CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida Fall 2015 1 About my self Office: HEC 243 Tel: 407-823-5015 czou@cs.ucf.edu Office hour:Monday/Wednesday 10:15pm – 11:45pm Course webpage: http://www.cs.ucf.edu/~czou/CNT4704-15 UCF Panopto for online lecture video streaming Webcourse has a link and Syllabus Each lecture will be posted several hours after a class Use Webcourse@UCF for homework assignment and grading Keeping grade private Easy homework submission Having a simple BBS channel 2 What is this course about? Basic “analysis” (don’t be scared by the course’s official name) Introductory course in “computer networking” Focus on Internet architecture/protocols TCP/IP, 2 networking programming projects Several lab assignments (fun, real) Email (spam), Web. Ethernet, hub, wireless LAN One chapter on Internet security introduction Newly added content (not in textbook): Cellular and mobile technologies Wireless security 3 Course information Prerequisites: Basic knowledge on Algorithms and Operating Systems C or C++ programming skills Basic usage of Linux Eustics account for networking programming Course materials: Text: Computer Networking: A Top Down Approach Featuring the Internet, J. Kurose & K. Ross, Addison Wesley, 6th ed., 2013 Previous editions (4th,5th) would also be fine Textbook online resource (see first page) Class notes 4 Course information (more) Workload: Coursework Approximate amount approximate percentage Written homework 2 24% Programming projects 2 26% Lab assignments 3 21% Midterm exam 1 14% Final exam 1 15% The final grade will use +/- policy, i.e., you may get A, A-, B+, B, B- … grade. Because this class has online session, the two exams are open book and similar to all regular homework assignments, except that they have a 24-hour submission constraint. 5 Course information (even more) In-class style: interaction, questions Real network programming (fun) Hands on experience: packet trace, email spam, Wifi attack… Flexible: Teaching difficulty/speed/contents based on your feedback So please tell me freely your thinking and interests! Academic honesty 6 A top-down approach: We’ll cover networking top-down End-system applications, end-end transport Network core: routing, hooking nets together local ISP regional ISP Link-level protocols, e.g., Ethernet Other interesting stuff: Security wireless company network 7 Course Overview: Part 1: Introduction (text: Chapter 1) What is the Internet? Application Web, Email, VOIP Application Transport TCP, UDP Transport Network IP Network Data Link Ethernet, cellular Data Link Physical link 8 Course Overview: Part 2: Application Layer (text: Ch. 2) Principles of application-layer protocols World Wide Web: HTTP Electronic mail: Email The Internet's directory service: DNS Socket programming PROGRAMMING ASSIGNMENT 1 9 Course Overview: Part 3: Transport Layer (text Ch. 3) Transport-layer services and principles Connectionless transport: UDP Principles of reliable of data transfer TCP case study PROGRAMMING ASSIGNMENT 2 on realizing TCP reliable data transmission based on a simulator TCP congestion control 10 Course Overview: Part 4: Network Layer (text: Ch. 4) what’s inside a router? routing principles (algorithms) hierarchical routing IP: the Internet Protocol Internet routing: RIP, OSPF, BGP 11 Course Overview: Part 5: Link Layer, Local Area Networks (text: Ch. 5) introduction, services error detection, correction (CRC code) multiple access protocols, LANs LAN addresses, ARP Ethernet 12 Course Overview: Part 6: Cellular, Wireless and Mobile technologies Extension of Chapter 6 Overview of smart phone technologies Overview of IOS and Andriod operating systems Mobile protocols Mobile logical channel descriptions, registration procedures, encryptions standards Mobile identifiers, and Location-based Services 13 Course Overview: Part 7: Wireless security and Network Security (extension of Chapter 8) what is network security? Introduction of cryptography Classical and modern cryptography Public key cryptography and its applications Cellular network vulnerabilities and security protocols Wifi vulnerabilities and security protocols 14 Summary Introductory, practical Know basic networking programming All (almost) you need to know about Internet, and applications Many acronyms, don’t be frustrated If you don’t know an acronym, just google it Wikipedia is a great resource to learn! 15