SlideShare a Scribd company logo
A Course Outline About Computer Networks 
A COURSE OUTLINE ABOUT COMPUTER 
NETWORKS 
Muhammad Adil Raja 
Roaming Researchers, Inc. 
October 14, 2014
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
OUTLINE 
1 INTRODUCTION 
2 THE PHYSICAL LAYER 
3 THE DATA LINK LAYER 
4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
5 THE NETWORK LAYER 
6 THE TRANSPORT LAYER 
7 THE APPLICATION LAYER 
8 NETWORK SECURITY 
9 CONCLUSIONS
A Course Outline About Computer Networks 
Introduction 
INTRODUCTION I 
1 Uses Of Computer Networks. 
1 Business Applications. 
2 Home Applications. 
3 Mobile Users 
4 Social Issues 
2 Network Hardware 
1 Personal Area Networks. 
2 Local Area Networks. 
3 Metropolitan Area Networks. 
4 Wide Area Networks. 
5 Internetworks. 
3 Network Software. 
1 Protocol Hierarchies. 
2 Design Issues for the Layers. 
3 Connection-Oriented Versus Connectionless Service.
A Course Outline About Computer Networks 
Introduction 
INTRODUCTION II 
4 Service Primitives. 
5 The Relationship of Services to Protocols. 
4 Reference Models, 
1 The OSI Reference Model. 
2 The TCP/IP Reference Model. 
3 The Model Used in This Book. 
4 A Comparison of the OSI and TCP/IP Reference Models. 
5 A Critique of the OSI Model and Protocols. 
6 A Critique of the TCP/IP Reference Model. 
5 Example Networks. 
1 The Internet 
2 Third-Generation Mobile Phone Networks. 
3 Wireless LANs: 802.11. 
4 RFID and Sensor Networks. 
6 Network Standardization.
A Course Outline About Computer Networks 
Introduction 
INTRODUCTION III 
1 Who’s Who in the Telecommunications World. 
2 Who’s Who in the International Standards World. 
3 Who’s Who in the Internet Standards World. 
7 Metric Units.
A Course Outline About Computer Networks 
The Physical Layer 
THE PHYSICAL LAYER I 
1 The Theoretical Basis For Data Communication. 
1 Fourier Analysis. 
2 Bandwidth-Limited Signals. 
3 The Maximum Data Rate of a Channel. 
2 Guided Transmission Media. 
1 Magnetic Media. 
2 Twisted Pairs. 
3 Coaxial Cable. 
4 Power Lines. 
5 Fiber Optics. 
3 Wireless Transmission. 
1 The Electromagnetic Spectrum 
2 Radio Transmission. 
3 Microwave Transmission. 
4 Infrared Transmission.
A Course Outline About Computer Networks 
The Physical Layer 
THE PHYSICAL LAYER II 
5 Light Transmission. 
4 Communication Satellites. 
1 Geostationary Satellites. 
2 Medium-Earth Orbit Satellites. 
3 Low-Earth Orbit Satellites. 
4 Satellites Versus Fiber. 
5 Digital Modulation And Multiplexing. 
1 Baseband Transmission. 
2 Passband Transmission. 
3 Frequency Division Multiplexing. 
4 Time Division Multiplexing. 
5 Code Division Multiplexing. 
6 The Public Switched Telephone Network. 
1 Structure of the Telephone System. 
2 The Politics of Telephones.
A Course Outline About Computer Networks 
The Physical Layer 
THE PHYSICAL LAYER III 
3 The Local Loop: Modems. ADSL, and Fiber. 
4 Trunks and Multiplexing. 
5 Switching. 
7 The Mobile Telephone System. 
1 First-Generation (coco1G) Mobile Phones: Analog Voice. 
2 Second-Generation (2G) Mobile Phones: Digital Voice. 
3 Third-Generation (3G) Mobile Phones: Digital Voice and 
Data. 
8 Cable Television. 
1 Community Antenna Television. 
2 Internet over Cable. 
3 Spectrum Allocation. 
4 Cable Modems. 
5 Adsl Versus Cable.
A Course Outline About Computer Networks 
The Data Link Layer 
THE DATA LINK LAYER I 
1 Data Link Layer Design Issues. 
1 Services Provided to the Network Layer. 
2 Framing. 
3 Error Control. 
4 Flow Control 
2 Error Detection And Correction. 
1 Error-Correcting Codes. 
2 Error-Detecting Codes. 
3 Elementary Data Link Protocols. 
1 A Utopian Simplex Protocol. 
2 A Simplex Stop-and-Wait Protocol for an Error-Free 
Channel. 
3 A Simplex Stop-and-Wait Protocol for a Noisy Channel. 
4 Sliding Window Protocols. 
1 A One-Bit Sliding Window Protocol.
A Course Outline About Computer Networks 
The Data Link Layer 
