Föreläsningar
There are in total 11 lectures, 3 laboratory lessons and 5 exercises scheduled in the course. You can find the schedule in Time Edit for the course EITF25. The following is a preliminary plan of the lectures (there will be corrections during the course). For each lecture the slides will be distributed as a pdf-file.
Date |
Topic | Slides | Stallings | Kihl & Andersson | Forouzan |
3/11, 13-15 | Introduction | L1 | 1, 2.1-3 | 1.5-6, 7.1 | 1.1-2, 2.1-3 |
7/11, 10-12 | Physical Layer (1) | 3.1-4, 4.1-2, 5.1-3, (16.1) | 2.1-3, 3.1-2, 3.5-6 | 3.1-4, 4.1-2, 5.1, 6.1 | |
10/11 13-15 |
Cancelled | ||||
14/11, 10-12 |
Physical layer (2), |
L3 | Same as L2 | Same as L2 | Same as L2 |
17/11, 13-15 | Data Link Layer Error and flow control |
L4 | 6.1-5, 7.1-3 | 4.1-3, 4.5 | 10.1-5, 11.1-2, 11.4, 23.2 |
21/11, 10-12 | Data Link Layer Network access |
L5 | 8.1-2, 8.6, 9.1-2, 9.5, 11.1-5, 12.1 | 5.1-6 | 12.1-2, 13.1-5, 15.1-2 |
24/11, 13-15 | Internet protocols Network Layer |
L6 | 14.1-4 | 6.1-3, 7.1-5, 7.8, 8.2 | 17.1, 18.1-2, 18.4-5, 19.1, 22.1-2 |
28/11, 10-12 | Internet protocols Routing |
19.1-2 | 8, 9.3–4 | 20.1–3, 21.1–2 | |
1/12, 13-15 | Transport Layer | L8 | 15.1-3 | 11.1-5 | 31.1-3 |
5/12, 10-12 |
Application Layer |
L9 | 24.1-3, 25.1-4 | 7.5, 7.7, 7.9, 12.3-6, 12.8 | 18.4.4, 19.2, 26.1-3, 26.6, 28.4.4-5, 29.1, 29.5 |
8/12, 13-15 | Internet security | L10 | 14.5,.... | ||
12/12 |
Web search | L11 | |||