Sie sind auf Seite 1von 6

Lovely Professional University,Punjab

Format For Instruction Plan [for Courses with Lectures and Labs

Course No CAP510

Cours Title COMPUTER NETWORKS

Course Planner 13648 :: Jasleen

Lectures Tutorial Practical Credits 4 0 0 4

Text Book:

1 Behrouz A. Forouzan, Data Communication and networking, 4th Ed., Tata McGraw Hills year of publication 2006

Other Specific Book:

A.S. Tanenbaum, Computer Networks ,Publishers: Pearson Education, Delhi, Year of Publication: 2009

3 Comer E. Doughlas, Computer Networks and Internets, 4th Ed., Pearson, 2006 4 W. Stallings, Data and Computer Communications, 8th Ed., Pearson, 2006 5 Data Communication and Computer Networks ISRD Group Tata McGraw Hill Year of Publication 2006 6 TCP/IP: Architecture, Protocols, and Implementation with IPv6 and IP Security By Sidnie Feit McGraw Hill Year of Publication 2008

Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) 7 http://www.elsevier.com/wps/find/journalspecialissues.cws_home/505606/specialissues 8 http://www.elsevier.com/locate/jnca 9 http://www.computernetworking.suite101.com/articles.cfm Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 10 http://authors.phptr.com/tanenbaumcn4/ 11 http://williamstallings.com/DCC6e.html 1 Salient Features Website on reference book Website on reference book Approved for Autumn Session 2011-12

12 http://www.mhhe.com/forouzan/dcn4sie 13 http://en.wikipedia.org/wiki/Computer_network

website on text book Provides information on basic concepts of networking

14 http://compnetworking.about.com/od/basicnetworkingconcepts Networking Basics - Key Concepts in Computer Networking /Networking_Basics_Key_Concepts_in_Computer_Networking .htm 15 http://www.cisco.com/web/learning/netacad/course_catalog/P Tools required to understand the course: Boson Netsim / Packet Tracer acketTracer.html

Detailed Plan For Lectures


Week Number Lecture Number Lecture Topic Chapters/Sections of Pedagogical tool Textbook/other Demonstration/case reference study/images/anmatio n ctc. planned

Part 1
Week 1 Lecture 1 Lecture 2 Lecture 3 Lecture 4 Week 2 Lecture 5 Lecture 6 Lecture 7 Lecture 8 Week 3 Lecture 9 Lecture 10 Lecture 11 Introduction to data communication Categories of computer Networks Network topology, and network software Network models, Protocols and Standards Layered Tasks , the OSI model The TCP / IP Model Addressing Analog & Digital signals BW, Bit Interval & Bit Rate, Transmission Impairments & Performance. Digital & Analog Transmission ->Reference :1,Chapter 4 -5 ->Reference :1,Chapter 3 ->Reference :1,Chapter 3 ->Reference :1,Chapter 2 ->Reference :1,Chapter1 1.1 ->Reference :1,Chapter1 CA/REGULAR/CAP510/ LECTURE 1 CA/REGULAR/CAP510/ LECTURE 2 CA/REGULAR/CAP510/ LECTURE 3 CA/REGULAR/CAP510/ LECTURE 4 CA/REGULAR/CAP510/ LECTURE 5 CA/REGULAR/CAP510/ LECTURE 6 CA/REGULAR/CAP510/ LECTURE 7 CA/REGULAR/CAP510/ LECTURE 8 CA/REGULAR/CAP510/ LECTURE 9 CA/REGULAR/CAP510/ LECTURE 10 CA/REGULAR/CAP510/ LECTURE 11

