SlideShare a Scribd company logo
1 of 5
COURSE OUTLINE
                                                                         GIFT COMPUTING SCIENCE SCHOOL




CS- 308
Data Communication and Computer Networks


Summer Semester, 2011


Faculty:                                       GIFT Computing Sciences School
Credit hours:                                  4
Course level:                                  Undergraduate (BS Fall 2012)
Campus/Location/Instruction Mode:              GIFT University/On Campus/In Person
Course Instructor:                             Muhammad Ziad Nayyer Dar
                                               Email: ziadnayyer@gift.edu.pk


Consultation hours:                            11:00 – 12:00 (Thursday), 02:00 – 0300 (Friday)

Pre-requisite:                                 CS-204 or CS-214
Timing                                         09:20 – 10:35 (Monday(F2), Friday(G1)) (F2) (Section B)
                                               10:40 – 11:55 (Monday(G2)), 9:20 – 10:35 (Thursday(F6)) (Section A)
This document was last updated:                14th October 2012

BRIEF COURSE DESCRIPTION
The area of computer networking is undergoing rapid development; it’s important to focus not only on what computer
networks are today, but also on why and how they are designed the way they are. The aim of this course is to provide a
conceptual introduction to computer networks and its design principles. In this course, we will study the fundamentals
of building scalable computer networks. We will go through the thought-process that went into designing the Internet---
which is the best example of a computer network that has adapted and scaled to changing environment.
         .

COURSE OBJECTIVES
The purpose of this course is to introduce fundamental principles and concepts of computer networks. The course will
follow a top-down approach, where we will first study popular network applications, then study communications
services required to support these applications, and finally study how these communication services are implemented.
Throughout this course, we will use the Internet's architecture and protocols to reinforce fundamental computer
networking principles.

LEARNING OUTCOMES
By the end of this course, we aim to impart the following skill-set to the students:
1) Understand the TCP/IP protocol suite and the working of the Internet.
2) Form a basic understanding of the principles upon which the global Internet was designed.
3) Ability to understand different routing protocols and their Practical implementation.

Tentative Lecture Plan




                                                                                          READ            Quiz
      No. of
                                                                                          ING             &
      Week                                   TOPIC
                                                                                          (Text           Assign
      s
                                                                                          Book)           ment
               Introduction    to    Data    Communication,     The     Internet                     Quiz 1 +
      2        Communication Model, OSI Reference Model, TCP/IP Protocol             Chap 1,2        Assignment
               Architecture                                                                          1
               Analog & Digital Transmission, Transmission Impairments,                               Quiz 2 +
      2        Guided Transmission Media, Wireless Transmission, Wireless            Chap 3,4        Assignment
               Propagation, Line of Sight Propagation                                                2
               Signal Encoding (Digital Data - Digital Signal, Digital Data –                        Quiz 3 + 1
               Analog      Signals),     Synchronous     and     Asynchronous                        Assignment
      2                                                                              Chap 5,6
               Communication, Distinction between Data and Signals, Error                            3
               Detection, Error Correction
               Flow Control, Error Control, Multiplexing techniques (Frequency                       Quiz 4 +
      2        Division, Time Division concepts)                                     Chap 7,8        Assignment
                                                                                                     4
   8th week                      MIDTERM EXAM
               LAN Technology, LAN Architecture, BusTree LANs,              Ring                    Quiz 5 +
      2        LANs, Star LANs, Wireless LANs                                                        Assignment
                                                                                     Chap 15
                                                                                                     5
               Wireless and Mobile Networks intro, Wireless links and network                        Quiz 6 +
      2        characteristics, Wi-Fi: IEEE 802.11 Wireless LANs, Cellular           Chap 17         Assignment
               Internet Access, Mobility management and Mobile IP                                    6
      1        Circuit Switching, Packet Switching, Virtual Circuits, Packet Size    Chap 10         Quiz 7
               Internet and Transport Protocols                                                      Assignment
      1                                                                              Chap 18,20
                                                                                                     7
               The World Wide Web: HTTP, File Transfer: FTP, Electronic Mail
      1                                                                              Chap 22,23
               in the Internet
Please note: This is a proposed schedule only and may be varied at the discretion of the instructor to give a greater or
lesser degree of emphasis to particular topics.




