CHINHOYI UNIVERSITY OF TECHNOLOGY
SCHOOL OF ENGINEERING, SCIENCES AND TECHNOLOGY
DEPARTMENT OF ICT AND ELECTRONICS
Module title DATA COMMUNICATIONS AND NETWORKS
Module Code CUITM 213
Level 2.2
Credits 15
Date Module 20 January 2025
outline last
updated
Lecturer Ms. F.D Chigaro
information Office hours:
Office No: E7
E-mail address:
[email protected] Cell number: +263 714
Notional hours 150 hours.
Contact Hours: Face to Face (30 Hours) and Online (30 Hours)
Tutorials: 18 Hours
Practical/Laboratory Work: 10 Hours
Self-directed learning: 30 Hours
Prerequisites None
Preamble The module exposes students to the different technologies applied in data
communication and the principles of computer networking. Topics covered include:
Computer network technologies and applications, the Role of Data communication in
organizations, Transmission Media, Signaling, Communication protocols,
Communication architectures – ISO OSI Model, Transmission media, Network
connections (Data transmission modes, multiplexing), Network types (LAN, WAN,
MAN), LAN topologies, LAN MAC protocols, Routing and routing algorithms
(distance vector, link state, BGP), Basic router configurations and routing tables,
switching and switching devices. Spanning tree protocol. Configuration, operation, and
administration of PC-based LAN and WAN, troubleshooting a network. IP addressing
(IPv4 and IPv6). Network security, Accessing the WAN protocols-ATM, Frame Relay,
HDLC, PPP, PAP, CHAP, and broadband links. WAN traffic control and Access
Control Lists (ACL), Enterprise Network (NAT, DHCP, and troubleshooting),
Advanced Topics: VOIP, Telemetry.
Learning On completion of this course, the student will be able to:
Objectives 1. understand data communication concepts and principles,
2. interpret the layered architecture and protocols of computer networks
3. understand and interpret the relationship and migration between
communication types
4. understand the use of switching systems and their development,
5. understand different network types including the Internet,
6. an understanding of the integration of services and quality of service concepts
7. choose the appropriate communication media based on the requirements for the
specific network setup
8. configure computer networks and set subnets of different networks
9. Implement cryptographic concepts and techniques, to improve the security of
computer networks.
Specific Knowledge and Understanding
learning Having completed this module, you will be able to demonstrate knowledge and
outcomes understanding of:
Page 1 of 5
Fundamental concepts, terminology, and principles of data communication and
networks
the layered approach of data communication the OSI and TCP/IP network And
the function of each layer and devices that operate at each layer
computer network components such as switches hubs, bridges, and routers and
their function in a network
types of transmission media and their applications in different network setups
techniques used for congestion and data flow control in computer networks
transport Protocols Connection-Oriented Transport Protocol Mechanisms
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP
roles of data network management that include, Configuration Management,
Fault Management. Performance Management, Security Management, and
Accounting Management
network security concepts threats, attacks, vulnerabilities, and assets intruders
network security techniques use of VPNs Virtual private network and IPsec,
SSL and TLS, Wi-fi protected access, and Intrusion detection.
Subject-Specific Intellectual and Research Skills
Having completed this module you will be able to:
Gather, evaluate, and analyze relevant information from diverse sources,
including data communication and network publications, research papers, threat
intelligence reports, and security advisories.
Assess and analyze risk communication networks, and their applications,
including identifying vulnerabilities, prioritizing risks, and proposing risk
mitigation strategies.
Develop a mindset of continuous learning and adaptation in response to the
evolving field of computer networks, staying updated with the latest tools,
techniques, and countermeasures.
Subject-Specific Practical Skills
Having completed this module you will be able to:
setup and configure a local area network and implement security techniques on
the network
install inside wiring perform maintenance and troubleshooting of devices such
as switches and routers
configure and troubleshoot routing protocols such as BGP and OSPF
conduct vulnerability assessments and penetration testing activities to identify
and exploit vulnerabilities in networks, and application
design, connect, and configure virtual private networks for linked sites to
protect any confidential data from being compromised
manage and configure firewalls
Implement encryption, digital signatures, and secure key management.
Life Skills
Demonstrate ability to collectively contribute to group work by exhibiting
attributes of cooperation, sharing of responsibilities, commitment to group
objectives, leadership, planning, and organization
Apply critical thinking skills to solve problems presented in assignments
practicals and examinations
ability to communicate effectively to professionals and non-specialists alike
through reports and presentations
Use information technology to access and communicate information, evaluate
its relevance, and synthesize it with what is learned in class and out of class to
remain current and abreast of developments in the world
Page 2 of 5
Demonstrate attributes of punctuality, responsibility, integrity, organization,
application, and tolerance.