THE DATA LINK LAYER II 
2 A Protocol Using Go-Back-N. 
3 A Protocol Using Selective Repeat. 
5 Example Data Link Protocols. 
1 Packet over SONET. 
2 ADSL (Asymmetric Digital Subscriber Loop).
A Course Outline About Computer Networks 
The Medium Access Layer Control Sublayer 
THE MEDIUM ACCESS LAYER CONTROL SUBLAYER I 
1 The Channel Allocation Problem. 
1 Static Channel Allocation. 
2 Assumptions for Dynamic Channel Allocation. 
2 Multiple Access Protocols. 
1 ALOHA. 
2 Carrier Sense Multiple Access Protocols. 
3 Collision-Free Protocols. 
4 Limited-Contention Protocols. 
5 Wireless LAN Protocols. 
3 Ethernet. 
1 Classic Ethernet Physical Layer. 
2 Classic Ethernet MAC Sublayer Protocol. 
3 Ethernet Performance. 
4 Switched Ethernet. 
5 Fast Ethernet.
A Course Outline About Computer Networks 
The Medium Access Layer Control Sublayer 
THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
II 
6 Gigabit Ethernet. 
7 10-Gigabit Ethernet. 
8 Retrospective on Ethernet. 
4 Wireless Lans. 
1 The 802.11 Architecture and Protocol Stack. 
2 The 802.11 Physical Layer. 
3 301 4.4.3 The 802.11 MAC Sublayer Protocol. 
4 The 802.11 Frame Structure. 
5 Services. 
5 Broadband Wireless. 
1 Comparison of 802.16 with 802.11 and 3G. 
2 The 802.16 Architecture and Protocol Stack. 
3 The 802.16 Physical Layer. 
4 The 802.16 MAC Sublayer Protocol.
A Course Outline About Computer Networks 
The Medium Access Layer Control Sublayer 
THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
III 
5 The 802.16 Frame Structure. 
6 Bluetooth. 
1 Bluetooth Architecture. 
2 Bluetooth Applications. 
3 The Bluetooth Protocol Stack, 
4 The Bluetooth Radio Layer. 
5 The Bluetooth Link Layers. 
6 The Bluetooth Frame Structure. 
7 RFID. 
1 EPC Gen 2 Architecture. 
2 EPC Gen 2 Physical Layer. 
3 EPC Gen 2 Tag Identification Layer. 
4 Tag Identification Message Formats. 
8 Data Link Layer Switching.
A Course Outline About Computer Networks 
The Medium Access Layer Control Sublayer 
THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 
IV 
1 Uses of Bridges. 
2 Learning Bridges. 
3 Spanning Tree Bridges. 
4 Repeaters, Hubs, Bridges, Switches, Routers, and 
Gateways. 
5 Virtual LANs.
A Course Outline About Computer Networks 
The Network Layer 
THE NETWORK LAYER I 
1 Network Layer Design Issues. 
1 Store-and-Forward Packet Switching. 
2 Services Provided to the Transport Layer. 
3 Implementation of Connectionless Service. 
4 Implementation of Connection-Oriented Service. 
5 Comparison of Virtual-Circuit and Datagram Networks. 
2 Routing Algorithms. 
1 The Optimality Principle. 
2 Shortest Path Algorithm. 
3 Flooding. 
4 Distance Vector Routing. 
5 Link State Routing. 
6 Hierarchical Routing. 
7 Broadcast Routing. 
8 Multicast Routing.
A Course Outline About Computer Networks 
The Network Layer 
THE NETWORK LAYER II 
9 Anycast Routing. 
10 Routing for Mobile Hosts. 
11 Routing in Ad Hoc Networks. 
3 Congestion Control Algorithms. 
1 Approaches to Congestion Control. 
2 Traffic-Aware Routing. 
3 Admission Control. 
4 Traffic Throttling. 
5 Load Shedding. 
4 Quality Of Service. 
1 Application Requirements. 
2 Traffic Shaping. 
3 Packet Scheduling. 
4 Admission Control. 
5 Integrated Services. 
6 Differentiated Services.
A Course Outline About Computer Networks 
The Network Layer 
THE NETWORK LAYER III 
5 Internetworking, 
1 How Networks Differ. 
2 How Networks Can Be Connected. 
3 Tunneling. 
4 Internetwork Routing. 
5 Packet Fragmentation. 
6 The Network Layer In The Internet. 
1 The IP Version 4 Protocol. 
2 IP Addresses. 
3 IP Version. 
4 Internet Control Protocols. 
5 Label Switching and MPLS. 
6 OSPFÑAn Interior Gateway Routing Protocol. 
7 BGPÑThe Exterior Gateway Routing Protocol. 
8 Internet Multicasting. 
9 Mobile IP.
A Course Outline About Computer Networks 
The Transport Layer 
THE TRANSPORT LAYER I 
1 The Transport Service. 
1 Services Provided to the Upper Layers. 
