Computer networks are ubiquitous in our daily lives, where we use 5G or WIFI from our favorite smart devices to connect to cloud servers that could be located in another country. This seemingly trivial task is actually made possible by an orchestration of technical components, each of which are ingenious inventions on their own. In this course we study the fundamental principles of computer networks along with their historical background. We also look at the advantages and fundamental limitations of each technology and learn how reliability and scalability is achieved in computer networks. In doing so, this course will prepare you for advanced operations and research in computer networks though the deep understanding of how computer networks function.
By the end of this course, students will be able to:
Explain computer networks from a layered perspective through the use of reference models
Elaborate on the mecahnism of digital modulation and multiplexing in guided transmission media and wireless transmission
Detect and correct errors in transmitted data
Understand the limitations of each protocol and use this knowledge to choose between them
Explain the significance of concepts such as packet switching, routing, and TCP/IP
Assess security threats based on their understanding of encryption technologies
Digital modulation, Multiplexing, Error detection, Error correction, Channel allocation problem, Ethernet, Wireless LANs, Switching, Routing, Congestion control, UCP, TCP, DNS, e-mail, world wide web, Network security, Symmetric-key encryption, Public-key encryption, Digital signature, Authentication protocols
|✔ Specialist skills||Intercultural skills||Communication skills||Critical thinking skills||✔ Practical and/or problem-solving skills|
Classes will be taught online this year. Lectures will use slides and its contents will be based on the text book. Assignments will be given through Google Form, and will be based on the contents of the slides and text book. Please make sure to buy the text book.
|Course schedule||Required learning|
|Class 1||Fundamentals of computer networks (part 1) Layered protocols||Explain the role of layered protocols and the role of each layer in the reference model.|
|Class 2||Fundamentals of computer networks (part 2) Components of computer networks||Able to classify communication methods and distinguish between repeaters, bridges, and routers.|
|Class 3||Fundamentals of TCP/IP TCP/IP protocal layers||Understand the relationship between TCP/IP and the Internet. Give examples of TCP/IP protocol layers and communication methods.|
|Class 4||Data link (part 1) Ethernet and wireless communication||Understand frame formats for Ethernet. Evaluate wireless communication standards.|
|Class 5||Data link (part 2) PPP and public networks||Understand frame formats for PPP. Evaluate public network standards.|
|Class 6||IP protocol (part 1) IP address and routing||Understand the purpose of IP addresses and the network layer. Predict and control the behavior of routing.|
|Class 7||IP protocol (part 2) IP fragmentation and format||Learn how to split and reassmble IP datagrams. Explain the IP frame format.|
|Class 8||Midterm exam||Test level of understanding and self-evaluate achievement for classes 1-7.|
|Class 9||IP related technology DNS, ARP, ICMP, DHCP, NAT||Explain the mechanism and purpose of DNS, ARP, ICMP, DHCP, NAT.|
|Class 10||TCP and UDP (part 1) Transport layer and port number||Understand the purpose of transport layer, and can identify a socket through the IP address and port number.|
|Class 11||TCP and UDP (part 2) TCP and UDP protocols||Understand differences between TCP and UDP, and can explain the mechanism behind resend and congestion control.|
|Class 12||Routing protocol RIP, OSPF, BGP, MPLS||Can name multiple routing protocols and can choose the appropriate one.|
|Class 13||Application protocol SSH, FTP, SMTP, IMAP, HTML||Can name multiple application protocols and can use them effectively by understanding. their purpose and mechanism.|
|Class 14||Network security Firewall, encryption technology||Understand encryption technology, and security concerns of computer networks.|
|Class 15||Final exam||Test level of understanding and self-evaluate achievement for classes 1-14.|
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.
“Mastering TCP/IP (6th edition)” (in Japanese), T. Takeshita and others, Ohmsha, ISBN-13: 978-4274068768
“Computer Networks (5th edition)”, A.S. Tanenbaum, D. J. Wetherall, Prentice-Hall, ISBN-13: 978-0132126953
Excersize(20%)，Midterm exam(30%)，Final exam(50%)
The Zoom link will be send to registered students one day before the first lecture.