Computer networks are ubiquitous in our daily lives, where we use LTE or WIFI from our favorite smart devices to connect to cloud servers that could be located in another country. This seemingly trivial task is actually made possible by an orchestration of technical components, each of which are ingenious inventions on their own. In this course we study the fundamental principles of computer networks along with their historical background. We also look at the advantages and fundamental limitations of each technology and learn how reliability and scalability is achieved in computer networks. In doing so, this course will prepare you for advanced operations and research in computer networks though the deep understanding of how computer networks function.
By the end of this course, students will be able to:
Explain computer networks from a layered perspective through the use of reference models
Elaborate on the mecahnism of digital modulation and multiplexing in guided transmission media and wireless transmission
Detect and correct errors in transmitted data
Understand the limitations of each protocol and use this knowledge to choose between them
Explain the significance of concepts such as packet switching, routing, and TCP/IP
Assess security threats based on their understanding of encryption technologies
Digital modulation, Multiplexing, Error detection, Error correction, Channel allocation problem, Ethernet, Wireless LANs, Switching, Routing, Congestion control, UCP, TCP, DNS, e-mail, world wide web, Network security, Symmetric-key encryption, Public-key encryption, Digital signature, Authentication protocols
✔ Specialist skills | Intercultural skills | Communication skills | Critical thinking skills | ✔ Practical and/or problem-solving skills |
At the beginning of each class, solutions to exercise problems that were assigned during the previous class are reviewed. Towards the end of class, students are given exercise problems related to the lecture given that day to solve. To prepare for class, students should read the course schedule section and check what topics will be covered. Required learning should be completed outside of the classroom for preparation and review purposes.
Course schedule | Required learning | |
---|---|---|
Class 1 | Fundamentals of computer networks (part 1) Layered protocols | Explain the role of layered protocols and the role of each layer in the reference model. |
Class 2 | Fundamentals of computer networks (part 2) Components of computer networks | Able to classify communication methods and distinguish between repeaters, bridges, and routers. |
Class 3 | Fundamentals of TCP/IP TCP/IP protocal layers | Understand the relationship between TCP/IP and the Internet. Give examples of TCP/IP protocol layers and communication methods. |
Class 4 | Data link (part 1) Ethernet and wireless communication | Understand frame formats for Ethernet. Evaluate wireless communication standards. |
Class 5 | Data link (part 2) PPP and public networks | Understand frame formats for PPP. Evaluate public network standards. |
Class 6 | IP protocol (part 1) IP address and routing | Understand the purpose of IP addresses and the network layer. Predict and control the behavior of routing. |
Class 7 | IP protocol (part 2) IP fragmentation and format | Learn how to split and reassmble IP datagrams. Explain the IP frame format. |
Class 8 | Midterm exam Test level of understanding with exercise problems | Test level of understanding and self-evaluate achievement for classes 1-7. |
Class 9 | IP related technology DNS, ARP, ICMP, DHCP, NAT | Explain the mechanism and purpose of DNS, ARP, ICMP, DHCP, NAT. |
Class 10 | TCP and UDP (part 1) Transport layer and port number | Understand the purpose of transport layer, and can identify a socket through the IP address and port number. |
Class 11 | TCP and UDP (part 2) TCP and UDP protocols | Understand differences between TCP and UDP, and can explain the mechanism behind resend and congestion control. |
Class 12 | Routing protocol RIP, OSPF, BGP, MPLS | Can name multiple routing protocols and can choose the appropriate one. |
Class 13 | Application protocol SSH, FTP, SMTP, IMAP, HTML | Can name multiple application protocols and can use them effectively by understanding. their purpose and mechanism. |
Class 14 | Network security Firewall, encryption technology | Understand encryption technology, and security concerns of computer networks. |
Class 15 | Final exam Test level of understanding with exercise problems | Test level of understanding and self-evaluate achievement for classes 1-14. |
“Mastering TCP/IP (5th edition)” (in Japanese), T. Takeshita and others, Ohmsha, ISBN-13: 978-4274068768
“Computer Networks (5th edition)”, A.S. Tanenbaum, D. J. Wetherall, Prentice-Hall, ISBN-13: 978-0132126953
Excersize(20%),Midterm exam(30%),Final exam(50%)
None