2 Transport Service Primitives. 
3 Berkeley Sockets. 
4 An Example of Socket Programming: An Internet File 
Server. 
2 Elements Of Transport Protocols. 
1 Addressing. 
2 Connection Establishment. 
3 Connection Release. 
4 Error Control and Flow Control. 
5 Multiplexing. 
6 Crash Recovery. 
3 Congestion Control 
1 Desirable Bandwidth Allocation.
A Course Outline About Computer Networks 
The Transport Layer 
THE TRANSPORT LAYER II 
2 Regulating the Sending Rate. 
3 Wireless Issues. 
4 The Internet Transport Protocols: Udp. 
1 Introduction to UDP. 
2 Remote Procedure Call. 
3 Real-Time Transport Protocols. 
5 The Internet Transport Protocols: Tcp. 
1 Introduction to TCP. 
2 The TCP Service Model. 
3 The TCP Protocol. 
4 The TCP Segment Header. 
5 TCP Connection Establishment. 
6 TCP Connection Release. 
7 TCP Connection Management Modeling. 
8 TCP Sliding Window. 
9 TCP Timer Management.
A Course Outline About Computer Networks 
The Transport Layer 
THE TRANSPORT LAYER III 
10 TCP Congestion Control. 
11 The Future of TCP. 
6 Performance Issues. 
1 Performance Problems in Computer Networks. 
2 Network Performance Measurement. 
3 Host Design for Fast Networks? 
4 Fast Segment Processing?? 
5 Header Compression 
6 Protocols for Long Fat Networks. 
7 Delay-Tolerant Networking 
1 DTN Architecture. 
2 The Bundle Protocol.
A Course Outline About Computer Networks 
The Application Layer 
THE APPLICATION LAYER I 
1 DNS – The Domain Name System. 
1 The DNS Name Space. 
2 Domain Resource Records. 
3 Name Servers. 
2 ELECTRONIC MAIL* 
1 Architecture and Services. 
2 The User Agent. 
3 Message Formats. 
4 Message Transfer. 
5 Final Delivery. 
3 The World Wide Web. 
1 Architectural Overview. 
2 Static Web Pages. 
3 Dynamic Web Pages and Web Applications. 
4 HTTP – The HyperText Transfer Protocol.
A Course Outline About Computer Networks 
The Application Layer 
THE APPLICATION LAYER II 
5 The Mobile Web. 
6 Web Search. 
4 Streaming Audio And Video. 
1 Digital Audio. 
2 Digital Video. 
3 Streaming Stored Media. 
4 Streaming Live Media. 
5 Real-Time Conferencing. 
5 Content Delivery. 
1 Content and Internet Traffic. 
2 Server Farms and Web Proxies. 
3 Content Delivery Networks. 
4 Peer-to-Peer Networks.
A Course Outline About Computer Networks 
Network Security 
NETWORK SECURITY I 
1 Cryptography. 
1 Introduction to Cryptography. 
2 Substitution Ciphers. 
3 Transposition Ciphers. 
4 One-Time Pads. 
5 Two Fundamental Cryptographic Principles. 
2 Symmetric-Key Algorithms 
1 DESÑThe Data Encryption Standard. 
2 AESÑThe Advanced Encryption Standard. 
3 Cipher Modes. 
4 Other Ciphers. 
5 Cryptanalysis. 
3 Public-Key Algorithms 
1 RSA. 
2 Other Public-Key Algorithms.
A Course Outline About Computer Networks 
Network Security 
NETWORK SECURITY II 
4 Digital Signatures. 
1 Symmetric-Key Signatures. 
2 Public-Key Signatures. 
3 Message Digests. 
4 The Birthday Attack. 
5 Management Of Public Keys. 
1 Certificates. 
2 X.509. 
3 Public Key Infrastructures. 
6 Communication Security. 
1 IPsec, 814. 
2 Firewalls. 
3 Virtual Private Networks. 
4 Wireless Security. 
7 Authentication Protocols.
A Course Outline About Computer Networks 
Network Security 
NETWORK SECURITY III 
1 Authentication Based on a Shared Secret Key. 
2 Establishing a Shared Key: The Diffie-Hellman Key 
Exchange. 
3 Authentication Using a Key Distribution Center. 
4 Authentication Using Kerberos. 
5 Authentication Using Public-Key Cryptography. 
8 Email Security. 
1 PGPÑPretty Good Privacy. 
2 S/MIME. 
9 Web Security. 
1 Threats. 
2 Secure Naming. 
3 SSLÑThe Secure Sockets Layer. 
4 Mobile Code Security. 
10 Social Issues
A Course Outline About Computer Networks 
Network Security 
NETWORK SECURITY IV 
1 Privacy. 
2 Freedom of Speech. 
3 Copyright.
A Course Outline About Computer Networks 
Conclusions 
CONCLUSIONS I 
1 Computer Networks – Andrew S. Tanenbaum – 5th Edition.

