You are on page 1of 4

UNIVERSITI UTARA MALAYSIA COLLEGE OF ARTS AND SCIENCES ______________________________________________________________________________________ COURSE CODE COURSE NAME PREREQUISITE STIJ3023 COMPUTER

NETWORK TIJ2013 DATA COMMUNICATION or TIJ2023 NETWORKING BASICS

1.0

SYNOPSIS This course is a continuation from the previous data communication course. The main purpose of this course is to gain in-depth understanding on computer networking, especially on the issues related to the protocol design. This course treats computer networking in a top-down manner i.e. by beginning at the application layer protocols and working down toward physical layer protocols. The course features the Internet and uses the Internets architecture and protocols as primary tools for studying the concept of communication networking.

2.0

OBJECTIVE Upon completion of the course, students are expected to 2.1 2.2 2.3 understand on computer networking concept, which includes the terminologies, technologies, software and hardware used in computer communication networks. study computer networking from the perspective of protocol design. examine, in more detail, the communication network services used to support the network applications. develop the awareness on the current issues and future trends of computer communication networks.

2.4

3.0

LEARNING OUTCOME Upon completion of the course, students will be able to 3.1 understand on computer networking concept, which includes the terminologies, technologies, software and hardware used in computer communication networks. practice socket programming by building a client-server application differentiate between the TCP and UDP transport services describe a router and its functions in computer network identify the components of a wireless computer network distinguish between real-time and stored multimedia streaming describe the encapsulation process of a data transmission in a network apply security measures in wired and wireless computer network identify the tools to be used in network management

3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9

4.0

REFERENCE

4.1 4.2 4.3 4.4 4.5


4.6

4.7 4.8

Tannenbaum, Andrew A. (2002) Computer Networks. 4th ed. Prentice Hall. Kurose, Ross (2007) Computer Networking: A Top-Down Approach Featuring the Internet. 4th ed. Addison Wesley. Martin, James (1994) Local Area Networks, Architecture and Implementation. 2nd ed. Prentice Hall. Halsall, Fred (1996) Data Communications, Computer Networks and Open System. 4th ed. Addison-Wesley. Markley, Richard W. (1990) Data Communications And Interoperability. Englewood Cliffs. Prentice Hall International. Fitzgerald, Jerry (1992) Business Data Communication: Basic Concepts, Security and Design. 4th ed. New York. John Wiley. Shay, William A. (1999) Understanding Data Communication and Networks. 2nd ed. International Thompson Publishing Company. Stalling, William. (1997) Data and Computer Communications. 5th ed. New York Macmillan.

5.0

CONTENT No Topic Computer Networks and the Internet: Internet; Network Edge; Network Core; Network Access and Physical Media; ISPs; Delay and Loss in Packet-Switched Networks; Protocol Layers and Models; History Application Layer Principles of Application Layer Protocols The Web and HTTP File Transfer: FTP Electronic Mail in the Internet DNS The Internets Directory Service Socket Programming with TCP Socket Programming with UDP Building a Simple Web Server Total Hours 3

Transport Layer Introduction and Transport-Layer Services Multiplexing and Demultiplexing Connectionless Transport: UDP Principles of Reliable Data Transfer

Connection-Oriented Transport: TCP Principles of Congestion Control TCP Congestion Control

Network Layer and Routing Introduction and Network Service Models Whats inside a Router The Internet Protocol (IP) IPv6 Routing in the Internet Routing Principles Hierarchical Routing Multicast Wireless and Mobile Networks wireless links and network characteristics Wi-Fi : 802.11 Wireless LANs Cellular Internet Access Mobility Management Mobile IP Managing mobility in Cellular Networks Wireless and Mobility : Impact on High-layer Protocols Multimedia Networking Multimedia Networking Applications Streaming Stored Audio and Video Making the Best of the Best-Effort Service: An Internet Phone Example Protocols for Real-Time Interactive Applications: RTP, RTCP, SIP, H.323 Beyond Best-Effort Scheduling and Policing Mechanisms Integrated Services RSVP Differentiated Services Link Layer and Local Area Networks Data Link Layer: Introduction and Services Ethernet Internetworking devices Security and network management in Computer Networks Network Security Principles of Cryptography Authentication Integrity Key Distribution and Certification Access Control: Firewalls Attacks and Countermeasures Network Management The Infrastructure for Network Management The Internet-Standard Management Framework

10

11

12

13

14

Current issues and future trends in computer and communication networks + PRESENTATION

6.0

TEACHING METHOD This course will involve 42 hours classroom lecture.

7.0

ASSESSMENT Coursework 60% Mid-Term : 30% Quiz : 10% Assignment/Project : 20%

Final Exam

40%

You might also like