ECE 5600: Introduction to Computer Networks

Instructor: Dr. Ferdous Pervej

Email: ferdous.pervej@usu.edu

E-mail Turnaround Time: 24 Hours

Telephone: 435-797-9549 (office)

Office hours: TBA (at least 1 hour dedicated office hour and open door policy)

Lecture time: Lecture time: 10:30 - 11:20 on Mondays, Wednesdays and Fridays

Lecture location: EL - 221

Primary Textbooks

  • Andrew S. Tanenbaum, Nick Feamster, and David J. Wetherall, "Computer Networks," 6th edition, Pearson

Supplementary materials

  • James F. Kurose and AmherstKeith Ross, "Computer Networking A Top-Down Approach," 9th edition, Pearson
  • Behrouz A. Forouzan, "Data Communications and Networking," 5th Edition, McGraw Hill

Prerequisites:

ECE 3620 and MATH 5710 or STAT 3000

Short Description

This is an introductory course to computer networks. The goal of this course is to familiarize our students with (a) different elements of modern computer networks, (b) different protocol stacks, (c) detailed study of each layer in the protocol stacks, and (d) practical implementation/investigations of different protocols using computer programming.

Learning Objectives

This is an introductory course in computer networking. The key objectives are

  • Study different networking components, topologies, and models
  • Learn different reference models and their protocols
  • Study different transmission techniques (e.g., wired vs wireless, modulation, multiplexing, etc.)
  • Learn different link/MAC layer concepts (e.g., framing, error detection/correction, ARQ, ALOHA, CSMA etc.)
  • Study different routing algorithms and network layer concept in the Internet
  • Learn transport layer protocols and congestion controls
  • Study different practical networks like different generations of wireless networks, 802.11 (WiFi), and Bluetooth

Course Overview

The course is structured based on seven broad categories

  1. Part 1: Introduction to computer networks, protocols, and reference models
  2. Part 2: Physical layer
  3. Part 3: Link layer
  4. Part 4: Network layer
  5. Part 5: Transport layer
  6. Part 6: Application layer
  7. Part 7: Network security

The modules will cover the following topics:


Part 1: Introduction to networks, protocols, and reference models - topics for discussions (tentative ∼ subject to change)

  • Definition of a computer network
  • Type of computer networks
  • Different types of computer networks
  • Network protocols and reference models
  • The OSI reference model
  • The TPC/IP reference

Part 2: The Physical (PHY) Layer - topics for discussions (tentative ∼subject to change)

  • Transmission
  • Challenges in wireless transmissions
  • Capacity of network
  • Modulation
    • Passband vs Baseband
    • Different modulation schemes
    • Constellation diagrams
  • Multiplexing
  • Different wired and wireless networks*

Part 3: The Link Layer - topics for discussions (tentative ∼ subject to change)

  • Link layer design - framing, error/flow control
  • Error detection
  • Forward error correction (FEC)
  • Automatic repeat request (ARQ)
  • MAC sub-layer:
    • Channel allocation
    • Contention-based multiple access protocols - Aloha, Slotted Aloha, CSMA, CSMA/CD
    • Wired examples - Ethernet
    • Wireless examples - WLAN, Bluetooth

Part 4 : The Network Layer - topics for discussions (tentative ∼ subject to change)

  • Network layer design
  • Routing algorithms
  • Traffic management
  • IP addresses - IPv4, subnet, CIDR, NAT, IPv6
  • Different Internet control protocols - ICMP, ARP, DHCP
  • Internetworking
  • Network layer in Internet
  • OSPF, BGP

Part 5 : The Transport Layer - topics for discussions (tentative ∼ subject to change)

  • Transport layer services and different elements
  • Congestion controls
  • Transport protocols
  • User datagram protocol (UDP)
  • Transmission control protocol (TCP) - timer management, congestion control
  • Evolution of transport layer functionality
    • QUICK - Quick UDP Internet Connection

Part 6 : The Application Layer - topics for discussions (tentative ∼ subject to change)

  • Web and HTTP
  • Electronic mail, SMTP, IMAP
  • Domain name system
  • Video streaming and content delivery networks