More Related Content

PDF
Introduction To Computer Networks
adil raja
 
PPTX
Computer networking
Abdul Rehman
 
PDF
Computer Networks Lecture Notes
FellowBuddy.com
 
PDF
Computer networks
Alvaro Gomes
 
PPTX
Introduction to computer networks
Haider Ali Malik
 
PPT
Introduction to Computer Networks
Ghaffar Khan
 
PPTX
Introduction to computer networks
Nicholas Riungu
 
PPTX
Introduction to computer networks
Basma Gamal
 
Introduction To Computer Networks
adil raja
 
Computer networking
Abdul Rehman
 
Computer Networks Lecture Notes
FellowBuddy.com
 
Computer networks
Alvaro Gomes
 
Introduction to computer networks
Haider Ali Malik
 
Introduction to Computer Networks
Ghaffar Khan
 
Introduction to computer networks
Nicholas Riungu
 
Introduction to computer networks
Basma Gamal
 

What's hot (20)

PPT
Concept of networking
sumit dimri
 
PPT
Computer network
Neha Gupta
 
PPT
Computer networks--network
Vinnu Vinod Kvk
 
PPTX
Computer Networking
Jitendra Kumar Sharma
 
PPT
Computer Networks basics and OSI
CS_GDRCST
 
PPTX
types of computer networks, protocols and standards
Midhun Menon
 
DOCX
Classnote1
MdAsaduzzaman163
 
PPT
Introduction of Computer Network
chouhanankit03
 
PPSX
Computer networks and its components by narender singh sandhu
NarenderSinghSandhu2
 
PPTX
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
PPTX
Basic Concepts of Computer Network
Sazzad Hossain
 
PPTX
computer networks presentation
Krishi Agrawal
 
PPT
Computer network
Mallikarjuna G D
 
PDF
Computer Networks Module I
Ajit Nayak
 
PPT
Networking Basics
Mohd. ShahNawab
 
PPT
Computer Network
Cma Mohd
 
PPT
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
PPTX
Computer network
kainat fatima
 
PPT
Networkingconcepts
vasanthimuniasamy
 
PPTX
Computer networking Components introduction
Ashutosh Kumaar
 
Concept of networking
sumit dimri
 
Computer network
Neha Gupta
 
Computer networks--network
Vinnu Vinod Kvk
 
Computer Networking
Jitendra Kumar Sharma
 
Computer Networks basics and OSI
CS_GDRCST
 
types of computer networks, protocols and standards
Midhun Menon
 
Classnote1
MdAsaduzzaman163
 
Introduction of Computer Network
chouhanankit03
 
Computer networks and its components by narender singh sandhu
NarenderSinghSandhu2
 
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
Basic Concepts of Computer Network
Sazzad Hossain
 
computer networks presentation
Krishi Agrawal
 
Computer network
Mallikarjuna G D
 
Computer Networks Module I
Ajit Nayak
 
Networking Basics
Mohd. ShahNawab
 
Computer Network
Cma Mohd
 
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
Computer network
kainat fatima
 
Networkingconcepts
vasanthimuniasamy
 
Computer networking Components introduction
Ashutosh Kumaar
 
Ad

Viewers also liked (10)

PPTX
introduction to computer: Lec 1 orientation
Protik Roy
 
PPTX
difference between hub, bridge, switch and router
Akmal Cikmat
 
PPS
Ms office (basic) 2016 session 01
Muhammad Umer Aleem
 
PPTX
Networking
Palash Sachan
 
PPTX
Introduction to microsoft word 2007
Abdul-rahaman Bin Abubakar Suleman
 
PPTX
Computer networking devices
Rajesh Sadhukha
 
PPT
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
PPTX
Introduction to computer network
Ashita Agrawal
 
PPTX
Microsoft word presentation
egirshovich
 
PPT
Microsoft word basics ppt
jdbutler13
 
introduction to computer: Lec 1 orientation
Protik Roy
 
difference between hub, bridge, switch and router
Akmal Cikmat
 
Ms office (basic) 2016 session 01
Muhammad Umer Aleem
 
Networking
Palash Sachan
 
Introduction to microsoft word 2007
Abdul-rahaman Bin Abubakar Suleman
 
Computer networking devices
Rajesh Sadhukha
 
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Introduction to computer network
Ashita Agrawal
 
Microsoft word presentation
egirshovich
 
Microsoft word basics ppt
jdbutler13
 
Ad

Similar to A Course Outline About Computer Networks (20)

