Nowadays, communication networks have become the essential infrastructure for our daily life.
The communication networks, such as the internet consist of various component technologies.
This course focuses on understanding the overview and the background mathematical theories of each component that configures the communication network.
1. General understanding of the communication networking that is the essential knowledge for managing the local area network in the future carrier.
2. The understanding of the mathematical theories such as the signal modulation and the source coding theorem
Internet protocol, Networking theory, Communication theory, Source coding theorem, Cryptographic theory
✔ Specialist skills | Intercultural skills | Communication skills | Critical thinking skills | ✔ Practical and/or problem-solving skills |
Lecture and exercise
Course schedule | Required learning | |
---|---|---|
Class 1 | How to proceed with the lecture, The internet and OSI reference model | OSI reference model and functions of each layer |
Class 2 | Internet protocol (IP) | Functions of IP |
Class 3 | Routing technology | The exercise about the routing table |
Class 4 | MAC Protocol | The exercise about the various MAC protocols |
Class 5 | Signal Modulation I | The exercise about Fourier Transformation Theory |
Class 6 | Signal Modulation II | The exercise about the analog signal modulation |
Class 7 | Signal Modulation III | The exercise about the digital signal modulation |
Class 8 | Exercise | None |
Class 9 | Transport Protocol | The exercise about the transport protocol |
Class 10 | Application Layer, Other functions | The exercise about the DNS and HTTP protocols |
Class 11 | Probability Theory | The exercise about the random process and probability theory |
Class 12 | Channel Coding I | The exercise about the information entropy |
Class 13 | Channel Coding II | The exercise about the source coding theorem |
Class 14 | Channel Coding III | The exercise about the channel coding theorem |
Class 15 | Encryption and Network Security Technology II | Functions of Common key/Public-key cryptography |
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.
Lecture materials are distributed from the OCW-i.
Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education Limited; 2013
Simon Haykin, Michael Moher, “Communication Systems”, Wiley, 2009.
Stefan M. Moser, Po-Ning Chen, “A Student's Guide to Coding and Information Theory”, Cambridge University Press
Evaluated by weekly examinations (exercises) and the final report
None