intro

advertisement
CNT 4704
Analysis of Computer
Communication Networks
Cliff Zou
Department of Electrical Engineering
and Computer Science
University of Central Florida
Fall 2015
1
About my self
 Office: HEC 243
 Tel: 407-823-5015
czou@cs.ucf.edu
 Office hour:Monday/Wednesday 10:15pm – 11:45pm
 Course webpage:
http://www.cs.ucf.edu/~czou/CNT4704-15
 UCF Panopto for online lecture video streaming


Webcourse has a link and Syllabus
Each lecture will be posted several hours after a class
 Use Webcourse@UCF for homework assignment
and grading



Keeping grade private
Easy homework submission
Having a simple BBS channel
2
What is this course about?



Basic “analysis” (don’t be scared by the course’s
official name)
Introductory course in “computer networking”
Focus on Internet architecture/protocols





TCP/IP, 2 networking programming projects
Several lab assignments (fun, real)
Email (spam), Web. Ethernet, hub, wireless LAN
One chapter on Internet security introduction
Newly added content (not in textbook):


Cellular and mobile technologies
Wireless security
3
Course information

Prerequisites:



Basic knowledge on Algorithms and Operating Systems
C or C++ programming skills
Basic usage of Linux


Eustics account for networking programming
Course materials:




Text: Computer Networking: A Top Down
Approach Featuring the Internet, J.
Kurose & K. Ross, Addison Wesley, 6th ed.,
2013
Previous editions (4th,5th) would also be
fine
Textbook online resource (see first page)
Class notes
4
Course information (more)
 Workload:
Coursework
Approximate amount
approximate percentage
Written homework
2
24%
Programming projects
2
26%
Lab assignments
3
21%
Midterm exam
1
14%
Final exam
1
15%
The final grade will use +/- policy, i.e., you may get A, A-, B+,
B, B- … grade.
Because this class has online session, the two exams are open
book and similar to all regular homework assignments, except
that they have a 24-hour submission constraint.
5
Course information (even more)
 In-class style: interaction, questions
 Real network programming (fun)
 Hands on experience: packet trace, email spam, Wifi
attack…
 Flexible:
 Teaching difficulty/speed/contents based on your feedback
 So please tell me freely your thinking and interests!
 Academic honesty
6
A top-down approach:
We’ll cover networking
top-down
 End-system applications,
end-end transport
 Network core: routing,
hooking nets together
local ISP
regional ISP
 Link-level protocols, e.g.,
Ethernet
 Other interesting stuff:
 Security
 wireless
company network
7
Course Overview:
Part 1: Introduction (text: Chapter 1)
 What is the Internet?
Application
Web, Email, VOIP
Application
Transport
TCP, UDP
Transport
Network
IP
Network
Data Link
Ethernet, cellular
Data Link
Physical link
8
Course Overview:
Part 2: Application Layer (text: Ch. 2)
 Principles of application-layer protocols
 World Wide Web: HTTP
 Electronic mail: Email
 The Internet's directory service: DNS
 Socket programming
PROGRAMMING ASSIGNMENT 1
9
Course Overview:
Part 3: Transport Layer (text Ch. 3)
 Transport-layer services and principles
 Connectionless transport: UDP
 Principles of reliable of data transfer
 TCP case study
PROGRAMMING ASSIGNMENT 2 on realizing TCP
reliable data transmission based on a simulator
 TCP congestion control
10
Course Overview:
Part 4: Network Layer (text: Ch. 4)
 what’s inside a router?
 routing principles (algorithms)
 hierarchical routing
 IP: the Internet Protocol
 Internet routing: RIP, OSPF, BGP
11
Course Overview:
Part 5: Link Layer, Local Area Networks (text:
Ch. 5)
 introduction, services
 error detection, correction (CRC code)
 multiple access protocols, LANs
 LAN addresses, ARP
 Ethernet
12
Course Overview:
Part 6: Cellular, Wireless and Mobile technologies
 Extension of Chapter 6
 Overview of smart phone technologies
 Overview of IOS and Andriod operating systems
 Mobile protocols
 Mobile logical channel descriptions, registration
procedures, encryptions standards
 Mobile identifiers, and Location-based Services
13
Course Overview:
Part 7: Wireless security and Network Security
(extension of Chapter 8)
 what is network security?
 Introduction of cryptography
Classical and modern cryptography
 Public key cryptography and its applications

 Cellular network vulnerabilities and security
protocols
 Wifi vulnerabilities and security protocols
14
Summary
 Introductory, practical
 Know basic networking programming
 All (almost) you need to know about
Internet, and applications
 Many acronyms, don’t be frustrated
If you don’t know an acronym, just google it
 Wikipedia is a great resource to learn!

15
Download