Approved for Autumn Session 2011-12

Week 3 Week 4

Lecture 12 Lecture 13

ASK, PSK FSK, QAM ,

->Reference :1,Chapter 5 ->Reference :1,Chapter 5

CA/REGULAR/CAP510/ LECTURE 12 CA/REGULAR/CAP510/ LECTURE 13

Part 2
Week 4 Lecture 14 Lecture 15 Lecture 16 Week 5 Lecture 17 Lecture 18 Lecture 19 Lecture 20 Week 6 Lecture 21 Lecture 22 Lecture 23 Lecture 24 Week 7 Lecture 25 Lecture 26 Lecture 27 Lecture 28 AM, FM, PM Multiplexing: FDM WDM,TDM Guided Transmission Media, Guided Transmission Media, Un Guided Transmission Media, Circuit Switched Network Packet Switched Network Telephone Network and Modems DSL Data Link Layer design Issue Error detection and correction Cyclic Codes Checksum Introduction to HUB, Router Switch, Bridge and Gateway Introduction to HUB, Router Switch, Bridge and Gateway ->Reference :1,Chapter 15 ->Reference :1,Chapter 9 ->Reference :1,Chapter 10 ->Reference :1,Chapter 10 ->Reference :1,Chapter 8 ->Reference :1,Chapter 8 ->Reference :1,Chapter 7 ->Reference :1,Chapter 5 ->Reference :1,Chapter 6 CA/REGULAR/CAP510/ LECTURE 14 CA/REGULAR/CAP510/ LECTURE 15 CA/REGULAR/CAP510/ LECTURE 16 CA/REGULAR/CAP510/ LECTURE 17 CA/REGULAR/CAP510/ LECTURE 18 CA/REGULAR/CAP510/ LECTURE 19 CA/REGULAR/CAP510/ LECTURE 20 CA/REGULAR/CAP510/ LECTURE 21 CA/REGULAR/CAP510/ LECTURE 22 CA/REGULAR/CAP510/ LECTURE 23 CA/REGULAR/CAP510/ LECTURE 24 CA/REGULAR/CAP510/ LECTURE 25 CA/REGULAR/CAP510/ LECTURE 26 CA/REGULAR/CAP510/ LECTURE 27 CA/REGULAR/CAP510/ LECTURE 28

Approved for Autumn Session 2011-12

MID-TERM Part 3
Week 8 Lecture 29 Lecture 30 Lecture 31 Lecture 32 Week 9 Lecture 33 Lecture 34 Lecture 35 Lecture 36 Week 10 Lecture 37 Framing Flow and error control Noiseless Channel Noisy Channel HDLC PPP ALOHA CSMA / CD IEEE Standards ->Reference :1,Chapter 13 ->Reference :1,Chapter 12 ->Reference :1,Chapter 11 ->Reference :1,Chapter 11 CA/REGULAR/CAP510/ LECTURE 29 CA/REGULAR/CAP510/ LECTURE 30 CA/REGULAR/CAP510/ LECTURE 31 CA/REGULAR/CAP510/ LECTURE 32 CA/REGULAR/CAP510/ LECTURE 33 CA/REGULAR/CAP510/ LECTURE 34 CA/REGULAR/CAP510/ LECTURE 35 CA/REGULAR/CAP510/ LECTURE 36 CA/REGULAR/CAP510/ LECTURE 37

Part 4
Week 10 Lecture 38 Lecture 39 Lecture 40 Week 11 Lecture 41 Lecture 42 Lecture 43 Lecture 44 Week 12 Lecture 45 Wireless LANs 802.11 Blue Tooth Network Layer IPV4 ARP IP ICMP Distance vector routing UDP and TCP Congestion Control and Quality of Service Leaky Bucket ->Reference :1,Chapter 19 ->Reference :1,Chapter 21 ->Reference :1,Chapter 22 ->Reference :1,Chapter 23 ->Reference :1,Chapter 24 ->Reference :1,Chapter 24 ->Reference :1,Chapter 14 CA/REGULAR/CAP510/ LECTURE 38 CA/REGULAR/CAP510/ LECTURE 39 CA/REGULAR/CAP510/ LECTURE 40 CA/REGULAR/CAP510/ LECTURE 41 CA/REGULAR/CAP510/ LECTURE 42 CA/REGULAR/CAP510/ LECTURE 43 CA/REGULAR/CAP510/ LECTURE 44 CA/REGULAR/CAP510/ LECTURE 45

Approved for Autumn Session 2011-12

Week 12

Lecture 46 Lecture 47 Lecture 48

Cryptography introduction DES algorithms,RSA algorithms Firewalls

->Reference :1,Chapter 30

CA/REGULAR/CAP510/ LECTURE 46 CA/REGULAR/CAP510/ LECTURE 47

->Reference :1,Chapter 32

CA/REGULAR/CAP510/ LECTURE 48

Spill Over
Week 13 Lecture 49 Lecture 50 Email architecture Audio and Video digitization ->Reference :1,Chapter 26 ->Reference :1,Chapter 29 CA/REGULAR/CAP510/ LECTURE 49 CA/REGULAR/CAP510/ LECTURE 50

Scheme for CA:out of 100*


Component Term Paper,Test Frequency 2 Total :Out Of 3 Each Marks Total Marks 10 10 20 20

* In ENG courses wherever the total exceeds 100, consider x best out of y components of CA, as explained in teacher's guide available on the UMS List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper) Sr. No. Topic 1 Security Considerations in Mobile computing

2 Information security management in Organizations 3 Physical security of information system 4 Cryptography and Encryption 5 Biometric based security : Issues and Challenges 6 Firewalls for Network Protection 5 Approved for Autumn Session 2011-12

7 Virtual Private networks for security 8 Security Considerations in Wireless computing 9 Security of Databases 10 Security of email systems 11 Threats to Information System 12 Distributed Network security 13 Wireless Application Protocol 14 Hacking 15 Phishing 16 GSM 17 Ethernet LANs 18 Wi Fi Setup

Approved for Autumn Session 2011-12