PDF
Computer_Networks_Tanenbaum_5th_edition Text Book
Dhairya Joshi
 
PDF
Firouz Mosharraf, Behrouz A Forouzan - Computer Networks - A Top-Down Approac...
huuthido
 
PDF
Mạng máy tính.pdf
Tan Trinh Huynh
 
PDF
Andrew S. Tanenbaum, David J. Wetherall - Computer networks-Pearson Prentice ...
skmohiddin
 
PPTX
Computer network coe351- part1- final
Taymoor Nazmy
 
PDF
Computer Networks 6e Andrew S Tanenbaum Nick Feamster David Wetherall
crowealcoxag
 
PPT
B21DA0201_01.ppt
DrPreethiD1
 
PPTX
Orientation to Computer Networks
Mukesh Chinta
 
PPTX
Support
Shubham Tiwary
 
PPT
computer_networks_unit1_totalunitsnotes.ppt
VasundharaNam1
 
PPT
Week_1_Intro_Internet_arch_Applications.ppt
home107
 
PDF
CNS Nader F Mir.pdf VTU V SEM CNS Text Book 2018 Batch students
VENKATESHBHAT25
 
PPTX
Basic concept of networking
bappyiucse
 
PDF
CCNA project-report
Sagar Shashank
 
PPTX
Introduction to Networking.pptx
AlexGitahi
 
PDF
IP ADDRESSING AND SUBNETTING REPORT
Rajat Kumar
 
PPT
Advanced Computer Networks Lecture 1.ppt
farhan277819
 
PPTX
Data Structures unit I just look to learn the contents
ssuser80a5aa
 
PPTX
INT 338 Network-based Multimedia Lecture (1).pptx
AbdelhameedRabieaaKh
 
PPTX
Intoduction to Computer networking In Data Communication
shailajacse
 
Computer_Networks_Tanenbaum_5th_edition Text Book
Dhairya Joshi
 
Firouz Mosharraf, Behrouz A Forouzan - Computer Networks - A Top-Down Approac...
huuthido
 
Mạng máy tính.pdf
Tan Trinh Huynh
 
Andrew S. Tanenbaum, David J. Wetherall - Computer networks-Pearson Prentice ...
skmohiddin
 
Computer network coe351- part1- final
Taymoor Nazmy
 
Computer Networks 6e Andrew S Tanenbaum Nick Feamster David Wetherall
crowealcoxag
 
B21DA0201_01.ppt
DrPreethiD1
 
Orientation to Computer Networks
Mukesh Chinta
 
computer_networks_unit1_totalunitsnotes.ppt
VasundharaNam1
 
Week_1_Intro_Internet_arch_Applications.ppt
home107
 
CNS Nader F Mir.pdf VTU V SEM CNS Text Book 2018 Batch students
VENKATESHBHAT25
 
Basic concept of networking
bappyiucse
 
CCNA project-report
Sagar Shashank
 
Introduction to Networking.pptx
AlexGitahi
 
IP ADDRESSING AND SUBNETTING REPORT
Rajat Kumar
 
Advanced Computer Networks Lecture 1.ppt
farhan277819
 
Data Structures unit I just look to learn the contents
ssuser80a5aa
 
INT 338 Network-based Multimedia Lecture (1).pptx
AbdelhameedRabieaaKh
 
Intoduction to Computer networking In Data Communication
shailajacse
 

More from adil raja (20)

PDF
ANNs.pdf
adil raja
 
PDF
A Software Requirements Specification
adil raja
 
PDF
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
adil raja
 
PDF
DevOps Demystified
adil raja
 
PDF
On Research (And Development)
adil raja
 
PDF
Simulators as Drivers of Cutting Edge Research
adil raja
 
PDF
The Knock Knock Protocol
adil raja
 
PDF
File Transfer Through Sockets
adil raja
 
PDF
Remote Command Execution
adil raja
 
PDF
Thesis
adil raja
 
PDF
CMM Level 3 Assessment of Xavor Pakistan
adil raja
 
PDF
Data Warehousing
adil raja
 
PDF
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
PDF
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
PDF
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
adil raja
 
PDF
VoIP
adil raja
 
PDF
ULMAN GUI Specifications
adil raja
 
PDF
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 
PDF
ULMAN-GUI
adil raja
 
PDF
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 
ANNs.pdf
adil raja
 
A Software Requirements Specification
adil raja
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
adil raja
 
DevOps Demystified
adil raja
 
On Research (And Development)
adil raja
 
Simulators as Drivers of Cutting Edge Research
adil raja
 
The Knock Knock Protocol
adil raja
 
File Transfer Through Sockets
adil raja
 
Remote Command Execution
adil raja
 
Thesis
adil raja
 
CMM Level 3 Assessment of Xavor Pakistan
adil raja
 
Data Warehousing
adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
adil raja
 
VoIP
adil raja
 
ULMAN GUI Specifications
adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 
ULMAN-GUI
adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 

Recently uploaded (20)

PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Inventory management chapter in automation and robotics.
atisht0104
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
Zero Carbon Building Performance standard
BassemOsman1
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 

A Course Outline About Computer Networks

  • 1. A Course Outline About Computer Networks A COURSE OUTLINE ABOUT COMPUTER NETWORKS Muhammad Adil Raja Roaming Researchers, Inc. October 14, 2014
  • 2. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 3. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 4. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 5. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 6. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 7. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 8. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 9. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 10. A Course Outline About Computer Networks OUTLINE 1 INTRODUCTION 2 THE PHYSICAL LAYER 3 THE DATA LINK LAYER 4 THE MEDIUM ACCESS LAYER CONTROL SUBLAYER 5 THE NETWORK LAYER 6 THE TRANSPORT LAYER 7 THE APPLICATION LAYER 8 NETWORK SECURITY 9 CONCLUSIONS
  • 11. A Course Outline About Computer Networks Introduction INTRODUCTION I 1 Uses Of Computer Networks. 1 Business Applications. 2 Home Applications. 3 Mobile Users 4 Social Issues 2 Network Hardware 1 Personal Area Networks. 2 Local Area Networks. 3 Metropolitan Area Networks. 4 Wide Area Networks. 5 Internetworks. 3 Network Software. 1 Protocol Hierarchies. 2 Design Issues for the Layers. 3 Connection-Oriented Versus Connectionless Service.
  • 12. A Course Outline About Computer Networks Introduction INTRODUCTION II 4 Service Primitives. 5 The Relationship of Services to Protocols. 4 Reference Models, 1 The OSI Reference Model. 2 The TCP/IP Reference Model. 3 The Model Used in This Book. 4 A Comparison of the OSI and TCP/IP Reference Models. 5 A Critique of the OSI Model and Protocols. 6 A Critique of the TCP/IP Reference Model. 5 Example Networks. 1 The Internet 2 Third-Generation Mobile Phone Networks. 3 Wireless LANs: 802.11. 4 RFID and Sensor Networks. 6 Network Standardization.
  • 13. A Course Outline About Computer Networks Introduction INTRODUCTION III 1 Who’s Who in the Telecommunications World. 2 Who’s Who in the International Standards World. 3 Who’s Who in the Internet Standards World. 7 Metric Units.
  • 14. A Course Outline About Computer Networks The Physical Layer THE PHYSICAL LAYER I 1 The Theoretical Basis For Data Communication. 1 Fourier Analysis. 2 Bandwidth-Limited Signals. 3 The Maximum Data Rate of a Channel. 2 Guided Transmission Media. 1 Magnetic Media. 2 Twisted Pairs. 3 Coaxial Cable. 4 Power Lines. 5 Fiber Optics. 3 Wireless Transmission. 1 The Electromagnetic Spectrum 2 Radio Transmission. 3 Microwave Transmission. 4 Infrared Transmission.
  • 15. A Course Outline About Computer Networks The Physical Layer THE PHYSICAL LAYER II 5 Light Transmission. 4 Communication Satellites. 1 Geostationary Satellites. 2 Medium-Earth Orbit Satellites. 3 Low-Earth Orbit Satellites. 4 Satellites Versus Fiber. 5 Digital Modulation And Multiplexing. 1 Baseband Transmission. 2 Passband Transmission. 3 Frequency Division Multiplexing. 4 Time Division Multiplexing. 5 Code Division Multiplexing. 6 The Public Switched Telephone Network. 1 Structure of the Telephone System. 2 The Politics of Telephones.
  • 16. A Course Outline About Computer Networks The Physical Layer THE PHYSICAL LAYER III 3 The Local Loop: Modems. ADSL, and Fiber. 4 Trunks and Multiplexing. 5 Switching. 7 The Mobile Telephone System. 1 First-Generation (coco1G) Mobile Phones: Analog Voice. 2 Second-Generation (2G) Mobile Phones: Digital Voice. 3 Third-Generation (3G) Mobile Phones: Digital Voice and Data. 8 Cable Television. 1 Community Antenna Television. 2 Internet over Cable. 3 Spectrum Allocation. 4 Cable Modems. 5 Adsl Versus Cable.
