CST 311 - Introduction to Computer Networks
Survey of Telecomm and Data Comm Technology Fundamentals, Local Area Network, Wide Area Network, Internet and internetworking protocols including TCP/IP, network security and performance, emerging industry trends such as voice over the network and high speed networking. Designed as a foundation for students who wish to pursue more advanced network studies including certificate programs. Includes hands-on networking labs that incorporate Cisco CCNA lab components.
Class Outcomes
Through the class we learned the architecture of the networks with great emphasis on the internet and how it works. Through the class we learned the life of a packet from the origin as a request from an application, the transit through the network, to its delivery.
The class covered important concepts such as how CDNs work and act as fast delivery, distributed hubs for content to reduce traffic and computational time on servers. We also studied how ICANN does IP resolution through DNS to make the internet easier to navigate for users. How routers and switches direct traffic for internal and external networks to ensure packages are moved through efficiently. We learned about the different security protocols that are used to ensure the authenticity and integrity of packets through hashing algorithms, handshakes and signatures and encryption.
Finally, we learned to use the computer terminal, trace route, Wireshark and a number of other tools to analyze packets and traffic within our own ecosystems to providing useful and practical skills for the future.
The class covered important concepts such as how CDNs work and act as fast delivery, distributed hubs for content to reduce traffic and computational time on servers. We also studied how ICANN does IP resolution through DNS to make the internet easier to navigate for users. How routers and switches direct traffic for internal and external networks to ensure packages are moved through efficiently. We learned about the different security protocols that are used to ensure the authenticity and integrity of packets through hashing algorithms, handshakes and signatures and encryption.
Finally, we learned to use the computer terminal, trace route, Wireshark and a number of other tools to analyze packets and traffic within our own ecosystems to providing useful and practical skills for the future.