Course Objectives: This course provides a comprehensive overview of computer networks. Topics include network architectures, communication protocols; data link control, medium access control, LANS and MANS; network layer and TCP/IP.
Textbook: Computer Networks, by Andrew S. Tanenbaum, Prentice Hall, 2003, 4th Edition.
中文版: 電腦網路, 邵喻美, 潘育群 譯, 東華書局.
Reference Books: Computer Networking: A Top-Down Approach Featuring the Internet, by James F. Kurose and Keith W. Ross, Addison-Wesley, 2004, 3rd Edition,
Week |
Topics |
章節 |
1
|
Lecture 1 - Users of computer networks; Network hardware; Network software; Lecture 2 - Reference models; Example Networks; Network Standardization |
1.1-1.6 |
2
|
Lecture 3 - The theoretical basis for data comm.; Guided transmission media; Wireless transmission; Communication satellites;
|
2.1-2.4 |
3
|
Lecture 4
- The public switched telephone network; The mobile telephone system;
Cable television Lecture 5 - Data link layer design issues; Error detection and correction; |
2.5-2.7
3.1-3.2 |
4
|
Lecture 6 - Elementary data link protocols; sliding window protocols Lecture 7 - Protocol verification; Example data link protocols; |
3.3-3.6
|
5
|
Lecture 8 - The channel allocation problem; Multiple access protocols; Lecture 9 - Ethernet; Wireless LANs; Broadband wireless; |
4.1-4.4 |
6
|
Lecture 10 - Bluetooth; Data link layer switching
|
4.5-4.7
|
7 |
Lecture 11 - Network layer design issues; routing algorithm; |
5.1-5.2
|
8
|
Lecture 12 - Congestion control algorithms; Quality of service; Lecture 13 - Internetworking; The network layer in the internet (1st part) |
5.3-5.5
|
9
|
Lecture 14 - The network layer in the internet (2nd part); Lecture 15 - The transport service; Elements of transport protocols; |
5.6 6.1-6.2 |
10
|
Lecture 16 - The Internet transport protocols: UDP and TCP (1st part) Lecture 17 - TCP (2nd part) |
6.4-6.5 |
11
|
Lecture 18 - Performance issues; |
6.6
|
12
|
Lecture 19 - DNS; Electronic mail Lecture 20 - The World Wide Web; |
7.1-7.3 |
13
|
Lecture 21 - Multimedia Lecture 22 - Cryptography |
7.4 8.1-8.2 |
14
|
Lecture 23 - Symmetric-key algorithm; Public-key algorithm; Digital signatures; Lecture 24 - Message digest; Management of public keys; Communication security |
8.3-8.6 |
15
|
Lecture 25 - Authentication protocols; E-mail security; Lecture 26 - Web security; Social issues |
8.7-8.10 |
16
|