UNT | University of North Texas

Search form

CSCE 3530: Computer Networks

Course Number: 
CSCE 3530
Course Name: 
Computer Networks
Description: 

Introduction to data communications; asynchronous, synchronous, networks and current technology.

 

Last Review Date: 
Thursday, April 2, 2015
Prerequisite (should have grade of C or better): 
Credit Hours (Including Labs): 
3.00
UNT Topics: 
  1. Computer Networks and the Internet
    1. What is the internet?
      1. Nuts and bolts description
        1. Hosts
        2. End systems
        3. Communication links
        4. Packet switches
          1. Routers
          2. Link-layer switches
        5. Packet
        6. Route
        7. Transmission rate
        8. Internet Service Provider (ISP)
        9. Protocol
        10. TCP/IP
        11. RFCs
      2. Services description
        1. Distributed applications
        2. API
      3. Protocol definition
    2. Network edge
      1. LAN
        1. Ethernet
        2. Wi-Fi
      2. Access network
        1. DSL
        2. Cable
        3. FTTx
        4. Dial-up
        5. Satellite
        6. Cellular
      3. Physical media
        1. Guided
        2. Unguided
        3. Examples
          1. Twisted-Pair Copper Wire
          2. Coaxial
          3. Fiber
          4. Terrestrial radio
          5. Satellite radio
            1. Geostationary
            2. Low-earth orbiting
    3. Network core
      1. Packet switching
        1. Message
        2. Packet
        3. Packet switch
        4. Store-and-forward transmission
        5. Queueing delay
        6. Packet loss
        7. Forwarding table
        8. Routing protocol
      2. Circuit switching
        1. Circuit
        2. Frequency division multiplexing
        3. Time division multiplexing
      3. Network of networks
        1. Regional ISP
        2. Tier-1 ISP
        3. Point of Presence
        4. Multi-homing
        5. Internet eXchange Point
        6. Content Provider Network
    4. Delay, Loss, and Throughput in Packet-Switched Networks
      1. Types of delay
        1. Processing
        2. Queueing
        3. Transmission
        4. Propagation
      2. Queueing delay and packet loss
        1. Traffic intensity
        2. Dropped packets
      3. End to end delay
        1. Traceroute
        2. End system delay
        3. Application delay
        4. Other delays
      4. Throughput
        1. Types
          1. Instantaneous
          2. Average
        2. Bottleneck
    5. Protocol Layers
      1. Reasons for layering
      2. Protocol stack
      3. Internet model
      4. OSI model
      5. Encapsulation
    6. Networks Under Attack
      1. Malware
      2. Botnet
      3. Self-replicating
      4. Virus
      5. Worm
      6. Denial of service
      7. Packet sniffer
      8. Masquerading
    7. Change Management
    8. Bring Your Own Device
  2. Application layer
    1. Principles of network applications
      1. Network application architectures
        1. Client server
        2. P2P
      2. Processes communicating
        1. Processes
        2. Messages
        3. Socket
        4. IP address
        5. Port number
      3. Transport services
        1. Reliable data transfer
        2. Throughput guarantee
        3. Timing guarantee
        4. Security
      4. Transport services provided by the Internet
        1. TCP
        2. UDP
      5. Application layer protocols
    2. The Web and HTTP
      1. Overview of HTTP
        1. HTTP
        2. Web page
        3. URL
        4. Object
        5. HTML
        6. Web browser
        7. Web server
        8. Stateless protocol
      2. Non-persistent and persistent connections
      3. HTTP message format
        1. Request
        2. Header
        3. Body
      4. Cookies
      5. Caching
      6. Conditional GET
    3. FTP
      1. Control and data connections
      2. Commands and replies
    4. E-mail
      1. SMTP
      2. POP3
      3. IMAP
      4. Web-based E-mail
    5. DNS
      1. Hostname
      2. IP address
      3. Host aliasing
      4. Canonical hostname
      5. Mail server aliasing
      6. Load distribution
      7. Hierarchy of DNS servers
        1. Root
        2. TLD
        3. Authoritative
      8. Recursive and iterative queries
      9. Caching
      10. DNS records
      11. DNS messages
      12. DNS vulnerabilities
    6. P2P Applications
      1. File distribution
        1. Distribution time
        2. BitTorrent
      2. Distributed hash table
    7. Socket programming
      1. UDP
      2. TCP
  3. Transport Layer
    1. Logical communication
    2. Segment
    3. TCP
    4. UDP
    5. Multiplexing and demultiplexing
    6. Reliable and unreliable data transfer
