Instructor: Dr. Ferdous Pervej
Email: ferdous.pervej@usu.edu
E-mail Turnaround Time: 24 Hours
Telephone: 435-797-9549 (office)
Office hours: TBA (at least 1 hour dedicated office hour and open-door policy; instructor has open-door policy)
Lecture time: 10:30 - 11:20 on Mondays, Wednesdays and Fridays
Lecture location: EL - 221
Andrew S. Tanenbaum, Nick Feamster, and David J. Wetherall, "Computer Networks," 6th edition, Pearson
Supplementary materials
James F. Kurose and AmherstKeith Ross, "Computer Networking A Top-Down Approach," 9th edition, Pearson
Behrouz A. Forouzan, "Data Communications and Networking," 5th Edition, McGraw Hill
ECE 3620 and MATH 5710 or STAT 3000
This is an introductory course to computer networks. The goal of this course is to familiarize our students with (a) different elements of modern computer networks, (b) different protocol stacks, (c) detailed study of each layer in the protocol stacks, and (d) practical implementation/investigations of different protocols using computer programming.
This is an introductory course in computer networking. The key objectives are
Study different networking components, topologies, and models
Learn different reference models and their protocols
Study different transmission techniques (e.g., wired vs wireless, modulation, multiplexing, etc.)
Learn different link/MAC layer concepts (e.g., framing, error detection/correction, ARQ, ALOHA, CSMA etc.)
Study different routing algorithms and network layer concept in the Internet
Learn transport layer protocols and congestion controls
Study different practical networks like different generations of wireless networks, 802.11 (WiFi), and Bluetooth
The course is structured based on seven broad categories
Part 1: Introduction to computer networks, protocols, and reference models
Part 2: Physical layer
Part 3: Link layer
Part 4: Network layer
Part 5: Transport layer
Part 6: Application layer
Part 7: Network security
We have total 29 lectures, which will tentatively be distributed as follows:
Part 1: Introduction to networks, protocols, and reference models - topics for discussions (tentative ∼ subject to change)
Definition of a computer network
Type of computer networks
Different types of computer networks
Network protocols and reference models
The OSI reference model
The TPC/IP reference model
Part 2: The Physical (PHY) Layer - topics for discussions (tentative ∼subject to change)
Transmission media
Challenges in wireless transmissions
Capacity of network
Modulation
Passband vs Baseband
Different modulation schemes
Constellation diagrams
Multiplexing
Different wired and wireless networks*
Part 3: The Link Layer - topics for discussions (tentative ∼ subject to change)
Link layer design - framing, error/flow control
Error detection
Forward error correction (FEC)
Automatic repeat request (ARQ)
MAC sub-layer:
Channel allocation
Contention-based multiple access protocols - Aloha, Slotted Aloha, CSMA, CSMA/CD
Wired examples - Ethernet
Wireless examples - WLAN, Bluetooth
Part 4: The Network Layer - topics for discussions (tentative ∼ subject to change)
Network layer design
Routing algorithms
Traffic management
IP addresses - IPv4, subnet, CIDR, NAT, IPv6
Different Internet control protocols - ICMP, ARP, DHCP
Internetworking
Network layer in Internet
OSPF, BGP
Part 5: The Transport Layer - topics for discussions (tentative ∼ subject to change)
Transport layer services and different elements
Congestion controls
Transport protocols
User datagram protocol (UDP)
Transmission control protocol (TCP) - timer management, congestion control
Evolution of transport layer functionality
QUICK - Quick UDP Internet Connection
Part 6: The Application Layer - topics for discussions (tentative ∼ subject to change)
Web and HTTP
Electronic mail, SMTP, IMAP
Domain name system
Video streaming and content delivery networks
Part 7: Network Seurity - topics for discussions (tentative ∼ subject to change)
Network security principles
Different attacks and firewalls
Public/private keys
Cryptography
Authentication protocols
Network vs data security
Grading Policy
The grade will be distributed according to the following weights:
Item | Weight
Homework (×6) | 25 %
Mini-projects (×3) | 25 %
Midterm Exam (in-class, closed-book, upto 4 cheat-sheets allowed) | 25 %
Final Exam (take home, open-notes/book) | 25 %
Late Submissions
Late submissions (homework and projects) will be accepted up to 1 week after the due date with a 30% penalty unless prior arrangements are made.
Grade Challenge Policy
Students who wish to challenge or request that their instructor/TA review their grades on any homework, project, or midterm exam must request within seven days from when the grade was posted. For the final exam, students must request within 24 hours of when the grade was posted.
Course Accessibility
In cooperation with the Disability Resource Center (DRC), reasonable accommodation will be provided for qualified students with disabilities. Please reach out to the instructor prior to the first class (or during the first week of class) to make arrangements. Alternate format print materials (large print, audio, diskette or Braille) will be available through the Disability Resource Center.
DRC Statement
USU welcomes students with disabilities. If you have, or suspect you may have, a physical, mental health, or learning disability that may require accommodations in this course, please contact the Disability Resource Center (DRC) as early in the semester as possible (University Inn #101, 435-797-2444, drc@usu.edu). All disability related accommodations must be approved by the DRC. Once approved, the DRC will coordinate with faculty to provide accommodations.
Classroom Behavior
Utah State University supports the principle of freedom of expression for both faculty and students. The University respects the rights of faculty to teach and students to learn. Maintenance of these rights requires classroom conditions that do not impede the learning process. Disruptive classroom behavior will not be tolerated. An individual engaging in such behavior may be subject to disciplinary action. Read Student Code Article V Section V-3 for more information.
Academic Integrity – “The Honor System”
Each student has the right and duty to pursue his or her academic experience free of dishonesty. To enhance the learning environment at Utah State University and to develop student academic integrity, each student agrees to the following Honor Pledge:
“I pledge, on my honor, to conduct myself with the foremost level of academic integrity.”
A student who lives by the Honor Pledge is a student who does more than not cheat, falsify, or plagiarize. A student who lives by the Honor Pledge:
Espouses academic integrity as an underlying and essential principle of the Utah State University community;
Understands that each act of academic dishonesty devalues every degree that is awarded by this institution; and
Is a welcomed and valued member of Utah State University.
Academic Dishonesty
The instructor of this course will take appropriate actions in response to Academic Dishonesty, as defined the University’s Student Code. Acts of academic dishonesty include but are not limited to:
Cheating: using, attempting to use, or providing others with any unauthorized assistance in taking quizzes, tests, examinations, or in any other academic exercise or activity. Unauthorized assistance includes:
Working in a group when the instructor has designated that the quiz, test, examination, or any other academic exercise or activity be done “individually;”
Depending on the aid of sources beyond those authorized by the instructor in writing papers, preparing reports, solving problems, or carrying out other assignments;
Substituting for another student, or permitting another student to substitute for oneself, in taking an examination or preparing academic work;
Acquiring tests or other academic material belonging to a faculty member, staff member, or another student without express permission;
Continuing to write after time has been called on a quiz, test, examination, or any other academic exercise or activity;
Submitting substantially the same work for credit in more than one class, except with prior approval of the instructor; or engaging in any form of research fraud.
Falsification: altering or fabricating any information or citation in an academic exercise or activity.
Plagiarism: representing, by paraphrase or direct quotation, the published or unpublished work of another person as one’s own in any academic exercise or activity without full and clear acknowledgment. It also includes using materials prepared by another person or by an agency engaged in the sale of term papers or other academic materials.
For additional information go to: ARTICLE VI. University Regulations Regarding Academic Integrity.