Computer Networks

Course Purpose
The purpose of this course is for students to understand protocol hierarchy, which is a foundation of designing and constructing information networks, and to learn how information is transferred and processed through information networks.
Learning Goals
Students will be able to understand the following basic technologies of Internet: a) IP addressing, b) access control, c) error detection and correction, d) routing, e) IP datagram, f) window control, g) flow and congestion control, h) internet applications ( WWW, e-mail, DNS), i) network programming, j) network security, k) multimedia networks.
Topic
Session 1Introduction and layered architecture: Internet, protocol hierarchy
Session 2Physical layer: Wired and wireless communications, fundamentals of data communications
Session 3Data link layer (1): Network link, access control method (TDMA, FDMA, token passing method, slotted ALOHA, CSMA/CD, CSMA/CA)
Session 4Data link layer (2): Error detection and error correction (parity check, CRC), ethernet (physical address, frame)
Session 5Network layer (1): Host name and domain name, IP address (network address and host address), address class, subnet mask
Session 6Network layer (2): Routing control (hop-by-hop routing, routing table), routing algorithms (link state algorithm, distance vector algorithm)
Session 7Network layer (3): IP datagram, ARP, inter-LAN connection equipment (repeater, hub, bridge, router, gateway)
Session 8Transport layer (1): Reliable data transfer, ARQ protocol, sequence number, pipeline transfer, window control
Session 9Transport layer (2): Flow control, congestion control, port numbers, connectionless and connection-oriented communication, UDP and TCP
Session 10Application layer (1): Client and server, WWW, HTML, URI, HTTP, web cache, proxy server
Session 11Application layer (2): Email, SMTP, POP3, IMAP
Session 12Application layer (3): DNS, network programming (Java)
Session 13Application layer (4): Multimedia networking applications, data compression, streaming
Session 14Network security: Unauthorized access, computer viruses, spyware, spam, phishing
**This content is based on April 1, 2024. For the latest syllabus information and details, please check the syllabus information inquiry page provided by the university.**