Professional Documents
Culture Documents
Lecture No. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30.
Topic(s) to be discussed
A brief overview of Network Performance metrics and elements of Network Security Concept Summarization and discussions, part-1 Significance of the application-driven approach to designing Computer Networks, 9.0 Need for specialized protocols for the applications / class of applications, Examples Common Network-based Applications: Email, Web, Remote access to Computing 9.1, 9.2, 9.3 Resources Application-level Protocols, Examples: SMTP, HTTP 9.1, 9.2, 9.3 Concept of Web-Service and related protocols, Examples 9.1 SOAP versus REST and more 9.1 Network-based Multimedia applications, Requirements, Constraints, Examples 9.2 Elements involved, related protocols, issues 9.2 Select example applications: VoIP, VoD, Webcasting, Video-Conferencing, Immersive 9.2 Telepresence Handling Multimedia data over networks, concepts, issues and implications 7.2 Concept of Infrastructure Networks, Examples of infrastructure network services 9.3 Naming convention, Naming services, Domain Name System, Root Servers, Internet 9.3 Registries An overview of DHCP, SNMP and select other application-level protocols 9.3 Overlay Networks, Purpose of overlay networks, Examples 9.4 Concept Summarization and discussions, part-2 Slide-set-2 Transport requirements of applications and related services, techniques and protocols 5.0 Simple, low-overhead, low-latency and unreliable transport service requirements, 5.1 mechanisms and protocols, Example: UDP Reliable, higher-overhead, higher-latency and reliable transport service requirements, 5.2 mechanisms and protocols, Example TCP Inside the TCP 5.2 More on TCP, Variants and Alternatives 5.2 Remote execution services, mechanisms and protocols, Examples: RPC 5.3 Transport requirements, services, mechanisms and protocols for Real-Time 5.4 Applications, Examples: RTP, RTCP Inside the RTP and RTCP, Alternatives, SCTP 5.4 Concept Summarization and discussions, part-3 Slide-set-3 Requirements of the underlying support infrastructure that would allow required 3.0, 3.2 transport protocols to function: Internetworking, Routing and Switching Internetworking requirements, services, mechanisms and protocols, Examples: IP(v4), 3.2 ICMP, IGMP, IPv6, ICMPv6 Inside the IP(v4), ICMP, IGMP, IPv6, ICMPv6 3.2 Routing requirements, services, constraints, mechanisms and protocols, Examples: RIP 3.3 (Distance Vector routing), OSPF (Link-State routing), DVMRP (multicast routing). MOSPF (Multicast routing), BGP (Exterior / Inter-AS routing) Inside RIP (Distance Vector routing), OSPF (Link-State routing), 3.3 Inside BGP, Variants 3.3 Little more on Multicast routing techniques: PIM-SM, PIM-DM 3.3 Quality of Service at the Internetworking level, Differentiated and Integrated Service 3.2, 3.3 paradigms
Topic(s) to be discussed
37.
38
Switching versus Routing: What, When, Where and How, Examples, Implementation and Performance aspects and factors Emerging trends, New paradigms, Future of the Internet Summary Concept Summarization and discussions, part-4 Slide-set-4 Handling requirements related to internetworking, routing and switching by encoding / 2.0-2.5 decoding, transmitting, receiving, controlling data over physical media of varying types: Logical link control, Medium Access Control and Physical Medium-specific functions, Electrical, Optical and hybrid modes of signaling, transfer, reliable communication at the lower-layers The IEEE 802 Architecture and its significance, Link-level: Logical Link Control, 2.4, 2.5, Medium-Access Control, Physical-level: Handling properties of the medium, 2.6, 2.7 modulation/demodulation, coding/decoding, transmission/reception, Example protocols & associated mechanisms: IEEE 802.3 family, IEEE 802.11 family, IEEE 802.15.1, IEEE 802.15.4, IEEE 802.16 Inside the Ethernet variants: IEEE 802.3 family of protocols (Layers 1 & 2 combined)) 2.6 Inside the (Wi-Fi over) IEEE 802.11 family of protocols (Layers 1 & 2 combined) 2.7 Bridges versus Switches: What, When, Where and How, Examples, Implementation and 3.1 Performance aspects and factors Emerging trends, Best Practices, Pointers to Case-studies and Design documents 2.8 Concept summarization, part-6 & Discussions on a Design Problem / Case-study 2.8, Slidecovering all major aspects of Networking covered during the semester set-5
4. Evaluation Scheme: Evaluation Type Component EC-1: LaboratoryExperiments / oriented / Mini-Project / Investigative Theoretical Study EC-2: MidClosed book Semester Test Spot-quiz Open-notes EC-3: Open Book: Comprehensive 20% (Design Exam. problem) Closed Book: 20%
Weight 25%
5. Notices: All notices shall be electronically displayed only on the Course Home Page at the Nalanda LMSportals only. 6. Make-up Policy: Only in genuine cases, on a case-by-case basis, Make-ups shall be allowed. 7. Chamber Consultation Hours: Tuesday: 5:00 PM to 6:00 PM. Instructor-in-Charge: CS C461 / IS C461