Routing in the Internet: RIP, OSPF, Border Gateway Protocol
CH13.2 = Multicasting


Post CH
SS13
Applications of BGP and OSPF protocols

Post CH
HW13
Different routing protocols used by different categories of ISP's;
As suggested at the end of CH13




Contact Hour 14
Time
Type
Sequence
Content Reference
Pre CH
RL14.1
As provided in the recorded lecture
Recorded Lecture 5.1
During CH
CH14
CH14.1 = Mobile IP


Post CH
SS14
Original research paper on Mobile IP

Post CH
HW14
Mobile IPv6
As suggested at the end of CH14

Post CH
LE14
Wireshark lab on Mobile IPv4




Contact Hour 15
Time
Type
Sequence
Content Reference
Pre CH
RL15.1
As provided in the recorded lecture
Recorded Lecture 5.2
During CH
CH15
CH15.1 = QOS, Guaranteed delivery

CH15.2 = Delay, Fifo, Leaky Bucket

CH15.3 = Token Bucket, Queue Management

Post CH
SS15
Various parameters on QoS

Post CH
HW15
As suggested at the end of CH15

Post CH
LE15
TBA



Contact Hour 16
Time
Type
Sequence
Content Reference
Pre CH
RL16.1
As provided in the recorded lecture
Recorded Lecture 5.3
During CH
CH16
CH16.1 = QOS, RSVP, IntServ, DiffServ

CH16.2 = MPLS

Post CH
SS16
Advantages and overheads of MPLS protocol

Post CH
HW16
As suggested at the end of CH16





Contact Hour 17
Time
Type
Sequence
Content Reference
Pre CH
RL17.1
As provided in the recorded lecture
Recorded Lecture 6.1
During CH
CH17
CH17.1 = Services

CH17.2 = Framing

CH17.3 = Error Detection and Correction Techniques (Parity Checks, Checksums, CRC)


Post CH
SS17
Security issues with parity checks, checksums, and CRC

Post CH
HW17
Algorithms for CRC;
As suggested at the end of CH17

Post CH
LE17
TBA




Contact Hour 18
Time
Type
Sequence
Content Reference
Pre CH
RL18.1
As provided in the recorded lecture
Recorded Lecture 6.2
During CH
CH18
CH18.1 = TDM, FDM, Slotted ALOHA, ALOHA
CH18.2 = CSMA, Local Area Networks
CH18.3 = Hidden Terminal problem


Post CH
SS18
How and in what situation OFDM is better than TDM and FDM

Post CH
HW18
As suggested at the end of CH18




Contact Hour 19
Time
Type
Sequence
Content Reference
Pre CH
RL19.1
As provided in the recorded lecture
Recorded Lecture 6.3
During CH
CH19
CH19.1 = Interconnections: Hubs, and Switches

CH19.2 = VLANs

CH19.3 = Journey From Application Layer to Data Link Layer


Post CH
SS19
Different internetworking devices: similarities and differences between them

Post CH
HW19
Homework 6.1 as provided in the content




Contact Hour 20
Time
Type
Sequence
Content Reference
Pre CH
RL20.1
As provided in the recorded lecture
Recorded Lecture 7.1
During CH
CH20
CH20.1 = basis for data communication (Fourier Analysis, Bandwidth Limited Signals, Maximum Data Rate of a Channel)

CH20.2 = Guided physical media


Post CH
SS20
Throughput parameters and ways of measuring them

Post CH
HW20
As suggested at the end of CH20

Post CH
LE20
Lab on different parameters to measure throughput



Contact Hour 21
Time
Type
Sequence
Content Reference
Pre CH
RL21.1
As provided in the recorded lecture
Recorded Lecture 7.2
During CH
CH21
CH21.1 = satellite and optical communication


Post CH
SS21
Online web pages on optical communication and its advantages over other communication technologies.

Post CH
HW21
As suggested at the end of CH21



Contact Hour 22
Time
Type
Sequence
Content Reference
Pre CH
RL22.1
As provided in the recorded lecture
Recorded Lecture 8.1
During CH
CH22
CH22.1 = Security Needs and Aspects

CH22.2 = Introduction to Key Distribution

Post CH
SS22
Various security threats for a network

Post CH
HW22
As suggested at the end of CH22



 Evaluation Scheme:  
Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
No
Name
Type
Duration
Weight
Day, Date, Session, Time
EC-1
Quiz-I
Online
-
5%
August 26 to September 4, 2017

Quiz-II
Online

5%
September 26 to October 4, 2017

Assignment-I
Online

10%
October 20 to 30, 2017
EC-2
Mid-Semester Test
Closed Book
2 hours
30%
24/09/2017 (AN) 2 PM TO 4 PM
EC-3
Comprehensive Exam
Open Book
3 hours
50%
05/11/2017 (AN) 2 PM TO 5 PM

Note to faculty: For sample assignment questions, refer Computer Networking Courses LabExercises.doc and Computer Networks Lab Exercises.docx

Syllabus for Mid-Semester Test (Closed Book): Topics in Session Nos.  1 TO 11
Syllabus for Comprehensive Exam (Open Book): All topics (Session Nos. 1 to 22)
Important links and information:
Elearn portal: https://elearn.bits-pilani.ac.in
Students are expected to visit the Elearn portal on a regular basis and stay up to date with the latest announcements and deadlines.
Contact sessions: Students should attend the online lectures as per the schedule provided on the Elearn portal.
Evaluation Guidelines:
1.      EC-1 consists of either two Assignments or three Quizzes. Students will attempt them through the course pages on the Elearn portal. Announcements will be made on the portal, in a timely manner.
2.      For Closed Book tests: No books or reference material of any kind will be permitted.
3.      For Open Book exams: Use of books and any printed / written reference material (filed or bound) is permitted. However, loose sheets of paper will not be allowed. Use of calculators is permitted in all exams. Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
4.      If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the student should follow the procedure to apply for the Make-Up Test/Exam which will be made available on the Elearn portal. The Make-Up Test/Exam will be conducted only at selected exam centres on the dates to be announced later.
It shall be the responsibility of the individual student to be regular in maintaining the self study schedule as given in the course handout, attend the online lectures, and take all the prescribed evaluation components such as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the evaluation scheme provided in the handout.


No comments:

Post a Comment