CS 5550: Computer Networks (Spring 2013)

IMPORTANT ANNOUNCEMENTS:

*     





Date

Topics

Readings

Remarks

 

*      Overview, goals, syllabus, project, logistics

*      Course Syllabus

*      Sample Projects

 

Chapter 1

-

 

*      Introduction to Network Protocols, The Internet, Edge and Core Networks, Nuts and Bolts of the Internet, Client-Server, Peer-to-Peer, Connection-Oriented, and Connectionless Services.

 

Chapter 1

-

 

*      Continue with Circuit Switching: TDM, FDM; Packet Switching: Datagram Networks, Virtual Circuit Switching; Packet Loss and Latency

 

Chapter 1

-

 

 

*      Access Networks: Dialup Modems, ADSL, Cable Modem, ETHERNET, WIFI (IEEE802.11b/g), Cellular Networks. Physical Media: Twisted Pair, Coaxial cable, fiber optic cables, radio channels.

 

Chapter 1

-

 

*      Internet structure and ISPs, packet loss and delay in packet switched networks. TCP/IP protocol suites, protocol layers.

 

Chapter 1

-

 

 

Description: *      OSI Reference Model, TCP/IP Protocol Suite, Encapsulation, Link Layer addressing, IP addresses, port numbers.

Description: *      Network Reference Models: OSI and TCP/IP.

 

Chapter 1

-

 

Description: *      Web: Hyper Text Transfer Protocol (HTTP)

Description: *      Cookies and Web caching (web proxies)

 

Chapter 2

-

 

Description: *      Continue with HTTP, Cookies and Web Proxies.

Description: *      File Transfer Protocol (FTP)

 

Chapter 2

-

 

Description: *      Email: Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), and Internet Mail Access Protocol (IMAP)

Description: *      Detailed discussion of how Local Area Networks (LANs) work. The role of the Address Resolution Protocol (ARP) and the Domain Name System (DNS).

 

Chapter 2

-

 

Description: *      Domain Name System (DNS)

Description: *      Demo of ETHEREAL

Description: *      http://www.dnsstuff.com

 

Chapter 2

-

 

Description: *      Peer-2-peer File Sharing (P2P)

Description: *      BitTorrent vs. Napster vs. Gnutells vs. KaZaA vs. CHORD

 

Chapter 2

-

 

Description: *      BitTorrent vs. Napster vs. Gnutells Vs. KaZaA  vs. CHORD

Description: *      UDP Sockets Programming

 

Chapter 2

-

 

Description: *      WireShark: Network traffic sniffing tool

Description: *      TCP Sockets Programming

Description: *      Review Chapters 1 & 2

 

 

Finish

Chapter 2

-

 

*      White Paper: Virtualization Overview

*      Virtualization Technology Under the Hood

*      Seattle Overview (p2p Computing)

*      Seattle: Open Peer-to-Peer Computing Platform

 

IMPORTANT READING

 

 

Description: *  Transport Layer Protocols: Connection-oriented vs. connectionless, multiplexing/de-multiplexing.

*      User Datagram Protocol (UDP).

*      Principles of Implementing Reliable Data Transfer Protocols

 

Chapter 3

-

 

*      Continue with Principles of Reliable Data Transfer

*      Go Back N and Selective Repeat

*      Performance of Pipelined Transport Protocols

 

Chapter 3

-

 

*      Transmission Control Protocol (TCP)

*      TCP Flow Control

 

Chapter 3

-

 

*      Continue with TCP Flow Control

*      TCP Connection Management (establishment and termination)

 

Chapter 3

-

 

*      Principles of Congestion Control

*      TCP Congestion Control

 

Chapter 3

-

 

*      Review of Transport Layer Protocols (UDP, TCP)

 

Chapter 3

-

 

*      Network Layer (IP Protocol)

 

Sections 4.1, 4.3, 4.4

-

 

*      Continue with IP Addressing, Subnetting, IP Fragmentation

*      IP Protocol Header

*      Network Address Translation (NAT)

 

Section 4.4

-

 

*      Internet Control Message Protocol (ICMP)

 

Section 4.4

-

 

*      Continue with the IP protocol

 

Section 4.4

-

 

*      Routing in Practice

 

Section 4.4

-

 

*      Link Layer Protocols: Medium Access Control (MAC), Ethernet, Wi-Fi, data Link Layer Addressing, and link layer Error Control (CRC)

*      Course Evaluation

 

Sections 5.4 & 5.5, and 5.6

-

 

*      Link Layer Encapsulation: Ethernet and PPP

*      Link Layer Error Control, Switches Vs. Hubs, Self-Learning Algorithm of Switches

 

Sections 5.4 & 5.5, and 5.6

-

 

*      Security Overview: Confidentiality, Integrity, Authentication

*      Symetric and Asymetric keys

*      Key Distribution

 

Chapter 8

-

 

*      Project Presentations

 

-

-

Ala Al-Fuqaha
ala.al-fuqaha AT wmich DOT edu