TEXTS AND SUPPORTING MATERIALS
Prescribed Texts and Readings:
1. Data and Computer Communications - William Stallings


Reference Resources:
1. Computer Networks (Fourth Edition), Andrew S. Tanenbaum, Prentice Hall, 2003.
2. Computer Networking: A Top-Down Approach Featuring the Internet (Third Edition), James F.
    Kurose and Keith W. Ross, Addison Wesley, 2005.
3.    Data_Communications_and_Networking_-_Behrouz_A._Forouzan




ASSESSMENT

 Item     Assessment Task       Length            Weighting    Due Day and Time

     1.   Assignments                             10.00%       Various Weeks in Class
     2    Quizzes                                 10.00%       Various Weeks in Class
     3    Class Participation                     5.00%        Over All
     4    Midterm exam          1.5 hours         25.00%       6th week
     5    Project                                 10.00%       Submitted On the 7th Week
     6    Final Examination     3 hours           40.00%       During Formal Examination Period


Students must complete each component of the assessment to the satisfaction of the course
instructor, and achieve an overall mark of at least 50% in order to pass the course. All components
of the above assessment are compulsory, and must be completed in order to obtain a pass grade.
Students are expected to perform satisfactorily in each item.


Assessment Item No. 1 (Assignments)
Three to Six home Assignments will be given to test how smart you can implement concepts
learned during class. All students are encouraged to fully participate in class discussions.


Assessment Item No. 2 (Quizzes)
Four - Six quizzes will be given to students in the class during various weeks which may or may not
be announced. The objective is to test whether the students are keeping up with the work and
grasping the concepts. All students are encouraged not to be miss class.


Assessment Item No. 3 (Class Participation)
Each student will be assessed during lecture to assure that he/she is attentive and focused on the
lecture. Previous lecture serves as basis to the coming one. So, a student must prepare previous
lecture before coming to the next class.


Assessment Item No. 4 (Midterm)
The mid term exam will be taken in 6 or 7th week. Exact date will be announced later on. This
carries 25% marks.


Assessment Item No. 5 (Project)
Every Student group is expected to complete the project before the Final Examination at the end of
the seventh week. It will comprise of 10% marks.
Assessment Item No. 6 (Final Examination)
It will be of 2-hours. Practical exam can also be conducted other than the theoretical. Further details
will be given towards the end of the semester. This will be held in the formal examination period at
the end of the semester as scheduled by GIFT University.

Late Submissions / Missed Quizzes: There will be no-retake of any quiz. A total of two late days
will be provided and could be used in case any graded homework assignment is given. These can
be used as a whole in one graded homework assignment or as one day each in two graded
homework assignments.
Coming Late to Lectures and Labs: The instructors reserve the right to not allow late comers to
attend the lecture.
Plagiarism: Unfortunately, some students have resorted to cheating and plagiarism in the past. We
want to make it clear to you that we have a zero-tolerance policy for such cases. You have made it
to GIFT after passing through significant competition. Do not squander a promising opportunity
that may have significant impact on your future. After all, it will be too bad to be expelled from
GIFT or to end up with an F.
Some typical cases that we have encountered in the past include submitting identical homework,
copying a paragraph from the internet for your assignment without referencing the source, and
taking someone else’s code, changing variable names in it, and then submitting it under your own
name.
The instructors also reserve the right to use automated tools to check for plagiarism.


Lab Plan:

To gain hands on expertise and vivified concepts we will follow the below mentioned lab plan.

Week:        Work plan
1           Basic know how of networking devices, cables
2           Making (cross cable) twisted pair cable with RJ45
            connectors and connect two similar devices
3           Making (straight) twisted pair cable with RJ45
            connectors and connect two dissimilar devices
4           Unicast, Multicast, Broadcast operations and
            working,     The IP Terminology Classes, Sub
            Netting, Super Netting
5           Introduction to packet tracer simulator
6,7         Configuring a Network
8           Modem Configuration, VBR, CIR, UBR
9,10        Configuration of Wi-Fi Network And Sharing on
            internet through it
11          DHCP, DNS, FILE Servers intro
12,13       Switching Concepts, Aggregation, VLANs
14,15       Routing Concepts, ACLs
Plagiarism Policy:
During this course a strict no tolerance plagiarism policy will be adopted. While collaboration in
this course is highly encouraged, you must ensure that you do claim other people’s work/idea as
your own. Plagiarism occurs when the words, ideas, assertion, theories, figures, images,
programming code of others is presented as your own work. You must site and acknowledge all
sources of information in your assignments. Failing to comply with plagiarism policy will lead to
strict penalties including zero marks in assignments and reports.

More Related Content

What's hot

BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...ijnlc
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
Learning spatiotemporal features with 3 d convolutional networks
Learning spatiotemporal features with 3 d convolutional networksLearning spatiotemporal features with 3 d convolutional networks
Learning spatiotemporal features with 3 d convolutional networksSungminYou
 
End-to-end Speech Recognition with Recurrent Neural Networks (D3L6 Deep Learn...
End-to-end Speech Recognition with Recurrent Neural Networks (D3L6 Deep Learn...End-to-end Speech Recognition with Recurrent Neural Networks (D3L6 Deep Learn...
End-to-end Speech Recognition with Recurrent Neural Networks (D3L6 Deep Learn...Universitat Politècnica de Catalunya
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...cscpconf
 
Automated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleAutomated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleChristopher Mehdi Elamri
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
 
Handwritten Recognition using Deep Learning with R
Handwritten Recognition using Deep Learning with RHandwritten Recognition using Deep Learning with R
Handwritten Recognition using Deep Learning with RPoo Kuan Hoong
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learningijtsrd
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
 
Chapter 3 slides (Distributed Systems)
Chapter 3 slides (Distributed Systems)Chapter 3 slides (Distributed Systems)
Chapter 3 slides (Distributed Systems)soe sumijan
 
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020Universitat Politècnica de Catalunya
 
Spoken language identification using i-vectors, x-vectors, PLDA and logistic ...
Spoken language identification using i-vectors, x-vectors, PLDA and logistic ...Spoken language identification using i-vectors, x-vectors, PLDA and logistic ...
Spoken language identification using i-vectors, x-vectors, PLDA and logistic ...journalBEEI
 

What's hot (19)

BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
 
Learning spatiotemporal features with 3 d convolutional networks
Learning spatiotemporal features with 3 d convolutional networksLearning spatiotemporal features with 3 d convolutional networks
Learning spatiotemporal features with 3 d convolutional networks
 
End-to-end Speech Recognition with Recurrent Neural Networks (D3L6 Deep Learn...
End-to-end Speech Recognition with Recurrent Neural Networks (D3L6 Deep Learn...End-to-end Speech Recognition with Recurrent Neural Networks (D3L6 Deep Learn...
End-to-end Speech Recognition with Recurrent Neural Networks (D3L6 Deep Learn...
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
 
2nd sem
2nd sem2nd sem
2nd sem
 
H42054550
H42054550H42054550
H42054550
 
Automated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleAutomated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired People
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
 
Handwritten Recognition using Deep Learning with R
Handwritten Recognition using Deep Learning with RHandwritten Recognition using Deep Learning with R
Handwritten Recognition using Deep Learning with R
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
 
Cs 471 C Omputer Networks
Cs 471 C Omputer NetworksCs 471 C Omputer Networks
Cs 471 C Omputer Networks
 
Chapter 3 slides (Distributed Systems)
Chapter 3 slides (Distributed Systems)Chapter 3 slides (Distributed Systems)
Chapter 3 slides (Distributed Systems)
 
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
Recurrent Neural Networks RNN - Xavier Giro - UPC TelecomBCN Barcelona 2020
 
Spoken language identification using i-vectors, x-vectors, PLDA and logistic ...
Spoken language identification using i-vectors, x-vectors, PLDA and logistic ...Spoken language identification using i-vectors, x-vectors, PLDA and logistic ...
Spoken language identification using i-vectors, x-vectors, PLDA and logistic ...
 
