0% found this document useful (0 votes)
64 views6 pages

CSC 812 Course Outline (2025)

The document outlines the curriculum for CSC 812: Data Communication and Networks, covering topics such as network history, topologies, the ISO reference model, and various layers of networking including transport and application layers. It also discusses internetworking, error handling, and cybersecurity measures in data networks. Key concepts include TCP/IP protocols, routing algorithms, and performance analysis through queueing theory.

Uploaded by

aliynumbers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views6 pages

CSC 812 Course Outline (2025)

The document outlines the curriculum for CSC 812: Data Communication and Networks, covering topics such as network history, topologies, the ISO reference model, and various layers of networking including transport and application layers. It also discusses internetworking, error handling, and cybersecurity measures in data networks. Key concepts include TCP/IP protocols, routing algorithms, and performance analysis through queueing theory.

Uploaded by

aliynumbers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

CSC 812: Data Communication and

Networks (3 Credit Units)

Introduction: History and development of computer network, network


topologies, ISO reference model, Physical layer, MAC layer, Network
layer,

Internetworking: Bridges, Switches, Repeaters and Routers,

Transport Layer: Connection Management, Flow control and buffering,

Application Layer: DNS, SNMP, MAIL, WWW, and FTP, Use of TCP/IP
Protocol Suite as running example.

Channels and channel capacity; introduction to information theory;

sharing network resources: telecommunication history; circuit


switching and packet switching; multiplexing; FDM, TDM, statistical
multiplexing; virtual circuits and datagrams; advantages and
disadvantages;

sharing the medium: Aloha, CSMA (persistent and non-persistent),


CSMA-CD, token passing, CDMA, wireless LANs and simple
performance analysis;

dealing with errors: errors, coding and redundancy; hamming theory


and codes; CRCs, ARQ protocols; CR selective retransmission and flow
control;

internetworking and the internet: ISPs, datagram forwarding; the DNS;


IPv4; addressing and forwarding; encapsulation and address resolution;
TCP and UDP; ports and congestion controls; example applications;

modelling data networks: services and protocols; layered architectures;


the OSI 7-layer model; introduction to queue theory; physical media;
LANs and bridging; WANs and point-to-point links; routing; addressing
and routing in the internet; end-to-end communication in the internet;
and application protocols.
Cyber space technology: Cyber Crime, Cyber Security and models of
Cyber Solution.
1. Introduction to Computer Networks
Historical Development:
• Evolution from ARPANET to the modern internet, emphasizing
milestones in circuit switching, packet switching, and protocol
standardization
.Network Topologies:
Star, Bus, Ring, Mesh: Advantages (e.g., fault tolerance in mesh)
and limitations (e.g., single-point failure in star)
• .

2. Network Architectures and Models


ISO-OSI Reference Model:
• Traditional 7-layer model vs. simplified 5-layer version
:
Layer Function
Physical Bit transmission via
electrical/optical signals
.
Data Link (MAC) Media access control (e.g.,
CSMA/CD), framing, and error
detection
.
Network Logical addressing (IP) and
routing
.
Transport End-to-end communication
(TCP/UDP)
.
Application Protocols like DNS, FTP, and
HTTP
SNMP, MAIL, WWW


TCP/IP Protocol Suite:
• Acts as the practical implementation of OSI, with layers: Network
(IP), Transport (TCP/UDP), and Application (HTTP)
• .

3. Physical Layer
Key Functions
:
• Bit Representation: Analog/digital signal conversion.
• Synchronization: Clocking mechanisms for coherent data
transmission.
• Transmission Modes: Simplex, half-duplex, and full-duplex.
• Modulation: Techniques like PCM and delta modulation
• .
Channel Capacity:
• Shannon’s theorem: C=B log2(1+SNR), where B = bandwidth
• .

4. MAC Layer and Medium Access


MAC Protocols
:
• Contention-Based:
• ALOHA: Pure and slotted variants.
• CSMA/CD: Used in Ethernet for collision detection
• .
Controlled Access: Token passing (e.g., Token Ring).
Wireless LANs: IEEE 802.11 (Wi-Fi) and MACA protocol for collision
avoidance
• .
Performance Analysis:
• Throughput calculations for CSMA/CD under varying load
conditions
• .

5. Network Layer and Internetworking


Routing Algorithms:
• Shortest path, distance vector (RIP), and link-state (OSPF)
.Internetworking Devices:
Bridges/Switches: MAC address-based forwarding.
Routers: IP-based path determination
.IPv4/IPv6:
Addressing, fragmentation, and encapsulation
• .
6. Transport Layer
TCP vs. UDP:
• TCP: Connection-oriented, error recovery (ARQ), flow control
(sliding window)
.
UDP: Connectionless, low overhead
.Congestion Control:
Mechanisms like AIMD (Additive Increase Multiplicative Decrease)
• .

7. Application Layer Protocols


• DNS: Domain name to IP resolution.
• SNMP: Network monitoring and management.
• FTP/HTTP: File and hypertext transfer
• .

8. Error Handling and Data Integrity


• Error Detection: CRC, checksums.
• Forward Error Correction: Hamming codes
.
ARQ Protocols: Selective repeat and Go-Back-N
• .

9. Internetworking and the Modern Internet


• ISPs and Peering: Role in global connectivity.
• Encapsulation: OSI layer interactions (e.g., IP over Ethernet)
• .

10. Network Modeling and Performance


Queueing Theory:
• M/M/1 model for analyzing packet delay and congestion
.LANs/WANs:
Ethernet (10/100 Gbps), Wi-Fi standards (802.11ax), and SD-WAN
• .

11. Cybersecurity in Data Networks


Threats and Mitigation:
• Cybercrime: Phishing, DDoS attacks.
• Cryptography: Symmetric (AES) vs. asymmetric (RSA)
encryption
.
Network Security Protocols: IPsec, TLS/SSL, and firewalls
• .

You might also like