0% found this document useful (0 votes)
13 views4 pages

CS F303 Computer Networks II Sem 2024-25 2

The document is a course handout for CS F303 (Computer Networks) at BITS Pilani, Dubai Campus for the second semester of 2024-2025. It outlines the course objectives, topics to be covered, evaluation scheme, and attendance policies, emphasizing the design aspects of computer networks. The course aims to equip students with the skills to analyze, design, and maintain various network types and includes both theoretical and practical components.

Uploaded by

surtiaryan2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

CS F303 Computer Networks II Sem 2024-25 2

The document is a course handout for CS F303 (Computer Networks) at BITS Pilani, Dubai Campus for the second semester of 2024-2025. It outlines the course objectives, topics to be covered, evaluation scheme, and attendance policies, emphasizing the design aspects of computer networks. The course aims to equip students with the skills to analyze, design, and maintain various network types and includes both theoretical and practical components.

Uploaded by

surtiaryan2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

BITS PILANI, DUBAI CAMPUS

ACADEMIC – UNDERGRADUATE STUDIES DIVISION


SECOND SEMESTER 2024 - 2025

Course Handout (Part II)


Date: 03.02.2025
In addition to part-I (General Handout for all courses appended to the timetable) this portion gives
further specific details regarding the course.

Course No : CS F303 (314)


Course Title : Computer Networks
Instructor-in-charge : Prof. Raja Muthalagu
Instructors : Prof. Raja Muthalagu, Prof. Pranav M Pawar and
Prof. Mithun Mukherjee

Scope and objective of the course:


The course aims at providing a sound conceptual foundation in the area of Computer Networks with
emphasis on the design aspects. The course attempts to provide a balanced treatment of the state-
of-the-art in the area and thus prepares the students for taking more rigorous and specialized courses
in this and related fields. At the end of this course, students should be able to analyze, design,
troubleshoot and maintain commonly used network types apart from being able to begin Network-
oriented Software development.

Course Pre/Co- requisite (if any) & Catalogue / Bulletin Description: Given in the Bulletin
2024 – 25

Study Material:

Text book:
[T1]. Larry L. Peterson & Bruce S. Davie: Computer Networks: A Systems Approach, Fifth
Edition, Morgan Kaufmann / Elsevier, New Delhi, 2011
[T2] James F. Kurose & Keith W. Ross “Computer Networking: A Top-Down Approach Featuring
the Internet”,Sixth Edition,Pearson,2017.

Reference Book:
[R1]. Forouzan B A: Data Communications and Networking, McGraw Hill, 4th Edition, 2006.

Course plan:

Sl.No TOPIC CHAPTER Ref Lects.


.
1. Introduction: Uses of Computer Networks, Network Class notes 3
Hardware: The Network Edge, The Network Core,
Access Networks.
2. Physical Media: The theoretical basis for data T1 (1), T2(1) 3
communication (Fourier Analysis, Bandwidth Limited
Signals, Maximum Data Rate of a Channel)
3. ISPs and Internet Backbones, Delay and Loss in Packet T1 (1), T2(1) 4
Switched Networks, Network Software: Protocol
Hierarchies, and their Service Models.
4. Reference Models (OSI, TCP/IP) Class notes 3
5. Data Link Layer: Services, Error Detection and T2 (5), T1(2) 4
Correction Techniques (Parity Checks, Checksums,
CRC).
6. Multiple Access Protocol: TDM, ALOHA, Slotted Class notes 4
ALOHA, CSMA in Local Area Networks.
7. Link Layer Addressing: MAC Addresses, ARP, T2 (5), T1(2) 5
DHCP; Ethernet: Frame Structure, CSMA/CD.
Multiprotocol Label Switching (MPLS).
8. Interconnections: Hubs, and Switches. Class notes 3
9. Wireless Networks: Wireless Links and Network T2(6) 3
Characteristics, Wi-Fi: 802.11 Wireless LAN
Architecture and Protocol,
10. Network Layer: Virtual Circuits and Datagram Class notes 3
Networks, What is Inside a Router? Forwarding and
Addressing in the Internet.
11. Routing Algorithms: Shortest Path, Flooding, Link T2(4) 4
State Vector
12. Routing in the Internet: RIP, OSPF, Border Gateway T2(4) 4
Protocol
13. Mobile Networks: Mobility management, Mobile IP. T2 (6) 2
14. Transport Layer: Multiplexing, Demultiplexing, UDP, Class notes 3
Principles of Reliable Data Transfer
15. TCP: Segment structure, RTT Estimation and Timeout, T2 (3) 3
TCP Flow Control.
16. TCP Error Control, and Congestion Control. T2(3) 2
17. Socket Programming with TCP and with UDP. T2 (2) 2
18. Application Layer: Hypertext Transfer Protocol, HTTP T2 (2) 2
Message Format, Cookies, Conditional
GET,FTP,peer-peer applications
19. Simple Mail Transfer Protocol, Domain Name Systems T2 (2) 2
(DNS).
20. Network Security: Overview of network Cryptography Class notes 1
21. ML for Networking Class Notes If time
permits

Class notes also have to be referred for all the above topics
Total number of classes planned=60
The lectures may slightly diverge from aforesaid plan based on students ‘background & interest in
the topic, which may perhaps include special lectures and discussions that would be planned and
schedule notified accordingly.