Ja2415771582
Ja2415771582Ja2415771582
Ja2415771582
 

Viewers also liked

Pegasus bullion ... new presentation
Pegasus bullion ... new presentation Pegasus bullion ... new presentation
Pegasus bullion ... new presentation adam12za
 
Inglês técnico paula s ouza
Inglês técnico paula s ouzaInglês técnico paula s ouza
Inglês técnico paula s ouzaSarah Soares
 
Qpay geting started manual
Qpay geting started manualQpay geting started manual
Qpay geting started manualadam12za
 
5a06f1 reglamento estudiantil
5a06f1 reglamento estudiantil5a06f1 reglamento estudiantil
5a06f1 reglamento estudiantilYus Medina
 
Kinguni power point presentation
Kinguni power point presentationKinguni power point presentation
Kinguni power point presentationadam12za
 
TELEXFREE POWER POINT
TELEXFREE POWER POINT TELEXFREE POWER POINT
TELEXFREE POWER POINT adam12za
 
Unetenet UNION BUSINESS ONLINE
Unetenet UNION BUSINESS ONLINEUnetenet UNION BUSINESS ONLINE
Unetenet UNION BUSINESS ONLINEadam12za
 
MDIETLINE ENGLISH PRESENTATION
MDIETLINE ENGLISH PRESENTATION MDIETLINE ENGLISH PRESENTATION
MDIETLINE ENGLISH PRESENTATION adam12za
 
Pegasus bullion presentation english
Pegasus bullion presentation englishPegasus bullion presentation english
Pegasus bullion presentation englishadam12za
 
Consuming Cinder from Docker
Consuming Cinder from DockerConsuming Cinder from Docker
Consuming Cinder from DockerJohn Griffith
 
Qpay powerpoint presentation
Qpay powerpoint presentationQpay powerpoint presentation
Qpay powerpoint presentationadam12za
 
New compensation plan telexfree
New compensation plan telexfreeNew compensation plan telexfree
New compensation plan telexfreeadam12za
 

Viewers also liked (18)

Qiwi
QiwiQiwi
Qiwi
 
ADC miscellaneous concepts
ADC miscellaneous conceptsADC miscellaneous concepts
ADC miscellaneous concepts
 
Pegasus bullion ... new presentation
Pegasus bullion ... new presentation Pegasus bullion ... new presentation
Pegasus bullion ... new presentation
 
Inglês técnico paula s ouza
Inglês técnico paula s ouzaInglês técnico paula s ouza
Inglês técnico paula s ouza
 
Qpay geting started manual
Qpay geting started manualQpay geting started manual
Qpay geting started manual
 
Academic vocab math
Academic vocab mathAcademic vocab math
Academic vocab math
 
5a06f1 reglamento estudiantil
5a06f1 reglamento estudiantil5a06f1 reglamento estudiantil
5a06f1 reglamento estudiantil
 
Kinguni power point presentation
Kinguni power point presentationKinguni power point presentation
Kinguni power point presentation
 
TELEXFREE POWER POINT
TELEXFREE POWER POINT TELEXFREE POWER POINT
TELEXFREE POWER POINT
 
Unetenet UNION BUSINESS ONLINE
Unetenet UNION BUSINESS ONLINEUnetenet UNION BUSINESS ONLINE
Unetenet UNION BUSINESS ONLINE
 
MDIETLINE ENGLISH PRESENTATION
MDIETLINE ENGLISH PRESENTATION MDIETLINE ENGLISH PRESENTATION
MDIETLINE ENGLISH PRESENTATION
 
Pegasus bullion presentation english
Pegasus bullion presentation englishPegasus bullion presentation english
Pegasus bullion presentation english
 
Consuming Cinder from Docker
Consuming Cinder from DockerConsuming Cinder from Docker
Consuming Cinder from Docker
 
Systems and signals notes part 1
Systems and signals notes  part 1Systems and signals notes  part 1
Systems and signals notes part 1
 
Caries dental
Caries dentalCaries dental
Caries dental
 
Qpay powerpoint presentation
Qpay powerpoint presentationQpay powerpoint presentation
Qpay powerpoint presentation
 
New compensation plan telexfree
New compensation plan telexfreeNew compensation plan telexfree
New compensation plan telexfree
 
Drive testing in mobile networks
Drive testing in mobile networksDrive testing in mobile networks
Drive testing in mobile networks
 

