CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst"

Transcription

1 CMPSCI 453 Computer Networking Professor V. Arun Department of Computer Science University of Massachusetts Amherst 1

2 What is this course about? introductory (first) course in computer networking q learn principles of computer networking q learn practice of computer networking q Internet architecture/protocols as case study v by the time you are finished Goals: q learn a lot (not just factoids, but principles and practice) q have fun! (learn how to spoof mail, sniff network traffic, write cool network apps, and more) 2

3 Course information q introductory (first) course in computer networking q who is this course for? v undergrads, MS students q prerequisites: v algorithms, operating systems, programming skills q course materials: v Text: Computer Networking: A Top Down Approach Featuring the Internet, J. Kurose & K. Ross, Addison Wesley, 6 th ed., 2012 v Lecture notes, additional reading, and videos posted on class site 3

4 Course information (more) Make sure you can access both TODAY! q Class site: q Moodle (accessible with a UMass OIT account) q Class discussions: Piazza (sign up with any address) q Course material (except solutions) also openly accessible at: q Everything posted on class site: syllabus, TA info, lecture slides (powerpoint, pdf), assignments, old exams, etc. nothing except exams will be handed out in class :-) 4

5 Course information (more) q workload: Coursework approx amount approx % written homeworks % programming (any language) 2 20% lab assignments (Wireshark) 5 15% Midterm 15% Final 25% Class participation up to 15% q iclicker required for class participation starting next week. Get one and register on the Moodle site THIS WEEK 5

6 Course information (even more) Odd and ends q me q in-class style: interactive, ask questions! q incomplete policy: None q academic honesty: required reading at this URL q q getting into this course questions, comments,??? 6

7 Course Overview: Part 1: Introduction (2 classes, text: Chapter 1) q what is the Internet, What is a protocol? q network edge, network core, network access q physical media q delay, loss in packet-switched networks q protocol layers, service models q Internet backbones, NAPs and ISPs q brief history of networking, Internet 7

8 A top-down approach: We ll cover networking top-down q end-system applications q transport: TCP/UDP q network core: routing, hooking nets together q link-level protocols, e.g., Ethernet q other stuff: security, mobility, management, 8

9 Course Overview: Part 2: Application Layer (4 classes, text: Ch. 2) q principles of application-layer protocols q World Wide Web: HTTP q file transfer: FTP q electronic mail in the Internet q the Internet's directory service: DNS q socket programming PROGRAMMING ASSIGNMENT 1 9

10 Course Overview: Part 3: Transport Layer (6 classes, text Ch. 3) q Transport-layer services and principles q Multiplexing and demultiplexing applications q Connectionless transport: UDP q Principles of reliable of data transfer q TCP case study PROGRAMMING ASSIGNMENT 2 q Principles of congestion control q TCP congestion control MIDTERM EXAM (approx) 10

11 Course Overview: Part 4: Network Layer (5 classes, text: Ch. 4) q introduction and network service model q what s inside a router? q routing principles (algorithms) q hierarchical routing q IP: the Internet Protocol q Internet routing: RIP, OSPF, BGP 11

12 Course Overview: Part 5: Link Layer, LANs (4 classes, text: Ch. 5) q introduction, services q error detection, correction q multiple access protocols, LANs q LAN addresses, ARP q Ethernet 12

13 Course Overview: Part 6: Wireless and Mobile Networks (3 classes, Ch 6) q wireless link characteristics q the wireless link: v v cellular Internet access v mobility principles v mobility in practice: v mobile IP v mobility in cellular networks 13

14 Course Overview: Part 7: Network Security (3 classes, text: Ch. 7) q what is network security? q principles of cryptography q authentication: Who are you? q integrity q key distribution, certification q firewalls q attacks, countermeasures q case studies: secure , SSL, IPsec,

15 End of course overview /* */? 15

CS 5480 Computer Networks

CS 5480 Computer Networks CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks

More information

e-book Computer Networking A Top-Down Approach Featuring the Internet James F. Kurose and Keith W. Ross 2001 Pearson Education Inc.

e-book Computer Networking A Top-Down Approach Featuring the Internet James F. Kurose and Keith W. Ross 2001 Pearson Education Inc. Computer Engineering Dept., IUST, analoui@iust.ac.ir e-book Computer Networking A Top-Down Approach Featuring the Internet James F. Kurose and Keith W. Ross 2001 Pearson Education Inc. Table of Contents

More information

CDA 4504 -- Introduction to Computer Networks

CDA 4504 -- Introduction to Computer Networks CDA 4504 -- Introduction to Computer Networks [Description] [Prereqs] [Textbooks] [Contents] [Slides] [Assignments] [Grading] [Admin Info] [Submission] [Academic Integrity] Course Description and Goals

More information

Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses

More information

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON. ;. ' ;. - ' Computer Networking ^4 Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic University, Brooklyn PEARSON Addison Weslev Boston San Francisco N e