Lab Practical: The following topics are covered in the lab.


Sessions
Sl# Topics (2 classes per Venue
week)
1 Introduction to different networking commands 1
Introducing basic router commands & Simulating a
2 router configuration (Static) using CISCO Packet 1 Room No.
Tracer 336
Simulation of Dynamic routing using CISCO Packet
3 1
Tracer
4 Simulation of Subnetting using CISCO Packet Tracer 1
5 Simulation of VLAN using CISCO Packet Tracer
1. Capture HTTP packet using Wireshark and analyses
layer wise header.
6 1
2. Using Wireshark explore the ARP and ICMP
protocols.
Develop a multithreaded TCP server and verify the same
7 1
using a telnet client and TCP client.
Develop a UDP server using java and verify using the
8 1
UDP client
Simulation of wired network topology using Network
9 1
Simulator-2
10 Simulation of LAN using Network Simulator-2 1
Simulation of Wireless Network using Network
11
Simulator-2
12 TCP Handshaking by using Raspberry-pi 1

Course Learning Outcomes (CLOs)

Upon successful completion of this course, students should be able to:


• CLO1 Understand the fundamental concepts of networking, layer network model,
standards, protocols and technologies.
• CLO2 Describe, analyze and evaluate a different datalink, network, and transport layer
protocols.
• CLO3 Identify the different computer network components (hardware and software) and
design the computer network as per the requirements.
• CLO4 Understand the working principals of different application layer protocols.
• CLO5 Illustrate applications of Computer Network capabilities, selection and usage for
various sectors of user community.

Evaluation Scheme (OB - Open Book, CB - Closed Book, TBA – To Be Announced):

OB/
Sl# Component Duration Weightage Date &Time
CB
1. Mid Semester Exam OB* 90 Minutes 30% 02.04.2025 AN
2. Mid Semester Lab Exam CB 60 Minutes 10% TBA
3. End Semester Lab Exam CB 90 Minutes 20% TBA
4. Comprehensive Exam CB 180 Minutes 40% 26.05.2025 AN
* Only prescribed text book(s), Reference book and hand-written notes are permitted

Mapping of CLOs, PLOs, and ECs (PLO-Program Learning Outcomes, Evaluation


Components):

Evaluation Components (ECs)


CLOs PLOs
EC1 EC2 EC3 EC4 EC5
CLO1 1,2 √ √ √
CLO2 2,3 √ √ √ √
CLO3 2,3,4,5 √ √ √
CLO4 2,3 √ √
CLO5 3,4,5,6,8 √ √

Mid-sem Grading:
Mid-sem grading will be displayed after three evaluation components or earlier whenever about 40
% of evaluation components are completed.

Note: A student will be likely to get “NC”, if he / she


● Doesn’t appear / appear for the sake of appearing for the evaluation components / scoring
zero in pre-compre total.
● Scoring zero in the lab component / Abstaining from lab classes throughout.

Makeup and Attendance policies:


Make-ups are not given as a routine. It is solely dependent upon the genuineness of the
circumstances under which a student fails to appear in a scheduled evaluation component. In such
circumstances, prior permission should be obtained from the Instructor-in-Charge (I/C).The
decision of the I/C in the above matter will be final.

Attendance: Every student is expected to be responsible for regularity of his/her attendance in class
rooms and laboratories, to appear in scheduled tests and examinations and fulfill all other tasks
assigned to him/her in every course. A student should have a minimum of 60% of attendance in a
course to be eligible to appear for the Comprehensive Examination in that course. For the students
under the purview of Academic Counseling Board (ACB), the Board shall prescribe the minimum
attendance requirement on a case-to-case basis. Attendance in the course will be a deciding factor
in judging the seriousness of a student which may be directly / indirectly related to grading.

General instructions:
Students should come prepared for classes and carry the text book(s) or material(s) as prescribed
by the Course Faculty to the class.

Notices: All notices concerning the course will be displayed on LMS. Optionally, if there is a need,
email to your BITS mail would be used on short notice and therefore you should activate your BITS
mail. All official communications will be sent to your BITS email only.

Course instructors contact information:


Chamber Chamber# &
Instructor Name Email Id
consultation hour contact Tel#
raja.m@dubai.bits- 233 ,042753700
Prof. Raja Muthalagu T9
pilani.ac.in Ext. – 325
pranav@dubai.bits- 238, 042753700
Prof. Pranav M Pawar T9
pilani.ac.in Ext. – 304
mithun@dubai.bits- 285, 042753700
Prof. Mithun Mukherjee T9
pilani.ac.in Ext.- 236

(Prof. Raja Muthalagu)

Instructor In-Charge
CS F303 (Computer Networks)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy