Course Outline - Introduction To Networks and Systems

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Addis Ababa University

College of Natural and Computational Science


School of Information Science
Course Title Introduction to Networks and Systems
Module Title Computer Networks, Administration and Security
Module Code INSY-M3071 Course Code: INSY3071
CP/ECTS 5
Study Hours Lecture: 48 Laboratory: 16 Tutorial: 0 Home Study: 71
Instructor’s Name: Tsegaye Berhanu
Information Mobile:
Email: tsegaye.berhanu@aau.edu.et
Office Location: Eshetu Chole Building, 3rd Floor, Room #319
Consultation Hours: Anytime
Course Academic Year: 2021/2022
Information Semester: I
Course Schedule:
Class Room:
Prerequisite(s): None
Mode of Delivery: Block
Course The course aims at exploring the various types of data communication systems, networks
Description and their applications. The content includes: computer networks, seven-layer architecture,
OSI & TCP/IP suite of protocols, network hardware, network software, standardization,
guided transmission media, wireless transmission, data link layer, Ethernet and IP
addressing. It involves practical session on Cabling and crimping, Configuring TCP/IP, Peer
to Peer Networking, Sharing Files, Sharing Printers, Client-server Networking, Steps for
Creating a home or small office Network, experiencing collaboration tools, installing &
Configuring Network Operating System, Exploring Server Roles, setting up a DNS Server,
setting up a DHCP server, Domain controller and IP Addressing.
Learning Up on the successful completion of the course, students will be able to:
Outcomes • Describe the basics of data communications and network
• Explain the benefits and the need for network
• Understand data transmission and transmission media
• Understand Protocols and various networking components
• Understand TCP/IP & OSI Reference Model
• Demonstrate cable crimping, establishing, setup and troubleshooting Networks
• Demonstrate network addressing
• Understanding network Equipment
• Understand network security and data integrity
Course Content
Topic Duration (Week) Reading List
Chapter 1: Introduction
1.1. History & overview of Networks ✓Lecture Notes
1
1.2. The impact of Networks on daily life ✓Textbooks
1.3. The network as a platform ✓Internet
1.4. Network Role & Elements
1.5. Network Architecture Characteristics
1.6. Computer Networks Versus Human Network
Chapter 2: Data Communications
2.1. What is communication?
2.2. The platform for communication
2.2.1. Communicating the Message ✓Lecture Notes
2.3. Data transmission ✓ Textbooks
2
2.3.1. Concepts and Terminology ✓ Internet
2.3.2. Analog and Digital Data Transmission
2.3.3. Transmission Impairments
2.4. Components of the network
2.4.1. End Devices & their role
2.4.2. Intermediary Devices & their role
2.4.3. Network Media
Chapter 3: Network Types ✓Lecture Notes
3.1. LANs, MAN, WANs and Internetworks
3 ✓Textbooks
3.2. Peer to peer versus Server based Networks ✓Internet
3.3. Network Topologies
3.3.1. Overview of network topologies
Chapter 4: Protocols and OSI Reference Model
4.1. Rules & Network Protocols
4.2. Protocol suites & Industry Standards
4.3. Layered Models ✓Lecture Notes
4.3.1. The TCP/IP Model ✓Textbooks
4
4.3.2. The OSI Model ✓Internet
4.3.3. Comparing OSI Model with TCP/IP Model
4.3.4. Overview of familiar Protocols
4.4. Overview & functions of each layer
4.4.1. Bits, Frame, Packet & Datagram
4.4.2. Physical Signaling & Encoding
Chapter 5: Switching & Network Devices
6.1. Switching Concept and Types ✓Lecture Notes
6.1.1. Packet-switched and Circuit switched networks ✓Textbooks
6.2. Multiplexing Concepts and Types 6 ✓Internet
6.3. Introduction to Ethernet & Wireless Networks
6.3.1. Ethernet and Fast Ethernet
6.3.2. Introduction to Wireless Network
6.4. Network Devices
Chapter 6: Introduction to IP Addressing and Subnetting ✓Lecture Notes
 Classful & Classless Addressing
7 ✓Textbooks
 Subnetting
 Variable Length Subnet Masking (VLSM) ✓Internet
Chapter 7: Network Security
7.1. Fundamentals of secure networks; cryptography ✓Lecture Notes
7.2. Encryption and privacy ✓Textbooks
7.3. Authentication protocols 8 ✓Internet
7.4. Firewalls
7.5. Virtual private networks
7.6. Transport layer security
Teaching Strategy The course will be delivered in the form of lectures, demonstration, student presentations,
group discussions, and individual and group project works.
Assessment The evaluation shall be based on both formative and summative assessment which include:
Criteria Assessment Forms % of credit allotted
Lecture and Practice (100%)
• Participation and Attendance 5
• Quizzes and Assignments 25
• Test(s) 30
• Final Examination 40
Practice (100%)
• Participation and Attendance 10
• Laboratory Exercise 20
• Laboratory Exam 40
• Project 30

Role of Delivers lectures, prepares reading assignments and topics for group discussion, prepares
lab exercise by discussion with student, gives consultation and advises students on individual
Instructor(s) and group assignments, prepares and evaluates quiz, assignment, tests and final examination.

Role of Students Attend lectures, laboratory session and presentation, work in team on group work, participate
in group discussion, discusses with the instructor on topics of interest for group work, delivers
and presents individual and group work, attend quiz, midterm and final examination.

Required software Hardware: Computers, printer, UTP cable, network toolkit, hub/switch, RJ-45 connectors.
and/or hardware Software: Network Operating systems, Simulators
Reference Textbook:
• Data Communications and Networking, 4th Ed., Behrouz A. Forouzan
Reference:
• A S Tannenbaum " Computer Networks" Prentice Hall of India Publication, 2002
• Data and Computer Communications, 8th ed. William Stallings
• Computer Networking. Kurose & Ross. Addison Wesley
• Fred Halshall "Data Communication, Computer Networks & Open systems"
Publication Pearson Education
• Any Cisco Material (CCNA Module1) will be helpful

You might also like