More information

CSE 3214: Computer Network Protocols and Applications

CSE 3214: Computer Network Protocols and Applications CSE 3214: Computer Network Protocols and Applications 1 Course Web-Page: Instructor: http://www.eecs.yorku.ca/course/3214/ (all lecture notes will be posted on this page) Natalija Vlajic (vlajic@cse.yorku.ca)

More information

Tele3119 Trusted Networks Course Outline 2013

Tele3119 Trusted Networks Course Outline 2013 Tele3119 Trusted Networks Course Outline 2013 Staff Contact: A/Prof Robert Malaney, Email: r.malaney@unsw.edu.au Course Aim The main aim of this course is to develop a solid understanding of the key concepts

More information

CPSC 4550 Computer Networks Fall 2012, Section 0

CPSC 4550 Computer Networks Fall 2012, Section 0 CPSC 4550 Computer Networks Fall 2012, Section 0 Course: CPSC4550, Section 0, CRN 42534 Title: Computer Networks Class Schedule: Classroom-Internet, Time-Internet Credit: 3 Faculty: Dr. Li Yang Office:

More information

CS 5490/6490: Network Security Fall 2015

CS 5490/6490: Network Security Fall 2015 CS 5490/6490: Network Security Fall 2015 Professor Sneha Kumar Kasera School of Computing 1 What is this course about? Comprehensive introduction to network security Ø learn principles of network security

More information

CSCD 330 Network Programming Winter 2015. Lecture 1 - Course Details

CSCD 330 Network Programming Winter 2015. Lecture 1 - Course Details CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details Contact Information Instructor: Carol Taylor 319A CEB Phone: 509-359-6065 E-mail: ctaylor4214@comcast.net Course: CSCD330, CEB 204 Lecture,

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

Computer Network Architecture

Computer Network Architecture Computer Network Architecture ECE 156 Fall 2007 Romit Roy Choudhury Dept. of ECE and CS 1 Course Logistics 2 Welcome to ECE 156 Timings: Location: Course TA: Tu/Thu 1:15pm to 2:30pm 212 Engineering TBA

More information

T/A/Mentors Office and Office Hours: Check the Staff Information Page on class site

T/A/Mentors Office and Office Hours: Check the Staff Information Page on class site University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00

More information

Chapter 1: Introduction

Chapter 1: Introduction Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course

More information

CSE 473s Introduction to Computer Networks

CSE 473s Introduction to Computer Networks CSE 473s Introduction to Computer Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)

More information

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Chapter 1: Introduction

Chapter 1: Introduction Course Summary What have we learned: a huge amount! principles practice.. using Internet to motivate examples 1 Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course

More information

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015 San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015 Course and Contact Information Instructor: Dr. Rod Fatoohi Office

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Final Review Stefan Savage Final Mechanics Will cover entire year of material (but likely with some bias to the material post-midterm) Based on lecture material,

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Communication Networks MAP-TELE 2012/13

Communication Networks MAP-TELE 2012/13 Communication Networks MAP-TELE 2012/13 Objective of the course The main objective of the course is to present the fundamentals of modern communication systems and networks and allow students to consolidate

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers. Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might

More information

Architecture and Performance of the Internet

Architecture and Performance of the Internet SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

More information

In what follows, we discuss the course overview, grading, books, weekly schedule, laboratory assignments and group projects.

In what follows, we discuss the course overview, grading, books, weekly schedule, laboratory assignments and group projects. Computer Science 78 Computer Networks or hacking the network, part II In what follows, we discuss the course overview, grading, books, weekly schedule, laboratory assignments and group projects. Course

More information

Chapter 8 Network Security

Chapter 8 Network Security [Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Chapter 32 Internet Security

Chapter 32 Internet Security Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3

More information

Computer System Design: Laws, Principles, Trends - II

Computer System Design: Laws, Principles, Trends - II Computer System Design: Laws, Principles, Trends - II Presenter: Sandeep K. S. Gupta Reference: -Computer Networking: A Top-Down Approach, 5ed, Ross and Kurose. -Computer Organization and Design: The Hardware/Software

More information

CSCI 491-01 Topics: Internet Programming Fall 2008

CSCI 491-01 Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication

More information

Department of Electrical Engineering and Computer Science College of Engineering. Course Description

Department of Electrical Engineering and Computer Science College of Engineering. Course Description Department of Electrical Engineering and Computer Science College of Engineering COURSE SYLLABUS CSEN 5323 Computer Communication Networks Fall 2014 Credits 3 HRS Sec 2: TR 5:00-6:15pm ENGC 138 Instructor

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

The Internet. Internet Technologies and Applications

The Internet. Internet Technologies and Applications The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Protocol Rollback and Network Security

Protocol Rollback and Network Security CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,

More information

Kick starting science...