Similar to CS-308 Data Communication and Computer Networks Course Outline

BSIT-4th-CN-Course Outlines.pdfc gjcnbcmjhmn
BSIT-4th-CN-Course Outlines.pdfc gjcnbcmjhmnBSIT-4th-CN-Course Outlines.pdfc gjcnbcmjhmn
BSIT-4th-CN-Course Outlines.pdfc gjcnbcmjhmnAreshZabi
 
12110 computer networks
12110 computer networks12110 computer networks
12110 computer networksGaurang Thakar
 
CP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial IntelligenceCP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial Intelligencebutest
 
CP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial IntelligenceCP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial Intelligencebutest
 
Course plan cnw 2012
Course plan cnw 2012Course plan cnw 2012
Course plan cnw 2012Aviral Kedia
 
Sample Syllabus
Sample SyllabusSample Syllabus
Sample Syllabussritikumar
 
Final teit syllabus_2012_course_04.06.2014
Final teit syllabus_2012_course_04.06.2014Final teit syllabus_2012_course_04.06.2014
Final teit syllabus_2012_course_04.06.2014deepti112233
 
files_1575611773_2100523175.pdf
files_1575611773_2100523175.pdffiles_1575611773_2100523175.pdf
files_1575611773_2100523175.pdfbeherapravat936
 
Module handout for COM839 - Intelligent Systems [Word format]
Module handout for COM839 - Intelligent Systems [Word format]Module handout for COM839 - Intelligent Systems [Word format]
Module handout for COM839 - Intelligent Systems [Word format]butest
 
Advanced computer networks (ita601)
Advanced computer networks (ita601)Advanced computer networks (ita601)
Advanced computer networks (ita601)vishaljain8507
 
Week 1-Foundations of Computer Networks.pptx
Week 1-Foundations of Computer Networks.pptxWeek 1-Foundations of Computer Networks.pptx
Week 1-Foundations of Computer Networks.pptxBabarZafar5
 
Wireless
WirelessWireless
Wirelesssnowlab
 

Similar to CS-308 Data Communication and Computer Networks Course Outline (20)

BSIT-4th-CN-Course Outlines.pdfc gjcnbcmjhmn
BSIT-4th-CN-Course Outlines.pdfc gjcnbcmjhmnBSIT-4th-CN-Course Outlines.pdfc gjcnbcmjhmn
BSIT-4th-CN-Course Outlines.pdfc gjcnbcmjhmn
 
Chapter0 fall 2005[one.]
Chapter0 fall 2005[one.]Chapter0 fall 2005[one.]
Chapter0 fall 2005[one.]
 
12110 computer networks
12110 computer networks12110 computer networks
12110 computer networks
 
CP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial IntelligenceCP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial Intelligence
 
CP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial IntelligenceCP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial Intelligence
 
Course plan cnw 2012
Course plan cnw 2012Course plan cnw 2012
Course plan cnw 2012
 
Sample Syllabus
Sample SyllabusSample Syllabus
Sample Syllabus
 
ZERO-LECTURE.pptx
ZERO-LECTURE.pptxZERO-LECTURE.pptx
ZERO-LECTURE.pptx
 
Final teit syllabus_2012_course_04.06.2014
Final teit syllabus_2012_course_04.06.2014Final teit syllabus_2012_course_04.06.2014
Final teit syllabus_2012_course_04.06.2014
 
files_1575611773_2100523175.pdf
files_1575611773_2100523175.pdffiles_1575611773_2100523175.pdf
files_1575611773_2100523175.pdf
 
5th sem
5th sem5th sem
5th sem
 
5th sem
5th sem5th sem
5th sem
 
Ip
IpIp
Ip
 
Module handout for COM839 - Intelligent Systems [Word format]
Module handout for COM839 - Intelligent Systems [Word format]Module handout for COM839 - Intelligent Systems [Word format]
Module handout for COM839 - Intelligent Systems [Word format]
 
2nd sem
2nd sem2nd sem
2nd sem
 
Advanced computer networks (ita601)
Advanced computer networks (ita601)Advanced computer networks (ita601)
Advanced computer networks (ita601)
 
Week 1-Foundations of Computer Networks.pptx
Week 1-Foundations of Computer Networks.pptxWeek 1-Foundations of Computer Networks.pptx
Week 1-Foundations of Computer Networks.pptx
 