    7. Congestion control
    8. Socket
    9. IP address
    10. Port number
    11. Packet formats of TCP and UDP
    12. Finite state machine
    13. Acknowledgements
    14. Error detection
    15. Retransmission
    16. Stop and wait
    17. Go-Back-N
    18. Selective Repeat
    19. MTU
    20. Three-way handshake
    21. Round-trip-time estimation
    22. Flow control
  4. Network Layer
    1. Forwarding
    2. Routing
    3. Forwarding table
    4. Connection setup
    5. Network service model
      1. Guaranteed delivery
      2. Guaranteed delivery with bounded delay
      3. In-order delivery
      4. Guaranteed minimum bandwidth
      5. Guaranteed maximum jitter
      6. Security
      7. Best-effort service
    6. Virtual circuit network
    7. Datagram network
    8. Router architecture
      1. Control plane
        1. Routing processor
      2. Data plane
        1. Ports
        2. Queues
        3. Switching fabric
    9. Packet scheduler
    10. Quality of Service
    11. IPv4 and v6 packet formats
    12. Fragmentation and reassembly
    13. IPv4 and v6 addresses
    14. Classful addressing
    15. Classless Inter Domain Routing (CIDR)
    16. Subnetting
    17. Network Address Translation
    18. Network interface
    19. DHCP
    20. UPnP
    21. ICMP
    22. Transitioning from IPv4 to IPv6
      1. Dual stack
      2. Tunneling
    23. IPSec
    24. Routing algorithms
      1. Source and destination routers
      2. Graph terms
        1. Graph
        2. Vertex
        3. Edge
        4. Path
        5. Neighbor
        6. Least-cost path
        7. Shortest path
      3. Types of routing algorithms
        1. Global
        2. Decentralized
        3. Static
        4. Dynamic
        5. Load-sensitive
        6. Load-insensitive
      4. Algorithm examples
        1. Link-state
        2. Distance-vector
        3. Distance-vector with poisoned reverse
      5. Hierarchical routing
        1. Autonomous system
        2. Intra-AS routing protocol
          1. RIP
          2. OSPF
        3. Inter-AS routing protocol
          1. BGP
        4. Gateway router
        5. Hot-potato routing
    25. Broadcast and multicast routing
      1. Broadcast routing algorithms
        1. N-way unicast
        2. Flooding
        3. Controlled flooding
          1. Sequence number controlled flooding
          2. Reverse path forwarding
        4. Spanning tree broadcast
      2. Multicast
        1. Multicast group
        2. IGMP
        3. Multicast routing
          1. Group shared tree
          2. Source-based tree
        4. Routing protocols
          1. Distance Vector Multicast Routing Protocol
          2. Protocol Independent Multicast
          3. Source-Specific Multicast
  5. Link Layer
    1. Node
    2. Link
    3. Link layer frame
    4. Link layer services
      1. Framing
      2. Link access
      3. Reliable delivery
      4. Error detection and correction
    5. Network adapter
    6. Bit-level error detection and correction techniques
      1. Parity bit
      2. Checksum
      3. CRC
    7. Point to point link
    8. Broadcast link
    9. Multiple access protocols
      1. Channel partitioning
        1. Time division
        2. Frequency division
        3. Code division
      2. Random access
        1. Slotted ALOHA
        2. Pure ALOHA
        3. CSMA
        4. CSMA/CD
      3. Taking turns
        1. Polling
        2. Token-passing
    10. DOCSIS
    11. MAC addresses
    12. ARP
    13. Reverse ARP
    14. Ethernet
    15. Hubs
    16. Link layer switches
      1. Forwarding
      2. Filtering
      3. Switch table
      4. Self-learning
    17. VLANs
    18. MPLS
    19. Data center network
      1. Top of Rack switch
      2. Border routers
      3. Data center network design
      4. Load balancing
      5. Hierarchy of routers and switches
      6. Trends
        1. Fully connected topology
        2. Modular data centers
    20. Network topologies
    21. Web requests from start to finish
    22. Network analysis
    23. Network troubleshooting
UNT Outcomes: 
  • Understand a conceptual view of the role of computers in communications.
  • Understand communication protocols in the Internet.
  • Be able to do fundamental network programming.
  • Understand different network architecture.
  • Recognize the role of application protocols.
  • Understand different routing and forwarding protocols.
Course Materials: 

Computer Networking: A Top-Down Approach Featuring the Internet, 6th edition, Kurose, Addison Wesley, ISBN 9780132856201

UNT Center: 
Center for Information and Cyber Security (CICS)
UNT Department: 
Computer Science and Engineering (CSE)
Course Level: 
Undergraduate
Course Documents: