You are on page 1of 13

BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI

WORK INTEGRATED LEARNING PROGRAMMES


Digital Learning
Part A: Course Design
Course Title
Computer Networks
Course No(s)

IS ZC467

Credit Units

Credit Model

1: Class Room Hours


2: Students Preparation
1: Lab Work (if 4 credit course)

Content Authors
Course Objectives
No
CO1

Serves as the first introductory course in networking. Exposes to the history, evolution and need
for computer networks.

CO2

Provides the details of the layered architecture of a computer network and different protocols
that make these layers work.

CO3

Provides the details of different types of networks taking examples from wireless networks,
mobile networks, voice and video communication showing the real world deployments.

CO4

Lays the foundation for advanced study in the area of protocol design, wireless networking,
quality of service and network security.

Text Book(s)
T1
Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach, Pearson
India, 5th Edition, 2012.
Reference Book(s) & other resources
R1
Forouzan B A: Data Communications and Networking, McGraw Hill, 4th Edition, 2006.
R2

Andrew S. Tanenbaum, Computer Networks, 5th Edition, Pearson India, 2012.

R3

L. Peterson and B. Davie, Computer Networks: A Systems Approach, 5th Edition,


Morgan-Kaufmann, 2012.

Modular Content Structure


1.
Introduction
1.1.

Introduction
1.1.1.

A Network and the Internet - its

1.1.2.

What is a Protocol?

1.2.1.

The

different views
1.2.

Deeper Dive
Network

Edge

and

the

Network Core

2.

3.

4.

1.2.2.
Types of Networks - Circuit or
Packet Switched. Which one to choose?
1.3.
Characteristics of Packet Switched Networks
1.3.1.
Delay in packets delivery
1.3.2.
Loss of Packets
1.3.3.
Throughput
1.4.
Layered Architecture of a Protocol
1.4.1.
Layered Architecture
1.4.2.
Purpose of different layers
1.4.3.
Packet Encapsulation
Application Layer
2.1.
What are network applications?
2.1.1.
Architecture
2.1.2.
Communication and Transport
2.1.3.
Application Protocols
2.2.
Few Applications
2.2.1.
HTTP, FTP and SMTP
2.2.2.
DNS
2.2.3.
Peer-To-Peer Applications
2.3.
Introduction to Socket Programming with TCP and UDP
Transport Layer
3.1.
Concept and operations of transport
3.2.
Connectionless Transport with UDP
3.2.1.
UDP Segment Structure
3.3.
Reliability in Transport
3.3.1.
Principles
3.3.2.
Different aspects to achieve
reliability
3.4.
Connection Oriented Transport with TCP
3.4.1.
TCP segment structure
3.4.2.
How TCP provides reliable data
transfer
3.4.3.
Flow Control
3.4.4.
Connection management
3.5.
Congestion Control
3.5.1.
Principles
3.5.2.
TCP
Congestion
control
mechanism
Network Layer
4.1.
Need for the Network Layer
4.2.
How Network works - Forwarding and Routing
4.3.
Circuits and Networks
4.4.
How a router works?
4.5.
IP Datagram and addressing
4.5.1.
IPv4 and IPv6
4.5.2.
Internet Control Message Protocol

(ICMP)
4.6.

Routing Algorithms
4.6.1.
Routing Fundamentals
4.6.2.
Routing Algorithms like: Link
State (LS), Distance Vector (DV) and Hierarchical
4.6.3.
Routing Protocols in Internet:
Routing Information (RIP, )Border Gateway (BGP) and Open Shortest Path First
(OSPF).
4.7.
Broadcast and Multicast: Difference and Algorithms

5.

Link Layer
5.1.
5.2.
5.3.
5.4.

Introduction
Error Detection and Correction
Multiple Access Protocols
What is link virtualization?
5.4.1.
Multi Protocol Label Switching

(MPLS)
6.

Wireless and Mobile networks (select topics)


6.1.
Wireless Networks
6.2.
Mobile Networks
6.3.
Mobility management and Mobile IP

7.

Multimedia Communication (select topics)


7.1.
Fundamentals of Audio and Video.
7.2.
Video Streaming and its types
7.3.
Voice over IP (VoIP)
7.4.
Quality of Service (QoS) in Multimedia Communication

8.

Network Security (select topics)


8.1.
Principles of Cryptography
8.2.
Security in Application, Transport and Network layers.
8.3.
Network Security Devices - Firewall and Session Border
Controllers
Learning Outcomes:
No

Learning Outcomes

LO1

Knowledge to visualize what all make a computer network work - devices and protocols.

LO2

Knowledge to appreciate the layered and modular network architecture to design a computer
network and apply the concepts in the wider variety of networks - wireline, wireless, and
mobile.

LO3

Foundation understanding of the advanced concepts like network security, quality of service
and multimedia communication.

Part B: Contact Session Plan


Academic Term

Second Semester 2016-2017

Course Title

Computer Networks

Course No

IS ZC467

Content Developer

Vishal Gupta

Glossary of Terms:
1. Contact Hour (CH) stands for a hour long live session with students conducted either in a physical classroom
or enabled through technology. In this model of instruction, instructor led sessions will be for 20 CH.
a. Pre CH = Self Learning done prior to a given contact hour
b. During CH = Content to be discussed during the contact hour by the course instructor
c. Post CH = Self Learning done post the contact hour
2. RL stands for Recorded Lecture or Recorded Lesson. It is presented to the student through an online portal.
A given RL unfolds as a sequences of video segments interleaved with exercises
3. SS stands for Self-Study to be done as a study of relevant sections from textbooks and reference books. It
could also include study of external resources.
4. LE stands for Lab Exercises
5. HW stands for Home Work will consists could be a selection of problems from the text.
Contact Hour 1
Time

Type

Sequence

Content Reference

Pre CH

RL1.1

As provided in the recorded lecture

Recorded Lecture 1.1

During
CH

CH1

CH1.1 = Network Edge


CH1.2 = Network Core
CH1.3 = Access Network
CH1.4 = Delay, Loss, Throughput

T1: 1.4

Post CH

SS1

Different types of delay

Post CH

HW1

As suggested at the end of CH1

Post CH

LE1

Introduction to Wireshark

T1: Wireshark lab : Chapter 1

Contact Hour 2
Time

Type

Sequence

Content Reference

Pre CH

RL2.1

As provided in the recorded lecture

Recorded Lecture 2.1

During
CH

CH2

CH2.1 = Application Layer


introduction and examples

T1: 2.2

CH2.2 = WWW & HTTP, Web


1.0, 2.0, 3.0
Post CH

SS2

HTTP protocol insights

Post CH

HW2

Online webpages on HTTP

protocol

Contact Hour 3
Time

Type

Sequence

Content Reference

Pre CH

RL3.1

As provided in the recorded lecture

Recorded Lecture 2.2

During
CH

CH3

CH3.1 = File Transfer Protocol


CH3.2 = Simple Mail Transfer
Protocol

Post CH

SS3

Problems given on FTP and SMTP

Post CH

HW3

Homework 2.2 as provided in


content

Post CH

LE3

Socket Programming with TCP and T1 : 2.7


UDP
T1: 2.8

Contact Hour 4
Time

Type

Sequence

Content Reference

Pre CH

RL4.1

As provided in the recorded lecture

Recorded Lecture2.3

During
CH

CH4

CH4.1 = Domain Name Systems


(DNS)
CH4.2 = Socket Programming with
TCP
CH4.3 = Socket Programming with
UDP

Post CH

SS4

Application of TCP and UDP

Post CH

HW4

As suggested at the end of CH4

Post CH

LE4

Wireshark lab on TCP and UDP

T1: Wireshark Labs: Chapter 2

Contact Hour 5
Time

Type

Sequence

Content Reference

Pre CH

RL5.1

As provided in the recorded lecture

Recorded Lecture 3.1

During
CH

CH5

CH5.1 = Multiplexing,
Demultiplexing
CH5.2 = Sliding Window

CH5.3 = Flow and Error control;


connectionless and connection
oriented
Post CH

SS5

Flow and error control


mechanisms.

Post CH

HW5

As suggested at the end of CH5

Contact Hour 6
Time

Type

Sequence

Content Reference

Pre CH

RL6.1

As provided in the recorded lecture

Recorded Lecture 3.2

During
CH

CH6

CH6.1 = Principles of Reliable


Data Transfer (Stop and Wait, GoBack-N, and Selective Repeat)

Post CH

SS6

Comparison of transport protocols

Post CH

HW6

As suggested at the end of CH6

Contact Hour 7
Time

Type

Sequence

Content Reference

Pre CH

RL7.1

As provided in the recorded lecture

Recorded Lecture 3.3

During
CH

CH7

CH7.1 = TCP: Segment structure,


Setup, Termination, State
transistions

Post CH

SS7

TCP Protocol

Post CH

HW7

As suggested at the end of CH7

Post CH

LE7

Wireshark lab to interpret TCP


segments

T1: Wireshark Labs: Exploring TCP

Contact Hour 8
Time

Type

Sequence

Content Reference

Pre CH

RL8.1

As provided in the recorded lecture

Recorded Lecture 3.4

During
CH

CH8

CH8.1 = TCP Flow Control


CH8.2 = TCP Error Control
CH8.3 = Congestion Control

CH8.4 = Fairness
Post CH

SS8

A research paper on congestion


control. It will be provided at
appropriate time.

