Course Purpose |
The purpose of this course is for students to understand protocol hierarchy, which is a foundation of designing and constructing information networks, and to learn how information is transferred and processed through information networks. |
Learning Goals |
Students will be able to understand the following basic technologies of Internet: a) IP addressing, b) access control, c) error detection and correction, d) routing, e) IP datagram, f) window control, g) flow and congestion control, h) internet applications ( WWW, e-mail, DNS), i) network programming, j) network security, k) multimedia networks. |
Topic |
Session 1 | Introduction and layered architecture: Internet, protocol hierarchy |
Session 2 | Physical layer: Wired and wireless communications, fundamentals of data communications |
Session 3 | Data link layer (1): Network link, access control method (TDMA, FDMA, token passing method, slotted ALOHA, CSMA/CD, CSMA/CA) |
Session 4 | Data link layer (2): Error detection and error correction (parity check, CRC), ethernet (physical address, frame) |
Session 5 | Network layer (1): Host name and domain name, IP address (network address and host address), address class, subnet mask |
Session 6 | Network layer (2): Routing control (hop-by-hop routing, routing table), routing algorithms (link state algorithm, distance vector algorithm) |
Session 7 | Network layer (3): IP datagram, ARP, inter-LAN connection equipment (repeater, hub, bridge, router, gateway) |
Session 8 | Transport layer (1): Reliable data transfer, ARQ protocol, sequence number, pipeline transfer, window control |
Session 9 | Transport layer (2): Flow control, congestion control, port numbers, connectionless and connection-oriented communication, UDP and TCP |
Session 10 | Application layer (1): Client and server, WWW, HTML, URI, HTTP, web cache, proxy server |
Session 11 | Application layer (2): Email, SMTP, POP3, IMAP |
Session 12 | Application layer (3): DNS, network programming (Java) |
Session 13 | Application layer (4): Multimedia networking applications, data compression, streaming |
Session 14 | Network security: Unauthorized access, computer viruses, spyware, spam, phishing |
**This content is based on April 1, 2024. For the latest syllabus information and details, please check the