Kick starting science... Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

CS2107 Introduction to Information and System Security (Slid. (Slide set 8) Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren

Lecture 1: Course Introduction CSE 222A: Computer Communication Networks Alex C. Snoeren Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren Lecture 1 Overview" Class overview Expected outcomes Structure of the course Policies and procedures A brief review

More information

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,

More information

CS 4803 Computer and Network Security

CS 4803 Computer and Network Security Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and

More information

IOS NAT Load Balancing for Two ISP Connections

IOS NAT Load Balancing for Two ISP Connections IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot

More information

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Prefix COMP Course# 429 Title Computer Networks Units (3) 3 hours lecture per week 3 hours lecture per week

Prefix COMP Course# 429 Title Computer Networks Units (3) 3 hours lecture per week 3 hours lecture per week CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2010, to make the next catalog (2011-12) production DATE (CHANGE DATE EACH TIME REVISED):

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram

More information

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL Courses must be submitted by October 15, 2013, and finalized by the end of the fall semester to make the next catalog (2014-15)

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor shray.kapoor@gmail.com Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

COSC4377. Chapter 8 roadmap

COSC4377. Chapter 8 roadmap Lecture 28 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7

More information

Layered protocol (service) architecture

Layered protocol (service) architecture Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure

More information

Information and Network Security Certificate Program

Information and Network Security Certificate Program Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly

More information

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Goals of This Course v Be familiar with Fundamental network topics Some advanced topics State-of-the-art

More information

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

More information

Security Topics in Networking and Distributed Systems CS 590D

Security Topics in Networking and Distributed Systems CS 590D Security Topics in Networking and Distributed Systems CS 590D Lecture 1 Department of Computer Sciences Purdue University Cristina Nita-Rotaru Spring 2004/Lecture1 1 Course Information Meetings Tu&Th 1:30-2:45

More information

CSCI-1680 :: Computer Networks

CSCI-1680 :: Computer Networks CSCI-1680 :: Computer Networks Rodrigo Fonseca (rfonseca) http://www.cs.brown.edu/courses/cs168! cs168tas@cs.brown.edu! Based partly on lecture notes by David Mazières, Phil Levis, John Janno

More information

... Lecture 10. Network Security I. Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg

... Lecture 10. Network Security I. Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg Lecture 10 Network Security I Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg T-Mobile Chair of Mobile Business & Multilateral Security Goethe University Frankfurt a. M. Introduction

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th ECE/CS 372 introduction to computer networks Lecture 2 Announcements: Please make sure to check the course s website on a regular basis http://web.engr.oregonstate.edu/~sinkyha/cs372 Midterm scheduled

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Wireshark Lab: Assignment 1w (Optional)

Wireshark Lab: Assignment 1w (Optional) Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved Wireshark Lab: Assignment 1w (Optional) One s understanding

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Repetition inför tentan. Kommunikation. Infrastruktur. ÖP 13-17 Inga hjälpmedel. v v v

Repetition inför tentan. Kommunikation. Infrastruktur. ÖP 13-17 Inga hjälpmedel. v v v Repetition inför tentan v v v ÖP 13-17 Inga hjälpmedel Kommunikation Infrastruktur 1 Skalbarhet När det inte går bra Organisation 2 Illvilja Repetition inför tentan Tentan hur kommer den att bli? 13-17

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1

TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1 TCIPG Reading Group Introduction to Computer Networks Based on: Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison- Wesley, July 2007. Introduction 1-1 Chapter 1: Introduction

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1 NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined

More information

CS 3251: Computer Networking 1 Security Protocols I

CS 3251: Computer Networking 1 Security Protocols I Georgia Tech CS 3251: Computer Networking 1 Security Protocols I Brad Reaves, PhD Student 11/21/13 (slides from Prof. Patrick Traynor) CS 3251 - Computer Networks I Last Time Trying to prove who you are

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Instructor: Michael J. May. Semester 1 of 5774

Instructor: Michael J. May. Semester 1 of 5774 Syllabus for SE 14-428: Advanced Computer Networks Department of Software Engineering Achi Racov School of Engineering Kinneret College on the Sea of Galilee Instructor: Michael J. May Semester 1 of 5774

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

Introduction. Computer Networking. Prof. Andrzej Duda duda@imag.fr. http://duda.imag.fr

Introduction. Computer Networking. Prof. Andrzej Duda duda@imag.fr. http://duda.imag.fr Computer Networking Introduction Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 1 Course goals Understand TCP/IP and networking concepts Approach bottom-up, descriptive, use Internet as an example

More information

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems Course Name: Linux Server Administration Course Code: PGDNA121 To understand the basic principles underlying Server Software Planning and Deploying Linux Server Manage the Servers Efficiently Fundamentals

More information

CSci 4211: Data Communications and Computer Networks. Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits

CSci 4211: Data Communications and Computer Networks. Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits CSci 4211: Data Communications and Computer Networks Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits 1 Instructor David Hung-Chang Du Email: du@cs.umn.edu Office:

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All

More information

S-38.192 ITGuru Excercise (Overview)

S-38.192 ITGuru Excercise (Overview) S-38.192 ITGuru Excercise (Overview) Introduction This exercise will teach you how to construct and simulate large networks with ITGuru simulation tool. You have already got an idea of what can be done

More information

VLAN und MPLS, Firewall und NAT,

VLAN und MPLS, Firewall und NAT, Internet-Technologien (CS262) VLAN und MPLS, Firewall und NAT, 15.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6-1 Wiederholung Unterschied CSMA/CD und CSMA/CA? Was

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information