Post CH

HW8

As suggested at the end of CH8

Post CH

LE8

Wireshark lab to observe flow


rates.

Contact Hour 9
Time

Type

Sequence

Content Reference

Pre CH

RL9.1

As provided in the recorded lecture

Recorded Lecture 3.5

During
CH

CH9

CH9.1 = RTT Estimation and


Timeout
CH9.2 = TCP Timers and UDP

Post CH

SS9

Online pages covering other


protocols SCTP

Post CH

HW9

As suggested at the end of CH9

Contact Hour 10
Time

Type

Sequence

Content Reference

Pre CH

RL10.1

As provided in the recorded lecture

Recorded Lecture 4.1

During
CH

CH10

CH10.1 = Functions of Network


layer
CH10.2 = Virtual Circuits and
Datagram Networks
CH10.3 = What is inside a router?

Post CH

SS10

Difference between input ports and


output ports. Solving various
unsolved questions in your
textbook on the covered topics.

Post CH

HW10

What is the difference between


switch and a router;
As suggested at the end of CH10

Post CH

LE10

Wireshark Lab

Contact Hour 11

T1: Wireshark Lab : Chapter 4

Time

Type

Sequence

Content Reference

Pre CH

RL11.1

As provided in the recorded lecture

Recorded Lecture 4.2

During
CH

CH11

CH11.1 = NAT, ARP, DHCP


CH11.2 = Forwarding and
Addressing in the Internet

Post CH

SS11

ARP protocol and security

Post CH

HW11

RARP protocol;
As suggested at the end of CH11

Post CH

LE11

Wireshark lab on ARP protocol

Contact Hour 12
Time

Type

Sequence

Content Reference

Pre CH

RL12.1

As provided in the recorded lecture

Recorded Lecture 4.3

During
CH

CH12

CH12.1 = Routing Algorithms:


Shortest Path, Flooding, Link State
CH12.2 = Routing algorithms:
Distance Vector and Hierarchical
Routing

Post CH

SS12

Various Link state and Distance


vector routing algorithms and
comparison among them.

Post CH

HW12

As suggested at the end of CH12

Contact Hour 13
Time

Type

Sequence

Content Reference

Pre CH

RL13.1

As provided in the recorded lecture

Recorded Lecture 4.4

During
CH

CH13

CH13.1 = Routing in the Internet:


RIP, OSPF, Border Gateway
Protocol
CH13.2 = Multicasting

Post CH

SS13

Applications of BGP and OSPF


protocols

Post CH

HW13

Different routing protocols used by


different categories of ISP's;
As suggested at the end of CH13

Contact Hour 14
Time

Type

Sequence

Content Reference

Pre CH

RL14.1

As provided in the recorded lecture

Recorded Lecture 5.1

During
CH

CH14

CH14.1 = Mobile IP

Post CH

SS14

Original research paper on Mobile


IP

Post CH

HW14

Mobile IPv6
As suggested at the end of CH14

Post CH

LE14

Wireshark lab on Mobile IPv4

Contact Hour 15
Time

Type

Sequence

Content Reference

Pre CH

RL15.1

As provided in the recorded lecture

Recorded Lecture 5.2

During
CH

CH15

CH15.1 = QOS, Guaranteed


delivery
CH15.2 = Delay, Fifo, Leaky
Bucket
CH15.3 = Token Bucket, Queue
Management

Post CH

SS15

Various parameters on QoS

Post CH

HW15

As suggested at the end of CH15

Post CH

LE15

TBA

Contact Hour 16
Time

Type

Sequence

Content Reference

Pre CH

RL16.1

As provided in the recorded lecture

Recorded Lecture 5.3

During
CH

CH16

CH16.1 = QOS, RSVP, IntServ,


DiffServ
CH16.2 = MPLS

Post CH

SS16

Advantages and overheads of


MPLS protocol

Post CH

HW16

As suggested at the end of CH16

Contact Hour 17
Time

Type

Sequence

Content Reference

Pre CH

RL17.1

As provided in the recorded lecture

Recorded Lecture 6.1

During
CH

CH17

CH17.1 = Services
CH17.2 = Framing
CH17.3 = Error Detection and
Correction Techniques (Parity
Checks, Checksums, CRC)