  • 17. A Course Outline About Computer Networks The Data Link Layer THE DATA LINK LAYER I 1 Data Link Layer Design Issues. 1 Services Provided to the Network Layer. 2 Framing. 3 Error Control. 4 Flow Control 2 Error Detection And Correction. 1 Error-Correcting Codes. 2 Error-Detecting Codes. 3 Elementary Data Link Protocols. 1 A Utopian Simplex Protocol. 2 A Simplex Stop-and-Wait Protocol for an Error-Free Channel. 3 A Simplex Stop-and-Wait Protocol for a Noisy Channel. 4 Sliding Window Protocols. 1 A One-Bit Sliding Window Protocol.
  • 18. A Course Outline About Computer Networks The Data Link Layer THE DATA LINK LAYER II 2 A Protocol Using Go-Back-N. 3 A Protocol Using Selective Repeat. 5 Example Data Link Protocols. 1 Packet over SONET. 2 ADSL (Asymmetric Digital Subscriber Loop).
  • 19. A Course Outline About Computer Networks The Medium Access Layer Control Sublayer THE MEDIUM ACCESS LAYER CONTROL SUBLAYER I 1 The Channel Allocation Problem. 1 Static Channel Allocation. 2 Assumptions for Dynamic Channel Allocation. 2 Multiple Access Protocols. 1 ALOHA. 2 Carrier Sense Multiple Access Protocols. 3 Collision-Free Protocols. 4 Limited-Contention Protocols. 5 Wireless LAN Protocols. 3 Ethernet. 1 Classic Ethernet Physical Layer. 2 Classic Ethernet MAC Sublayer Protocol. 3 Ethernet Performance. 4 Switched Ethernet. 5 Fast Ethernet.
  • 20. A Course Outline About Computer Networks The Medium Access Layer Control Sublayer THE MEDIUM ACCESS LAYER CONTROL SUBLAYER II 6 Gigabit Ethernet. 7 10-Gigabit Ethernet. 8 Retrospective on Ethernet. 4 Wireless Lans. 1 The 802.11 Architecture and Protocol Stack. 2 The 802.11 Physical Layer. 3 301 4.4.3 The 802.11 MAC Sublayer Protocol. 4 The 802.11 Frame Structure. 5 Services. 5 Broadband Wireless. 1 Comparison of 802.16 with 802.11 and 3G. 2 The 802.16 Architecture and Protocol Stack. 3 The 802.16 Physical Layer. 4 The 802.16 MAC Sublayer Protocol.
  • 21. A Course Outline About Computer Networks The Medium Access Layer Control Sublayer THE MEDIUM ACCESS LAYER CONTROL SUBLAYER III 5 The 802.16 Frame Structure. 6 Bluetooth. 1 Bluetooth Architecture. 2 Bluetooth Applications. 3 The Bluetooth Protocol Stack, 4 The Bluetooth Radio Layer. 5 The Bluetooth Link Layers. 6 The Bluetooth Frame Structure. 7 RFID. 1 EPC Gen 2 Architecture. 2 EPC Gen 2 Physical Layer. 3 EPC Gen 2 Tag Identification Layer. 4 Tag Identification Message Formats. 8 Data Link Layer Switching.
  • 22. A Course Outline About Computer Networks The Medium Access Layer Control Sublayer THE MEDIUM ACCESS LAYER CONTROL SUBLAYER IV 1 Uses of Bridges. 2 Learning Bridges. 3 Spanning Tree Bridges. 4 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways. 5 Virtual LANs.
  • 23. A Course Outline About Computer Networks The Network Layer THE NETWORK LAYER I 1 Network Layer Design Issues. 1 Store-and-Forward Packet Switching. 2 Services Provided to the Transport Layer. 3 Implementation of Connectionless Service. 4 Implementation of Connection-Oriented Service. 5 Comparison of Virtual-Circuit and Datagram Networks. 2 Routing Algorithms. 1 The Optimality Principle. 2 Shortest Path Algorithm. 3 Flooding. 4 Distance Vector Routing. 5 Link State Routing. 6 Hierarchical Routing. 7 Broadcast Routing. 8 Multicast Routing.
  • 24. A Course Outline About Computer Networks The Network Layer THE NETWORK LAYER II 9 Anycast Routing. 10 Routing for Mobile Hosts. 11 Routing in Ad Hoc Networks. 3 Congestion Control Algorithms. 1 Approaches to Congestion Control. 2 Traffic-Aware Routing. 3 Admission Control. 4 Traffic Throttling. 5 Load Shedding. 4 Quality Of Service. 1 Application Requirements. 2 Traffic Shaping. 3 Packet Scheduling. 4 Admission Control. 5 Integrated Services. 6 Differentiated Services.
  • 25. A Course Outline About Computer Networks The Network Layer THE NETWORK LAYER III 5 Internetworking, 1 How Networks Differ. 2 How Networks Can Be Connected. 3 Tunneling. 4 Internetwork Routing. 5 Packet Fragmentation. 6 The Network Layer In The Internet. 1 The IP Version 4 Protocol. 2 IP Addresses. 3 IP Version. 4 Internet Control Protocols. 5 Label Switching and MPLS. 6 OSPFÑAn Interior Gateway Routing Protocol. 7 BGPÑThe Exterior Gateway Routing Protocol. 8 Internet Multicasting. 9 Mobile IP.