360 b sc(cs) - semester v ku
360 b sc(cs) - semester v ku360 b sc(cs) - semester v ku
360 b sc(cs) - semester v ku
 
Networks
NetworksNetworks
Networks
 
Wireless
WirelessWireless
Wireless
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

CS-308 Data Communication and Computer Networks Course Outline

  • 1. COURSE OUTLINE GIFT COMPUTING SCIENCE SCHOOL CS- 308 Data Communication and Computer Networks Summer Semester, 2011 Faculty: GIFT Computing Sciences School Credit hours: 4 Course level: Undergraduate (BS Fall 2012) Campus/Location/Instruction Mode: GIFT University/On Campus/In Person Course Instructor: Muhammad Ziad Nayyer Dar Email: ziadnayyer@gift.edu.pk Consultation hours: 11:00 – 12:00 (Thursday), 02:00 – 0300 (Friday) Pre-requisite: CS-204 or CS-214 Timing 09:20 – 10:35 (Monday(F2), Friday(G1)) (F2) (Section B) 10:40 – 11:55 (Monday(G2)), 9:20 – 10:35 (Thursday(F6)) (Section A) This document was last updated: 14th October 2012 BRIEF COURSE DESCRIPTION The area of computer networking is undergoing rapid development; it’s important to focus not only on what computer networks are today, but also on why and how they are designed the way they are. The aim of this course is to provide a conceptual introduction to computer networks and its design principles. In this course, we will study the fundamentals of building scalable computer networks. We will go through the thought-process that went into designing the Internet--- which is the best example of a computer network that has adapted and scaled to changing environment. . COURSE OBJECTIVES The purpose of this course is to introduce fundamental principles and concepts of computer networks. The course will follow a top-down approach, where we will first study popular network applications, then study communications
  • 2. services required to support these applications, and finally study how these communication services are implemented. Throughout this course, we will use the Internet's architecture and protocols to reinforce fundamental computer networking principles. LEARNING OUTCOMES By the end of this course, we aim to impart the following skill-set to the students: 1) Understand the TCP/IP protocol suite and the working of the Internet. 2) Form a basic understanding of the principles upon which the global Internet was designed. 3) Ability to understand different routing protocols and their Practical implementation. Tentative Lecture Plan READ Quiz No. of ING & Week TOPIC (Text Assign s Book) ment Introduction to Data Communication, The Internet Quiz 1 + 2 Communication Model, OSI Reference Model, TCP/IP Protocol Chap 1,2 Assignment Architecture 1 Analog & Digital Transmission, Transmission Impairments, Quiz 2 + 2 Guided Transmission Media, Wireless Transmission, Wireless Chap 3,4 Assignment Propagation, Line of Sight Propagation 2 Signal Encoding (Digital Data - Digital Signal, Digital Data – Quiz 3 + 1 Analog Signals), Synchronous and Asynchronous Assignment 2 Chap 5,6 Communication, Distinction between Data and Signals, Error 3 Detection, Error Correction Flow Control, Error Control, Multiplexing techniques (Frequency Quiz 4 + 2 Division, Time Division concepts) Chap 7,8 Assignment 4 8th week MIDTERM EXAM LAN Technology, LAN Architecture, BusTree LANs, Ring Quiz 5 + 2 LANs, Star LANs, Wireless LANs Assignment Chap 15 5 Wireless and Mobile Networks intro, Wireless links and network Quiz 6 + 2 characteristics, Wi-Fi: IEEE 802.11 Wireless LANs, Cellular Chap 17 Assignment Internet Access, Mobility management and Mobile IP 6 1 Circuit Switching, Packet Switching, Virtual Circuits, Packet Size Chap 10 Quiz 7 Internet and Transport Protocols Assignment 1 Chap 18,20 7 The World Wide Web: HTTP, File Transfer: FTP, Electronic Mail 1 Chap 22,23 in the Internet Please note: This is a proposed schedule only and may be varied at the discretion of the instructor to give a greater or lesser degree of emphasis to particular topics. TEXTS AND SUPPORTING MATERIALS Prescribed Texts and Readings: 1. Data and Computer Communications - William Stallings Reference Resources: 1. Computer Networks (Fourth Edition), Andrew S. Tanenbaum, Prentice Hall, 2003. 2. Computer Networking: A Top-Down Approach Featuring the Internet (Third Edition), James F. Kurose and Keith W. Ross, Addison Wesley, 2005.
