Course Syllabus
CS 5550: Computer Networks
(Prerequisite: CS 2240 and CS 3310)
Spring Semester ‘13 |
Days: R |
Time: 6:00-8:30 p.m. |
Venue: CEAS D-204 |
Instructor: Dr. Ala Al-Fuqaha
Office: 4601 Campus Drive # A-238 |
Office Hours: R: 4 to 5 p.m. (or by appointment) |
|||
Telephone: (269) 276-3868 |
Fax: (269) 276-3122 |
E-mail: alfuqaha@cs.wmich.edu |
|
|
Course Description:
This course focuses on the principles of computer networking protocols and architectures with emphasis of the Internet. Students will learn about the technologies and protocols used in local and wide area networks. Special emphasis will be given to study the TCP/IP protocol suite and its underlying protocols and concepts including: HTTP, SMTP, POP, IMAP, DNS, P2P, UDP, TCP, error control, flow control, congestion control, network routing (static and dynamic), packet delays, Local Area Networks (Ethernet, Wi-Fi), confidentiality, integrity, authentication.
Textbook:
Course Outcomes:
1. Introduction to Networking (packet switching vs. circuit switching), the structure of the Internet, network performance, packet delays and losses, and the OSI reference model.
2. Application Protocols: DNS, SMTP, POP, IMAP, HTTP, P2P.
3. Transport Protocols: UDP, Internet Checksum algorithm, Principles of reliable data transfer, TCP, Flow Control and Congestion Control, Pipelined Protocols (Go-Back-N, Selective Repeat), TCP and UDP sockets.
4. Network Protocols: Internet Protocol (IPv4 and IPv6), static and dynamic routing.
5. Data Link Protocols: Ethernet and CSMA/CD, Wi-Fi and CSMA/CA.
6. Basics of network security: Confidentiality, Integrity and Authentication.
Performance Objectives:
1. Students will understand the basics of computer networks and the OSI reference model.
2. Students will describe and distinguish basic networking protocols and understand where each is useful and why.
3. Students will understand the operation of multi-access and point-to-point link layer technologies.
4. Students will understand the basics of the TCP/IP protocol suite and its widely used protocols.
5.
Students will experiment with protocol
analyzers (packet sniffers) to understand and analyze the operation of the
different TCP/IP protocols.
6.
Students will experiment with peer-to-peer
computing using the Seattle framework (GENI project).
7. Students will experiment with network routing (static and dynamic) and understand the process of implementing simple routed inter-networks.
8. Students will develop simple network programs in Java involving TCP and UDP sockets.
9. Students will have a basic understanding of network security and encryption protocols.
Grading Policy:
Assignments 15%
Quizzes 10%
Exam I (Tentative Date: Thursday, February 21st) 15%
Exam II (Tentative Date: Thursday, March 21st) 20%
Final Exam (Check University Schedule for Final Exams) 20%
Term Project 20%
Attendance
5%
105%
Normally, the standard thresholds for letter grades will be used. However, the thresholds may be lowered by as much as 10% depending of the class performance.
All exams, assignments, and other materials will be returned to the students in no more than two weeks from the date they are submitted.
Topics:
Week |
Topics |
Suggested Readings |
Week 1 |
Protocols, topology, circuit switching, packet switching, unreliable connectionless services, reliable connection oriented services |
Chapter 1 |
Week 2 |
Access networks, physical media, core networks, Internet Backbone, delay and loss in packet switched networks. |
Chapter 1 |
Week 3 |
Application Protocols: HTTP, SMTP, POP, IMAP |
Chapter 2 |
Week 4 |
DNS, P2P file sharing, TCP Sockets programming, UDP Sockets Programming. |
Chapter 2 |
Week 5 |
UDP, principles of reliable data transfer, TCP |
Chapter 3 |
Week 6 |
TCP flow control, principles of congestion control, TCP congestion control. |
Chapter 3 |
Week 7 |
IPv4, ICMP, Routing vs. forwarding, static routing, IPv6. |
Chapter 4 |
Week 8 |
Dynamic routing protocols (RIP, OSPF), link state vs. distance vector, interior vs. exterior routing protocols, BGP. |
Chapter 4 |
Week 9 |
Media access, error control, hubs and switches, ETHERNET, PPP. |
Chapter 5 |
Week 10 |
WI-FI (IEEE802.11), cellular networks. |
Chapter 6 |
Week 11 |
Confidentiality, Integrity, Authentication.
|
Chapter 9 |
Week 12 |
DES, public key encryption, PGP. |
Chapter 9
|
Week 13 |
Kerberos, SSL, IPSec |
Chapter 9
|
Week 14 |
Project Presentations & Demos |
-
|
(The order of covering some of the topics might change)
Guidelines for Submission of Assignments:
· All work must be submitted on, 81/2”X11” papers. Use only one type, size and color paper for each assignment. Please do not submit papers torn-off from the spiral notebooks.
· The material need not be typed unless otherwise specified. However, all work must be neat and easily readable.
· The solutions to the homework problems must be arranged sequentially. Each solution must be clearly labeled and separated from the previous and the next solution.
· If using pencil, please make sure that it produces easily readable contrast on paper.
· Assignments must be turned-in in the class before the start of the class on due dates. A late submission will not be accepted and will receive a grade of ‘zero’ unless a time extension is approved by the instructor in advance, or an emergency had occurred.
A submission not within the guidelines will not be accepted and will receive a grade of ‘zero’.
Other Important Notes:
· No discussion on assignments or course difficulties over telephone with the instructor.
· No questions will be answered on the date of a test/exam.
· Any disagreement with grading on tests must be pointed out immediately after the class period (in which graded papers are returned) with written arguments for your claim.
· A make-up test/exam can be given only when the student presents a valid reason for missing the test/exam.
Change of Enrollment Status Policy:
· Withdraws recorded as “W” on transcript: CHECK UNIVERSITY POLICY.
· Last day to withdraw from classes: CHECK UNIVERSITY POLICY.
Student Workload:
This is a combined lecture/discussion and programming/implementation course. Material will be presented by the instructor and students are expected to participate in class discussions. The students are also expected to engage in semester-long projects.
Academic Honesty:
You are responsible for
making yourself aware of and understanding the policies and procedures in the
Undergraduate (pp. 274-276) [Graduate (pp. 25-27)] Catalog that pertain to Academic Honesty. These policies include
cheating, fabrication, falsification and forgery, multiple submission,
plagiarism, complicity and computer misuse. If there is reason to believe you
have been involved in academic dishonesty, you will be referred to the Office
of Student Conduct. You will be given the opportunity to review the charge(s).
If you believe you are not responsible, you will have the opportunity for a
hearing. You should consult with me if you are uncertain about an issue of
academic honesty prior to the submission of an assignment or test.