Rrjete Kompjuterike

Print

Alban Deda, Msc

Code
CMP 220
Name
Computer Networks
Semester
4
Lecture hours
2.00
Seminar hours
0.00
Laborator hours
2.00
Credits
3.00
ECTS
6.00
Description

Computer Networking covers one of the broadest fields of the Information Technology.The course covers the basic knoledge of a network, such as OSI Layer and TCP/IP model with all their undersections. The course covers deeply the communications between the protocols, and the configuration of different equipments. Their connections in the distance, troubleshooting and the security of the networking and PCs that are included in it, especially if they are exposed to the outside risk, and the protection of the cybernetic assaults

Objectives

1. To teach the students the concepts of computer networking 2. To prepare the students for different certifications, such as Comptia Network+ 3. To prepare the students for the work market, at the moment they leave the school

Java
Tema
1
Networking. OSI and TCP/IP Models General knoledge of networking. Two models of networking, and the clasification of different equipments, and where do they fit in both models. (Fq. 41 – 104)
2
Cabling and the topologies of Networking Knoledge of cabling and different topologies of networking. The way the equipments are connected in the networking. The types of mediums they use. How they communicate with each other, what kind of protocols they use, and the intermediate equpemnets that are used for this communication (Fq. 105 – 140)
3
Basics of ethernet The lecture shows different types of ethernet, as one the basic cabling types of networking. The difference between megabit, gigabit etc. The differences between straight and crossover cabling. How the equpments get connected through a switch, and the maximal distances these types of communication (Fq.141 – 196)
4
Installation of a real life network This lecture shows the process of the installation of a real life network. The use of diagrams and documentation of network, installation of a network card. Excecution of a simple troubleshooting, and the basis of disaster recovery, in case of any problem occurs (Fq.197 – 280)
5
TCP/IP Basics The lecture explains the aim, and the use of the ports and protocols. It shows how the TCP/IP protocol works. Subnetting, (Fq.280 – 359)
6
Routing The lecutre explains the concepts of switching and routing, and the specific equipments that are used in these layers. How router and switch work, and the static/dynamic routing. The configuration of a router. (fq.360 – 425)
7
TCP/IP Applications Aplications of TCP/IP explains the functions of network services. How can we access remotely the equpments, by enabling the services. Basics of TCP/IP, HTTP, HTTPS, TELENT, SSH, SMTP, POP3, IMAP4, (Fq.426 – 558)
8
Midterm Exam
9
TCP/IP Security Lecture explains the security that is needed when we create a network. THe methods of authentiaction and access control. Different standarts of TCP/IP Security and implementation of IPv6 (Fq.559 – 698)
10
Remote Connectivity The lecture explains different ways of accessing remotely a network. WAN technologies and the differences between the equipments used. Different topologies used, within two remote. (Fq.699 – 773)
11
Wireless Networking The lecture explains different wireless protocols. Troubleshooting of the network perfomance, and the steps to be taken, in order to protect these wireless equipments from remote attack. (fq.774 – 851)
12
Virtualization Cloud Computing and Mobile Networking The concepts of virtualization and storage network technologies. The reasons why these technolgies overshine the other methods of storage, such as local keeping of the servers. Advantages and disadvantages.. (Fq.852 – 916)
13
Real life network How to create a real life network, which is made of modems, router, switch, cabling and different hosts that create the network, such as PC, printers and every other equipments that works over TCP/IP. (fq.917 – 955)
14
Management and Security of Network. This lecture explains the risk management in networking, and the latter is under attack, from outside or within its own network equipment. Which are the methods of disaster recovery, and best practices for the protection of network (fq.956 – 1060)
15
Monitoring and Troubleshooting of Network This lecture explains how to monitor a network. The issues, that a network may have, when other hosts are added to the network. Which are the standart methods of troubleshooting. The way that SNMP works, and what is its use. Different ways of monitoring.. (fq.1061 – 1148)
16
Final Exam
1
Students have fully absorbed the definitions of netwrok configuration
2
Students will be able to make subnetting calculations, between binar and decimal systems
3
Students will be able to create a physical network, with all the neccesary equipments
4
Students will be able to configure a broad range of equipments
5
Students will be able to create different rules of security for the hosts of a network
6
Students will be able to enter different certifications, in order to be ready for the work market
Quantity Percentage Total percent
Midterms
1 50% 50%
Quizzes
0 0% 0%
Projects
0 0% 0%
Term projects
0 0% 0%
Laboratories
0 0% 0%
Class participation
0 0% 0%
Total term evaluation percent
50%
Final exam percent
50%
Total percent
100%
Quantity Duration (hours) Total (hours)
Course duration (including exam weeks)
16 4 64
Off class study hours
14 6 84
Duties
0 0 0
Midterms
1 1 1
Final exam
1 1 1
Other
0 0 0
Total workLoad
150
Total workload / 25 (hours)
6.00
ECTS
6.00