  • 3. 3. Data_Communications_and_Networking_-_Behrouz_A._Forouzan ASSESSMENT Item Assessment Task Length Weighting Due Day and Time 1. Assignments 10.00% Various Weeks in Class 2 Quizzes 10.00% Various Weeks in Class 3 Class Participation 5.00% Over All 4 Midterm exam 1.5 hours 25.00% 6th week 5 Project 10.00% Submitted On the 7th Week 6 Final Examination 3 hours 40.00% During Formal Examination Period Students must complete each component of the assessment to the satisfaction of the course instructor, and achieve an overall mark of at least 50% in order to pass the course. All components of the above assessment are compulsory, and must be completed in order to obtain a pass grade. Students are expected to perform satisfactorily in each item. Assessment Item No. 1 (Assignments) Three to Six home Assignments will be given to test how smart you can implement concepts learned during class. All students are encouraged to fully participate in class discussions. Assessment Item No. 2 (Quizzes) Four - Six quizzes will be given to students in the class during various weeks which may or may not be announced. The objective is to test whether the students are keeping up with the work and grasping the concepts. All students are encouraged not to be miss class. Assessment Item No. 3 (Class Participation) Each student will be assessed during lecture to assure that he/she is attentive and focused on the lecture. Previous lecture serves as basis to the coming one. So, a student must prepare previous lecture before coming to the next class. Assessment Item No. 4 (Midterm) The mid term exam will be taken in 6 or 7th week. Exact date will be announced later on. This carries 25% marks. Assessment Item No. 5 (Project) Every Student group is expected to complete the project before the Final Examination at the end of the seventh week. It will comprise of 10% marks.
  • 4. Assessment Item No. 6 (Final Examination) It will be of 2-hours. Practical exam can also be conducted other than the theoretical. Further details will be given towards the end of the semester. This will be held in the formal examination period at the end of the semester as scheduled by GIFT University. Late Submissions / Missed Quizzes: There will be no-retake of any quiz. A total of two late days will be provided and could be used in case any graded homework assignment is given. These can be used as a whole in one graded homework assignment or as one day each in two graded homework assignments. Coming Late to Lectures and Labs: The instructors reserve the right to not allow late comers to attend the lecture. Plagiarism: Unfortunately, some students have resorted to cheating and plagiarism in the past. We want to make it clear to you that we have a zero-tolerance policy for such cases. You have made it to GIFT after passing through significant competition. Do not squander a promising opportunity that may have significant impact on your future. After all, it will be too bad to be expelled from GIFT or to end up with an F. Some typical cases that we have encountered in the past include submitting identical homework, copying a paragraph from the internet for your assignment without referencing the source, and taking someone else’s code, changing variable names in it, and then submitting it under your own name. The instructors also reserve the right to use automated tools to check for plagiarism. Lab Plan: To gain hands on expertise and vivified concepts we will follow the below mentioned lab plan. Week: Work plan 1 Basic know how of networking devices, cables 2 Making (cross cable) twisted pair cable with RJ45 connectors and connect two similar devices 3 Making (straight) twisted pair cable with RJ45 connectors and connect two dissimilar devices 4 Unicast, Multicast, Broadcast operations and working, The IP Terminology Classes, Sub Netting, Super Netting 5 Introduction to packet tracer simulator 6,7 Configuring a Network 8 Modem Configuration, VBR, CIR, UBR 9,10 Configuration of Wi-Fi Network And Sharing on internet through it 11 DHCP, DNS, FILE Servers intro 12,13 Switching Concepts, Aggregation, VLANs 14,15 Routing Concepts, ACLs
  • 5. Plagiarism Policy: During this course a strict no tolerance plagiarism policy will be adopted. While collaboration in this course is highly encouraged, you must ensure that you do claim other people’s work/idea as your own. Plagiarism occurs when the words, ideas, assertion, theories, figures, images, programming code of others is presented as your own work. You must site and acknowledge all sources of information in your assignments. Failing to comply with plagiarism policy will lead to strict penalties including zero marks in assignments and reports.