Ability to be innovative and contribute to industrialization
Module Content presentation
Day Topic Methodology Student Activities Lecture
employed Hours
1 Introduction Lecture Research on current trends 2Hrs
Basic Definitions in communication
Goals of networking networks and the
General classification of networks communication model
A communication model Group presentations
Network requirements
2 Data Transmission Lecture Real-world applications 2Hrs
Analog and Digital Data
Transmission
Transmission impairments
Channel Capacity
Signal encoding techniques
Assignment 1
3 Transmission media Lecture Physical identification of 2Hrs
Guided transmission media Demonstrations transmission media
Unguided Transmission media Group practical 1
(Wireless)
Line of sight transmission
4 Digital Data Communication Lecture Presentations 2Hrs
Techniques
Asynchronous and Synchronous
Transmission
Types of Errors
Error Detection and Correction
Data link control protocols
5 Multiplexing Lecture Presentations 2Hrs
Frequency division Videos
Time division
Spread spectrum
6 Switched Computer Network Lecture Presentations 2Hrs
Circuit Switching
Packet Switching
7 Congestion and Flow Control in Lecture 2Hrs
Data Networks Presentations
Effect of Congestion
Congestion control
Flow Control
8 Protocol Architecture -Lecture Presentations 2Hrs
The need for a protocol architecture Presentations
The OSI model
The TCP/IP protocol Architecture).
9 Internet Protocols -Lecture -Practical: on choosing 2Hrs
Principles of internetworking -Lab Addressing scheme and
Page 3 of 5
Internet Protocol Operation demonstration subnetting
Internet Protocol Cisco Packet Tracer
IP Addressing Scheme Practical Assignment 2
Subnet Addressing and Masking
10 Transport Protocols Lecture Presentations 2Hrs
Connection-Oriented Transport Discussions
Protocol Mechanisms
Connection-less Oriented Transport
Protocol Mechanisms
Transmission Control Protocol
(TCP)
User Datagram Protocol (UDP)
11 Network Management Discussion Group presentation 2Hrs
Configuration Management
Fault Management
Performance Management
Security Management
Accounting Management
12 Internetwork Operation. Lecture Group presentation 2Hrs
Multicasting
Routing Protocols
Mobile IP
13 Computer and network security Lecture Online Quiz (30Minutes) 2Hrs
Techniques
Virtual private network and IPsec
SSL and TLS
Wi-fi protected access
Intrusion detection
Firewalls
Week4 Examinations Examinations 3Hrs
Teaching and The module will be facilitated through lectures, assignments, directed self-study, group
learning discussions, and presentations while practical exercises, based on lecture material, will
strategies be given to students for their laboratory/practical sessions. The lecture delivery will be
enhanced by a variety of genres including, where appropriate, online videos, computer-
based models, and other multimedia approaches. Additional online videos are used
where this form of communication would be regarded as effective. Tutorials will be
used to help explain and elaborate on both the lecture material and the practical
exercises and provide opportunities for tutor-led formative feedback to students.
Problem-solving skills will be addressed through the use of a selected set of worked
examples from course textbooks and defined problems with worked solutions.
SUGGESTED STUDENT ACTIVITIES: i. Group presentations on any one topic
related to the subject ii. Prevent network breach simulations
SPECIAL INSTRUCTIONAL STRATEGIES: i. Give Internet-based assignments
on different aspects of cybersecurity to groups of students and ask them to submit
reports and present them in class.
Assessment Assessment will include;
strategies 1 Quiz(10%),
Group practical Report (10%),
Group practical assignment(10%),
Group presentation(10%),
Examination(60%).
Page 4 of 5
Student feedback on teaching, learning, and assessment will be sought at the end of the
semester through a module evaluation questionnaire.
Quality Moderation of assessments will be conducted according to general rules and guidelines
assurance on moderation. Periodic syllabus review to keep abreast with advancing new knowledge
arrangements and changes.
Computer Students are expected to use computers for practicals and conduct some out-of-class
Use: assignments.
Student -Access to Lecturer for consultations
support and -Online access to course material on CUT_ E-Portal, including online journals with the
learning assistance of the library. Information will be provided periodically on relevant
resources textbooks, internet resources, and other reading material
Recommended Reading:
1. Stallings, W., “Computer Networking with Internet Protocols and Technology”,
Prentice-Hall, 2004
2. Stallings, W., “Data and Computer Communications”, 9th Ed.,.
3. Halsall, F., "Data Communications, Computer Networks and Open Systems",
4th Ed., Addison-Wesley, 2010.
4. Halsall, F., “Computer Networking and the Internet”, Addison Wesley, 2005,
ISBN: 0-321-26358-8.
5. Kurose J.F., and Ross, K.W., “Computer Networking: A Top-Down Approach
Featuring The Internet”, 3rd Ed., Addison Wesley, 2014
6. Forouzan, B.A., “Data Communications and Networking”, McGraw-Hill, 2nd
Ed.
Academic Class Attendance: A student should attend not less than 75 % of the total hours of the
Integrity Module; otherwise he will not be able to sit for the examination and will have to repeat
the Module. If the student is absent due to illness, he/she should bring an approved
statement from the University Clinic or Doctor.
Punctuality: For late in attending the class, the student will initially get a verbal
warning. Repeated lateness in attending class thereafter will be considered as an
absence.
Assignments & Projects: The student has to submit all the assignments and report on
or before the due date for marking. Late submissions will be penalized.
Plagiarism: They will be deemed to have failed the Test/assignment or report/project
and will be awarded a zero
Page 5 of 5