CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central Florida Fall 2007 1 About my self Office: HEC 335 Tel: 407-823-5015 czou@cs.ucf.edu Office hour: Tuesday/Thursday 1pm – 3pm Course webpage: http://www.cs.ucf.edu/~czou/CDA4527 Graduated from Umass in Summer 2005 Research interests: Computer and network security Malware modeling, simulation, detection, defense denial-of-service attack, software security Other Internet security Network modeling, optimization and performance evaluation 2 What is this course about? Very few, very basic “analysis” (don’t be scared by the course’s official name) Introductory course in “computer networking” Focus on Internet architecture/protocols TCP/IP, 2 networking programming projects Several lab assignments (fun, real) Email (spam), Web. Ethernet, hub, wireless LAN One chapter on Internet security introduction Goals: Learn a lot (facts, principles and practice) Have fun (Use/apply/understand real world network immediately) 3 Student evaluation of this course Fall 2005 (18): Excellent-55%, Very good-18.2% Good-18.2%, Fair-9.1%, Poor-0% Fall 2006 (6): Excellent-76.7% Very good-21.7% Good-0%, Fair-1.7%, Poor-0% 4 Course information Prerequisites: Basic knowledge on Algorithms and Operating Systems C or C++ programming skills Basic usage of Linux Olympus account + my lab Linux for networking programming Course materials: Text: Computer Networking: A Top Down Approach Featuring the Internet, J. Kurose & K. Ross, Addison Wesley, 4rd ed., 2007 Textbook online resource (see first page) Class notes 5 Course information (more) Workload: Coursework approx amount written homeworks 3-4 programming (C) 2 (3?) lab assignments (Ethereal) 2-4 midterm exam 1 final exam 1 one-minute in-class paper ? approx % 15% 20% 10% 20% 30% 5% The final grade will use +/- policy, i.e., you may get A, A-, B+, B, B- … grade. 6 Course information (even more) In-class style: interaction, questions Real network programming (fun) Hands on experience: packet trace, email spam Flexible: Teaching difficulty/speed/contents based on your feedback So please tell me freely your thinking and interests! Academic honesty 7 A top-down approach: We’ll cover networking top-down End-system applications, end-end transport Network core: routing, hooking nets together local ISP regional ISP Link-level protocols, e.g., Ethernet Other interesting stuff: Security wireless company network 8 Course Overview: Part 1: Introduction (text: Chapter 1) What is the Internet? Application Web, Email, VOIP Application Transport TCP, UDP Transport Network IP Network Data Link Ethernet, cellular Data Link Physical link 9 Course Overview: Part 2: Application Layer (text: Ch. 2) Principles of application-layer protocols World Wide Web: HTTP File transfer: FTP Electronic mail: Email The Internet's directory service: DNS VOIP (Voice Over IP) Socket programming PROGRAMMING ASSIGNMENT 1 10 Course Overview: Part 3: Transport Layer (text Ch. 3) Transport-layer services and principles Multiplexing and demultiplexing applications Connectionless transport: UDP Principles of reliable of data transfer TCP case study PROGRAMMING ASSIGNMENT 2 Principles of congestion control TCP congestion control 11 Course Overview: Part 4: Network Layer (text: Ch. 4) introduction and network service model what’s inside a router? routing principles (algorithms) hierarchical routing IP: the Internet Protocol Internet routing: RIP, OSPF, BGP 12 Course Overview: Part 5: Link Layer, Local Area Networks (text: Ch. 5) introduction, services error detection, correction multiple access protocols, LANs LAN addresses, ARP Ethernet 13 Course Overview: Part 6: Wireless and Mobile Networks (Ch 6) wireless link characteristics the wireless link: 802.11 cellular Internet access Mobility principles mobility in practice: mobile IP mobility in cellular networks Sensor network, vehicular network introduction 14 Course Overview: Part 7: Network Security (text: Ch. 8) what is network security? Introduction of cryptography authentication: Who are you? integrity key distribution, certification Internet security hot topics: Malware attacks, denial-of-service attacks, countermeasures Secure email, firewall, honeypot, botnet 15