CS 425: Computer Networks
Units: 3-0-0-9
Pre-requisites: ESC101, CS210.
Course Contents:
- Introduction, history and development of computer networks, networks topologies. Layering and protocols.
- Physical Layer: Different types of transmission media, errors in transmission: attenuation, noise. Repeaters. Encoding (NRZ, NRZI, Manchester, 4B/5B, etc.).
- MAC Layer: Aloha, CSMA, CSMA/CD, CSMA/CA protocols. Examples: Ethernet, including Gigabit Ethernet and WiFi (802.11). Time permitting, a quick exposure to Token Ring and to Bluetooth, WiMax may also be included.
- Data Link Layer: Error detection (Parity, CRC), Sliding Window, Stop and Wait protocols.
- LAN: Design, specifications of popular technologies, switching. A student should be able to design LAN of a campus or a building.
- Network layer: Internet Protocol, IPv6, ARP, DHCP, ICMP, Routing algorithms: Distance vector, Link state, Metrics, Inter-domain routing. Subnetting, Classless addressing, Network Address Translation.
- Transport layer: UDP, TCP. Connection establishemnt and termination, sliding window revisited, flow and congestion control, timers, retransmission, TCP extensions, etc.
- Design issues in protocols at different layers.
- Network Programming: Socket Programming.
- Session, Presentation, and Application Layers. Examples: DNS, SMTP, IMAP, HTTP, etc.
- Network Security: Conepts of symmetric and asymmetric key cryptography. Sharing of symmetric keys - Diffie Hellman. Public Key Infrastructure. Public Key Authentication Protocols. Symmetric Key Authentication Protocols. Pretty Good Privacy (PGP), IPSec, Firewalls.
Books and References:
- AS Tanenbaum, DJ Wetherall, Computer Networks, 5th Ed., Prentice-Hall, 2010.
- LL Peterson, BS Davie, Computer Networks: A Systems Approach, 5th Ed., Morgan-Kauffman, 2011.
- JF Kurose, KW Ross, Computer Networking: A Top-Down Approach, 5th Ed., Addison-Wesley, 2009.
- W Stallings, Cryptography and Network Security, Principles and Practice, 5th Ed., Prentice-Hall, 2010