Computer Networks TF/IT HT2003 (1TT821, 1TT825, 1IT070)
Reading advice
Holzmann:
Design and Validation of Computer Protocols: all of chapters 1 and 2.
Kurose & Ross: Computer Networking, second edition:
Section | Comments |
---|---|
1.1-1.4.1, 1.5, 1.7-1.9 | We will return to Multiplexing, Routing, Delay and Loss later. |
2.1-2.5, 2.9-10 | MIME (2.4.3) is recommended and interesting; the section The Received Message is important. Programming (2.6-2.8) is supplementary. |
1.6, 3 | Full chapter on transport layer. See also the ![]() ![]() |
1.4.2, 4.1-4.5, 4.10 | Plus small parts of 4.7 and 4.8 |
5.1-5.6, 5.11 | Skip the section on code division multiple access. |
7 | Algorithms and lower-level protocol details can be skipped, but the general principles are important. Do take the data security course! Extra material on security problems in the Internet protocols can be found here![]() |
Kurose & Ross: Computer Networking, first edition:
Section | Comments |
---|---|
1.1-1.4.1, 1.5, 1.7-1.10 | We will return to Multiplexing, Routing, Delay and Loss later. |
2.1-2.5, 2.9 | MIME (2.4.3) is recommended and interesting; the section The Received Message is important. Programming (2.6-2.8) is supplementary. |
1.6, 3 | Full chapter on transport layer. See also the ![]() ![]() |
1.4.2, 4.1-4.5, 4.9 | Plus small parts of 4.7 and 4.8 |
5.1-5.6, 5.11 | Skip the section on code division multiple access. |
7 | Algorithms and lower-level protocol details can be skipped, but the general principles are important. Do take the data security course! Extra material on security problems in the Internet protocols can be found here![]() |