CS 5480 Computer Networks



Similar documents
CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

CDA Introduction to Computer Networks

CS 5490/6490: Network Security Fall 2015

Address Resolution Protocol (ARP)

Chapter 1: Introduction

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

CPSC 4550 Computer Networks Fall 2012, Section 0

Computer Networks and the Internet

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

CSE 3214: Computer Network Protocols and Applications

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

IT4405 Computer Networks (Compulsory)

CSE 473s Introduction to Computer Networks

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSCD 330 Network Programming Winter Lecture 1 - Course Details

Computer Network Architecture

CS 464/564 Networked Systems Security SYLLABUS

CSci 4211: Data Communications and Computer Networks. Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits

CSC4290: Introduction to Computer Networking. Hongwei Zhang

Principles of Network Applications. Dr. Philip Cannata

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Instructor: Michael J. May. Semester 1 of 5774

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

BCIS BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016

CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Tele3119 Trusted Networks Course Outline 2013

Communication Networks MAP-TELE 2012/13

10CS64: COMPUTER NETWORKS - II

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Architecture and Performance of the Internet

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Transport and Network Layer

Ethernet. Ethernet. Network Devices

CSCI Topics: Internet Programming Fall 2008

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Chapter 1 Personal Computer Hardware hours

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Review: Lecture 1 - Internet History

TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1

Advanced Internetworking

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren

Rivier College Syllabus CS575A Advanced Networks

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Networking Technology Online Course Outline

CompTIA Network+ (Exam N10-005)

Advanced Higher Computing. Computer Networks. Homework Sheets

CSE 123b Communications Software

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. January 11 CMSC417 Set 1 1

Introduction to Networks and the Internet

SIP, Session Initiation Protocol used in VoIP

COS 461: Computer Networks

OCR LEVEL 3 CAMBRIDGE TECHNICAL

CSE 571S: Network Security CSE571S

Unix System Administration

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

SSVP SIP School VoIP Professional Certification

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547

Network Technology CMP-354-TE. TECEP Test Description

Networking Basics and Network Security

Communications and Networking

This course has been retired. View the schedule of current <a href=

COMPUTER NETWORK TECHNOLOGY (300)

New York City College of Technology Computer Systems Technology Department

Chapter 8 Security Pt 2

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

EDA Training Programs. Catalog of Course Descriptions

Communication Systems Internetworking (Bridges & Co)

CSE 571S: Network Security CSE571S

Chapter 8 Network Security

THE UNIVERSITY OF HONG KONG

What is this Course All About

SSVVP SIP School VVoIP Professional Certification

File Transfer Protocol (FTP) & SSH

ICTTEN8195B Evaluate and apply network security

Overview of Computer Networks

Protocols. Packets. What's in an IP packet

B.Sc. (Computer Science) First Year

Computer Networks & Security 2014/2015

Boston University MET CS 690. Network Security

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Transcription:

CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks (since 1989) mobile and pervasive systems, wireless networks network security overload control multicast measurement, modeling, inferencing 2 1

What is this course about? Comprehensive introduction to computer networks learn principles of computer networking learn practice of computer networking Internet architecture/protocols as case study Goals: learn a lot (not just factoids, but principles and practice) have fun (well, it should be interesting, at least) 3 Course Information Who is this course for? Undergrads/Grads Prerequisites: good programming skills, some knowledge of Unix (or Unix -like) operating system Course materials: text: Computer Networking: A Top Down Approach, 5 th Edition, Jim Kurose & Keith Ross, Addison Wesley, 2009 class notes (modified version of slides provided by Jim Kurose & Keith Ross) cs6480 additional reading material 4 2

Course Information (more) Class WWW site: important piece of info! www.eng.utah.edu/~cs5480 everything will be posted on this site! syllabus TA info class notes (pdf) assignments nothing will be handed out in class :-) 5 Course Information (more) Mailing Lists: cs5480@list.eng.utah.edu: announcements & discussions join by going to http://sympa.eng.utah.edu teach-cs5480: do not join, use only for questions to Prof & TA Workload: Coursework approx approx % written homeworks 4 25% programming ass n 3 25% midterm 25% final exam 25% 6 3

Course Information (more) Cheating: read, sign, and return the CS5480 cheating policy document TA: Hema Bhatia TA s Office hours: Wednesday 11:30 AM 1:00 PM Professor s office hours: Tuesday 10:30-11:30 AM in 3408 MEB ask questions by sending email to the mailing lists 7 Course Information (more) Approximate Grading guidelines: 90-100 A 80-89 A- 70-79 B-, B, B+ 60-69 C-, C, C+ 50-59 D-, D, D+ < 50 (or caught cheating) E The ranges as well as the thresholds will be shifted/changed depending on the overall performance of the class in tests, homeworks, and programming assignments in-class style: interaction, questions (please!) students are not expected to read class notes in advance Questions, comments,??? 8 4

Cellular" Access Network" Public Switched Telephone Network" voice" Home Network" Wireless" LAN" data" Gateway" Control Network" (e.g., Smart Grid)" Mobile" Adhoc" Network" Internet" Sensor" Network" GIG" Various Intranets" Course Overview: Part 1: Introduction (2 classes, text: Chapter 1) What is the Internet, what is a protocol? Network edge, network core, network access Delay, loss in packet-switched networks Protocol layers, service models, security 10 5

A top-down approach: We ll cover networking top -down end-system applications, end-end transport network core: routing, hooking nets together link-level protocols, e.g., Ethernet other stuff: security, management, multimedia 11 Course Overview: Part 2: Application Layer (2-3 classes, text: Ch. 2) Principles of network applications Web & HTTP File transfer: FTP Electronic mail in the Internet The Internet's directory service: DNS P2P File Sharing Socket programming 12 6

Course Overview: Part 3: Transport Layer (3-4 classes, text Ch. 3) Transport-layer services and principles Multiplexing and demultiplexing applications Connectionless transport: UDP Principles of reliable data transfer TCP case study Principles of congestion control TCP congestion control 13 Course Overview: Part 4: Network Layer (4 classes, text: Ch. 4) Network service model Routing principles Hierarchical routing IP: the Internet Protocol Routing in the Internet What s inside a router? MIDTERM EXAM 14 7

Course Overview: Part 5: Link Layer, LANs (3 classes, text: Ch. 5) Introduction, services Error detection, correction Multiple access protocols, LANs LAN addresses, ARP Ethernet Hubs, bridges, switches ATM networks & MPLS 15 Course Overview: Part 6: Wireless & Mobile Networks (2 classes, text Ch. 6) Wireless links, characteristics IEEE 802.11 wireless LANs Cellular Internet Access Mobility: Principles, addressing and routing to mobile users Mobile IP Mobility in cellular networks Mobility and higher layer protocols 16 8

Course Overview: Part 7: Network Security (3 classes, text: Ch. 8) What is network security? Principles of cryptography Authentication: Who are you? Integrity Key distribution, certification Firewalls Attacks, counter-measures Case studies: secure e-mail, SSL, IPsec, 802.11 WEP 17 Course Overview: Part 8: Multimedia Networking (as much as possible, text: Ch. 7) Multimedia Networking Applications Streaming Stored Audio and Video Making the Best of the Best-Effort Service Beyond Best Effort Scheduling and Policing Mechanisms Integrated & Differentiated Services RSVP FINAL EXAM 18 9

I keep six honest serving men. They taught me all I knew. Their names are What and Why and When and How and Where and Who. -- Rudyard Kipling 19 10