Skip to main content
Department of Information Technology

Computer Networks TF/IT HT2003 (1TT821, 1TT825, 1IT070)

Reading advice

Holzmann:

Design and Validation of Computer Protocols: all of chapters 1 and 2.

Kurose & Ross: Computer Networking, second edition:

Section Comments
1.1-1.4.1, 1.5, 1.7-1.9 We will return to Multiplexing, Routing, Delay and Loss later.
2.1-2.5, 2.9-10 MIME (2.4.3) is recommended and interesting; the section The Received Message is important. Programming (2.6-2.8) is supplementary.
1.6, 3 Full chapter on transport layer. See also the transition diagram of TCP and "A Quick Tour Around TCP".
1.4.2, 4.1-4.5, 4.10 Plus small parts of 4.7 and 4.8
5.1-5.6, 5.11 Skip the section on code division multiple access.
7 Algorithms and lower-level protocol details can be skipped, but the general principles are important. Do take the data security course! Extra material on security problems in the Internet protocols can be found here.

Kurose & Ross: Computer Networking, first edition:

Section Comments
1.1-1.4.1, 1.5, 1.7-1.10 We will return to Multiplexing, Routing, Delay and Loss later.
2.1-2.5, 2.9 MIME (2.4.3) is recommended and interesting; the section The Received Message is important. Programming (2.6-2.8) is supplementary.
1.6, 3 Full chapter on transport layer. See also the transition diagram of TCP and "A Quick Tour Around TCP".
1.4.2, 4.1-4.5, 4.9 Plus small parts of 4.7 and 4.8
5.1-5.6, 5.11 Skip the section on code division multiple access.
7 Algorithms and lower-level protocol details can be skipped, but the general principles are important. Do take the data security course! Extra material on security problems in the Internet protocols can be found here.

Updated  2003-10-07 11:17:22 by Björn Victor.