Branch: Computer science and Engineering
Author: Stephen W. Turner
University: University of Michigan-Flint
Dated: 2011
Text Books Required: Computer Networks, 5th Edition by Andrew S. Tanenbaum and
David J. Wetherall , Prentice Hall,
Description:
This course will develop an understanding of:
a. Layered network architecture models.
b. Network, Transport and Application layer protocols.
c. Wireless networking techniques.
d. Practical design, construction, and administration of computer networks.
e. The web as an example of client-server computing: client-side and server-side
programs/scripts, CGI, applets; characteristics of web servers; web protocols.
f. Network security: fundamentals, public- and secret-key algorithms,
authentication protocols, digital signatures.
g. Network management: security issues; domain names and name services;
security issues and firewalls; QoS
Download Slides here:
Notes from | Links |
---|---|
Sockets | Introduction 2-up per page |
Introduction 4-up per page | |
Chapter 1 | Introduction 2-up per page |
Introduction 4-up per page | |
Chapter 2 | The Physical Layer 2-up per page |
The Physical Layer 4-up per page | |
Chapter 3 | The Data Link Layer 2-up per page |
The Data Link Layer 4-up per page | |
Chapter 4 | The Medium Access Sublayer 2-up per page |
The Medium Access Sublayer 4-up per page | |
Chapter 5 | The Network Layer 2-up per page |
The Network Layer 4-up per page | |
Chapter 6 | The Transport Layer 2-up per page |
The Transport Layer 4-up per page | |
Chapter 7 | The Application Layer, 7.1 - 7.3 2-up per page |
The Application Layer, 7.1 - 7.3 4-up per page | |
The Application Layer, 7.4 - 7.5 2-up per page | |
The Application Layer, 7.4 - 7.5 4-up per page | |
The Application Layer, (all sections) 2-up per page | |
The Application Layer, (all sections) 4-up per page | |
Chapter 8 | Network Security 2-up per page |
Network Security 4-up per page |