Part 7 : Network Seurity - topics for discussions (tentative ∼ subject to change)

  • Network security principles
  • Different attacks and firewalls
  • Public/private keys
  • Cryptography
  • Authentication protocols
  • Network vs data security

Policies

Grading Policy

The grade will be distributed according to the following weights:

Item | Weight

Homework (×6) | 25 %

Mini-projects (×3) | 25 %

Midterm Exam (in-class, closed-book, upto 4 cheat-sheets allowed) | 25 %

Final Exam (take home, open-notes/book) | 25 %

Late Submissions

Late submissions (homework and projects) will be accepted up to 1 week after the due date with a 30% penalty unless prior arrangements are made.

Grade Challenge Policy

Students who wish to challenge or request that their instructor/TA review their grades on any homework, project, or midterm exam must request within seven days from when the grade was posted. For the final exam, students must request within 24 hours of when the grade was posted.

Course Accessibility

In cooperation with the Disability Resource Center (DRC), reasonable accommodation will be provided for qualified students with disabilities. Please reach out to the instructor prior to the first class (or during the first week of class) to make arrangements. Alternate format print materials (large print, audio, diskette or Braille) will be available through the Disability Resource Center.

DRC Statement

USU welcomes students with disabilities. If you have, or suspect you may have, a physical, mental health, or learning disability that may require accommodations in this course, please contact the Disability Resource Center (DRC) as early in the semester as possible (University Inn #101, 435-797-2444, drc@usu.edu). All disability related accommodations must be approved by the DRC. Once approved, the DRC will coordinate with faculty to provide accommodations.

Classroom Behavior

Utah State University supports the principle of freedom of expression for both faculty and students. The University respects the rights of faculty to teach and students to learn. Maintenance of these rights requires classroom conditions that do not impede the learning process. Disruptive classroom behavior will not be tolerated. An individual engaging in such behavior may be subject to disciplinary action. Read Student Code Article V Section V-3 for more information.

Academic Integrity – “The Honor System”

Each student has the right and duty to pursue his or her academic experience free of dishonesty. To enhance the learning environment at Utah State University and to develop student academic integrity, each student agrees to the following Honor Pledge:

“I pledge, on my honor, to conduct myself with the foremost level of academic integrity.”


A student who lives by the Honor Pledge is a student who does more than not cheat, falsify, or plagiarize. A student who lives by the Honor Pledge:

  • Espouses academic integrity as an underlying and essential principle of the Utah State University community;
  • Understands that each act of academic dishonesty devalues every degree that is awarded by this institution; and
  • Is a welcomed and valued member of Utah State University.

Academic Dishonesty

The instructor of this course will take appropriate actions in response to Academic Dishonesty, as defined the University’s Student Code. Acts of academic dishonesty include but are not limited to:

  • Cheating: using, attempting to use, or providing others with any unauthorized assistance in taking quizzes, tests, examinations, or in any other academic exercise or activity. Unauthorized assistance includes:
    • Working in a group when the instructor has designated that the quiz, test, examination, or any other academic exercise or activity be done “individually;”
    • Depending on the aid of sources beyond those authorized by the instructor in writing papers, preparing reports, solving problems, or carrying out other assignments;
    • Substituting for another student, or permitting another student to substitute for oneself, in taking an examination or preparing academic work;
    • Acquiring tests or other academic material belonging to a faculty member, staff member, or another student without express permission;
    • Continuing to write after time has been called on a quiz, test, examination, or any other academic exercise or activity;
    • Submitting substantially the same work for credit in more than one class, except with prior approval of the instructor; or engaging in any form of research fraud.
  • Falsification: altering or fabricating any information or citation in an academic exercise or activity.
  • Plagiarism: representing, by paraphrase or direct quotation, the published or unpublished work of another person as one’s own in any academic exercise or activity without full and clear acknowledgment. It also includes using materials prepared by another person or by an agency engaged in the sale of term papers or other academic materials.

For additional information go to: ARTICLE VI. University Regulations Regarding Academic Integrity.