Upload
truongdang
View
230
Download
0
Embed Size (px)
Citation preview
1
CMPSCI 453 Computer Networking
Professor V. Arun Department of Computer Science
University of Massachusetts Amherst
2
What is this course about? introductory (first) course in computer networking q learn principles of computer networking q learn practice of computer networking q Internet architecture/protocols as case study
v by the time you are finished ……
Goals: q learn a lot (not just factoids, but principles and
practice) q have fun! (learn how to spoof mail, sniff network
traffic, write cool network apps, and more)
3
Course information q introductory (first) course in computer networking q who is this course for?
v undergrads, MS students q prerequisites:
v algorithms, operating systems, programming skills
q course materials: v Text: Computer Networking: A Top Down
Approach Featuring the Internet, J. Kurose & K. Ross, Addison Wesley, 6th ed., 2012
v Lecture notes, additional reading, and videos posted on class site
4
Course information (more)
q Class site: q Moodle (accessible with a UMass OIT account) q Class discussions: Piazza (sign up with any email address) q Course material (except solutions) also openly accessible at:
http://www.cs.umass.edu/~arun/cs453
Make sure you can access both TODAY!
q Everything posted on class site: syllabus, TA info, lecture slides (powerpoint, pdf), assignments, old exams, etc.
nothing except exams will be handed out in class :-)
5
Course information (more)
Coursework approx amount approx % written homeworks 5-6 25% programming (any language) 2 20% lab assignments (Wireshark) 5 15% Midterm 15% Final 25% Class participation up to 15%
q workload:
q iClicker required for class participation starting next week. Get one and register on the Moodle site THIS WEEK
6
Course information (even more)
Odd and ends… q me q in-class style: interactive, ask questions! q incomplete policy: None q academic honesty: required reading at this URL
q http://www.umass.edu/dean_students/codeofconduct/acadhonesty/
q getting into this course…
questions, comments, … ???
7
Course Overview:
Part 1: Introduction (2 classes, text: Chapter 1) q what is the Internet, What is a protocol? q network edge, network core, network access q physical media q delay, loss in packet-switched networks q protocol layers, service models q Internet backbones, NAPs and ISPs q brief history of networking, Internet
8
A top-down approach: We’ll cover networking
top-down q end-system applications
q network core: routing, hooking nets together
q link-level protocols, e.g., Ethernet
q other stuff: security, mobility, management,
q transport: TCP/UDP
9
Course Overview:
Part 2: Application Layer (4 classes, text: Ch. 2) q principles of application-layer protocols q World Wide Web: HTTP q file transfer: FTP q electronic mail in the Internet q the Internet's directory service: DNS q socket programming PROGRAMMING ASSIGNMENT 1
10
Course Overview:
Part 3: Transport Layer (6 classes, text Ch. 3) q Transport-layer services and principles q Multiplexing and demultiplexing applications q Connectionless transport: UDP q Principles of reliable of data transfer q TCP case study PROGRAMMING ASSIGNMENT 2 q Principles of congestion control q TCP congestion control
MIDTERM EXAM (approx)
11
Course Overview:
Part 4: Network Layer (5 classes, text: Ch. 4) q introduction and network service model q what’s inside a router? q routing principles (algorithms) q hierarchical routing q IP: the Internet Protocol q Internet routing: RIP, OSPF, BGP
12
Course Overview: Part 5: Link Layer, LANs (4 classes, text: Ch. 5) q introduction, services q error detection, correction q multiple access protocols, LANs q LAN addresses, ARP q Ethernet
13
Course Overview: Part 6: Wireless and Mobile Networks (3
classes, Ch 6) q wireless link characteristics q the wireless link:
v 802.11 v cellular Internet access v mobility principles
v mobility in practice: v mobile IP v mobility in cellular networks
14
Course Overview: Part 7: Network Security (3 classes, text: Ch. 7) q what is network security? q principles of cryptography q authentication: Who are you? q integrity q key distribution, certification q firewalls q attacks, countermeasures q case studies: secure e-mail, SSL, IPsec, 802.11