Post CH

SS17

Security issues with parity checks,


checksums, and CRC

Post CH

HW17

Algorithms for CRC;


As suggested at the end of CH17

Post CH

LE17

TBA

Contact Hour 18
Time

Type

Sequence

Content Reference

Pre CH

RL18.1

As provided in the recorded lecture

Recorded Lecture 6.2

During
CH

CH18

CH18.1 = TDM, FDM, Slotted


ALOHA, ALOHA
CH18.2 = CSMA, Local Area
Networks
CH18.3 = Hidden Terminal
problem

Post CH

SS18

How and in what situation OFDM


is better than TDM and FDM

Post CH

HW18

As suggested at the end of CH18

Contact Hour 19
Time

Type

Sequence

Content Reference

Pre CH

RL19.1

As provided in the recorded lecture

Recorded Lecture 6.3

During
CH

CH19

CH19.1 = Interconnections: Hubs,


and Switches

CH19.2 = VLANs
CH19.3 = Journey From
Application Layer to Data Link
Layer
Post CH

SS19

Different internetworking devices:


similarities and differences
between them

Post CH

HW19

Homework 6.1 as provided in the


content

Contact Hour 20
Time

Type

Sequence

Content Reference

Pre CH

RL20.1

As provided in the recorded lecture

Recorded Lecture 7.1

During
CH

CH20

CH20.1 = basis for data


communication (Fourier Analysis,
Bandwidth Limited Signals,
Maximum Data Rate of a Channel)
CH20.2 = Guided physical media

Post CH

SS20

Throughput parameters and ways


of measuring them

Post CH

HW20

As suggested at the end of CH20

Post CH

LE20

Lab on different parameters to


measure throughput

Contact Hour 21
Time

Type

Sequence

Content Reference

Pre CH

RL21.1

As provided in the recorded lecture

Recorded Lecture 7.2

During
CH

CH21

CH21.1 = satellite and optical


communication

Post CH

SS21

Online web pages on optical


communication and its advantages
over other communication
technologies.

Post CH

HW21

As suggested at the end of CH21

Contact Hour 22

Time

Type

Sequence

Content Reference

Pre CH

RL22.1

As provided in the recorded lecture

Recorded Lecture 8.1

During
CH

CH22

CH22.1 = Security Needs and


Aspects
CH22.2 = Introduction to Key
Distribution

Post CH

SS22

Various security threats for a


network

Post CH

HW22

As suggested at the end of CH22

Evaluation Scheme:
Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
No
Name
Type
Duratio Weight Day, Date, Session, Time
n
EC-1
Quiz-I
Online
5%
February 1 to 10, 2017
Quiz-II
Online
5%
March 1 to 10, 2017
Assignment-I
Online
10%
March 20 to 30, 2017
EC-2
Mid-Semester Test
Closed
2 hours
30%
26/02/2017 (AN) 2 PM TO 4 PM
Book
EC-3
Comprehensive
Open
3 hours
50%
09/04/2017 (AN) 2 PM TO 5 PM
Exam
Book
Note to faculty: For sample assignment questions, refer Computer Networking Courses LabExercises.doc
and Computer Networks Lab Exercises.docx

1.
2.
3.
4.

Syllabus for Mid-Semester Test (Closed Book): Topics in Session Nos. 1 TO 11


Syllabus for Comprehensive Exam (Open Book): All topics (Session Nos. 1 to 22)
Important links and information:
Elearn portal: https://elearn.bits-pilani.ac.in
Students are expected to visit the Elearn portal on a regular basis and stay up to date with the latest
announcements and deadlines.
Contact sessions: Students should attend the online lectures as per the schedule provided on the Elearn
portal.
Evaluation Guidelines:
EC-1 consists of either two Assignments or three Quizzes. Students will attempt them through the course
pages on the Elearn portal. Announcements will be made on the portal, in a timely manner.
For Closed Book tests: No books or reference material of any kind will be permitted.
For Open Book exams: Use of books and any printed / written reference material (filed or bound) is
permitted. However, loose sheets of paper will not be allowed. Use of calculators is permitted in all exams.
Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the student should
follow the procedure to apply for the Make-Up Test/Exam which will be made available on the Elearn portal.
The Make-Up Test/Exam will be conducted only at selected exam centres on the dates to be announced later.
It shall be the responsibility of the individual student to be regular in maintaining the self study schedule as
given in the course handout, attend the online lectures, and take all the prescribed evaluation components
such as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the evaluation scheme
provided in the handout.

You might also like