1 / 13

Computer Network II

Computer Network II. First Semester 1433/1434. prerequisites. IT224 – Computer Networks I. instructors. Name: Dr. Nazha ABED Email: nabed@ksu.edu.sa Office: 91, 2 nd floor , blg 20 Name: Aseel Fahad Alturki Email: afalturki@ksu.edu.sa Office: 50, 2 nd floor , blg 20

reina
Télécharger la présentation

Computer Network II

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Network II First Semester 1433/1434

  2. prerequisites • IT224 – Computer Networks I.

  3. instructors • Name: Dr. Nazha ABED • Email: nabed@ksu.edu.sa • Office: 91, 2ndfloor, blg 20 • Name: AseelFahadAlturki • Email: afalturki@ksu.edu.sa • Office: 50, 2ndfloor, blg 20 • Name: NouraNassir Al-Omar • Email: nnalomar@ksu.edu.sa • Office: 94, 2ndfloor, blg 20

  4. Course Blog • http://it424network2.wordpress.com/

  5. Text book • Data Communications and Networking. BehrouzA.Forouzan. McGraw Hill, 2007.

  6. Course outline • UDP • TCP • SCTP • DNS • Telnet + FTP • Electronic mail • WWW + HTTP • Socket Programming

  7. Course learningoutcomes I • Differentiate between the characteristics of the User Datagram Protocol (UDP) and Transmission Control Protocol (TCP). • Understand socket programming using TCP and UDP. • Illustrate the functions of the Stream Transmission Control Protocol (SCTP). • Point out the particular roles of the Domain Name System (DNS).

  8. Course learningoutcomes II • Specify the functions of the remote login TELNET. • Compare between e-mail and SMTP. • Point out the tasks performed by the File Transfer Protocol (FTP). • Spell out the roles of the Hyper-Text Transfer Protocol (HTTP).

  9. Academic Dishonesty • Unless otherwise explicitly specified, all written assignments or code that is submitted is to be entirely the students own work. Using any code or copying any assignment from others is strictly prohibited. This includes the use of code others have submitted in the past. Any violation of this rule will be dealt with by a severe grade penalty (minus penalty not zero).

  10. Academic Policies • There will be no replacement Exams unless the student has a serious situation (death, Birth, etc). Thus, a dedicated committee is responsible of approving it!

  11. Grading Scheme • Two Midterm Exams (40 Marks):12:00 – 1:00 • First Midterm: Sunday 14-10-2012 • Second Midterm: Sunday 9-12-2012 • Two Quizzes (10 Marks): 12:00 – 12:30 • First Quiz: Sunday 30-9-2012 • Second Quiz: Sunday 25-11-2012 • Homeworks: assignments and projects(10 Marks).

  12. Labs • One assignment per course chapter • 2 mini projects by term • You have to respect the submission dates • You have to submit your personal work

  13. Final Note The course blog is a very important communication tool so please always follow it and benefit from it!

More Related