  • 26. A Course Outline About Computer Networks The Transport Layer THE TRANSPORT LAYER I 1 The Transport Service. 1 Services Provided to the Upper Layers. 2 Transport Service Primitives. 3 Berkeley Sockets. 4 An Example of Socket Programming: An Internet File Server. 2 Elements Of Transport Protocols. 1 Addressing. 2 Connection Establishment. 3 Connection Release. 4 Error Control and Flow Control. 5 Multiplexing. 6 Crash Recovery. 3 Congestion Control 1 Desirable Bandwidth Allocation.
  • 27. A Course Outline About Computer Networks The Transport Layer THE TRANSPORT LAYER II 2 Regulating the Sending Rate. 3 Wireless Issues. 4 The Internet Transport Protocols: Udp. 1 Introduction to UDP. 2 Remote Procedure Call. 3 Real-Time Transport Protocols. 5 The Internet Transport Protocols: Tcp. 1 Introduction to TCP. 2 The TCP Service Model. 3 The TCP Protocol. 4 The TCP Segment Header. 5 TCP Connection Establishment. 6 TCP Connection Release. 7 TCP Connection Management Modeling. 8 TCP Sliding Window. 9 TCP Timer Management.
  • 28. A Course Outline About Computer Networks The Transport Layer THE TRANSPORT LAYER III 10 TCP Congestion Control. 11 The Future of TCP. 6 Performance Issues. 1 Performance Problems in Computer Networks. 2 Network Performance Measurement. 3 Host Design for Fast Networks? 4 Fast Segment Processing?? 5 Header Compression 6 Protocols for Long Fat Networks. 7 Delay-Tolerant Networking 1 DTN Architecture. 2 The Bundle Protocol.
  • 29. A Course Outline About Computer Networks The Application Layer THE APPLICATION LAYER I 1 DNS – The Domain Name System. 1 The DNS Name Space. 2 Domain Resource Records. 3 Name Servers. 2 ELECTRONIC MAIL* 1 Architecture and Services. 2 The User Agent. 3 Message Formats. 4 Message Transfer. 5 Final Delivery. 3 The World Wide Web. 1 Architectural Overview. 2 Static Web Pages. 3 Dynamic Web Pages and Web Applications. 4 HTTP – The HyperText Transfer Protocol.
  • 30. A Course Outline About Computer Networks The Application Layer THE APPLICATION LAYER II 5 The Mobile Web. 6 Web Search. 4 Streaming Audio And Video. 1 Digital Audio. 2 Digital Video. 3 Streaming Stored Media. 4 Streaming Live Media. 5 Real-Time Conferencing. 5 Content Delivery. 1 Content and Internet Traffic. 2 Server Farms and Web Proxies. 3 Content Delivery Networks. 4 Peer-to-Peer Networks.
  • 31. A Course Outline About Computer Networks Network Security NETWORK SECURITY I 1 Cryptography. 1 Introduction to Cryptography. 2 Substitution Ciphers. 3 Transposition Ciphers. 4 One-Time Pads. 5 Two Fundamental Cryptographic Principles. 2 Symmetric-Key Algorithms 1 DESÑThe Data Encryption Standard. 2 AESÑThe Advanced Encryption Standard. 3 Cipher Modes. 4 Other Ciphers. 5 Cryptanalysis. 3 Public-Key Algorithms 1 RSA. 2 Other Public-Key Algorithms.
  • 32. A Course Outline About Computer Networks Network Security NETWORK SECURITY II 4 Digital Signatures. 1 Symmetric-Key Signatures. 2 Public-Key Signatures. 3 Message Digests. 4 The Birthday Attack. 5 Management Of Public Keys. 1 Certificates. 2 X.509. 3 Public Key Infrastructures. 6 Communication Security. 1 IPsec, 814. 2 Firewalls. 3 Virtual Private Networks. 4 Wireless Security. 7 Authentication Protocols.
  • 33. A Course Outline About Computer Networks Network Security NETWORK SECURITY III 1 Authentication Based on a Shared Secret Key. 2 Establishing a Shared Key: The Diffie-Hellman Key Exchange. 3 Authentication Using a Key Distribution Center. 4 Authentication Using Kerberos. 5 Authentication Using Public-Key Cryptography. 8 Email Security. 1 PGPÑPretty Good Privacy. 2 S/MIME. 9 Web Security. 1 Threats. 2 Secure Naming. 3 SSLÑThe Secure Sockets Layer. 4 Mobile Code Security. 10 Social Issues
  • 34. A Course Outline About Computer Networks Network Security NETWORK SECURITY IV 1 Privacy. 2 Freedom of Speech. 3 Copyright.
  • 35. A Course Outline About Computer Networks Conclusions CONCLUSIONS I 1 Computer Networks – Andrew S. Tanenbaum – 5th Edition.