J. Blustein

Network Computing

[Crs | Ann | Mats | Res]

Course Administriva

Topics

  1. Computer Networks and the Internet

    Readings
    Kurose & Ross 1.1 - 1.7
    Topics
    1. Introduction to the Internet
    2. Network services
    3. Network internals
    4. Packet switching
    5. Delays in packet switching
    6. Queuing
    7. Access media
    8. Protocol stacks
    Lecture Slides
    1. KR's Ch1a.ppt
    2. KR's Ch1b.ppt
    Handout
  2. The Application Layer

    Readings
    Kurose & Ross 2.1 - 2.5
    Topics
    1. Traceroute
    2. Packet sniffing
    3. Analysis of Ethernet TCP/IP packets
    4. Application layer protocols
    5. Hypertext transfer protocol (HTTP)
    6. FTP
    7. E-mail
    8. Simple mail transfer protocol (SMTP)
    9. Post office protocol (POP)
    10. Internet mail access protocol (IMAP)
    11. E-mail protocols
    12. Domain name system DNS
    13. Socket programming
    14. Telnet
  3. The Transport Layer

    Readings
    Kurose & Ross 3.1 - 3.7
    Topics
    1. UDP
    2. TCP
      1. TCP timeouts
      2. TCP fairness
      3. TCP-specific congestion control
    3. Congestion control in general
    4. Reliable data transfer (checksums, ACKs, sequence numbers, timers
    5. Pipelined/sliding windows protocols
      1. Go-Back-N
      2. Selective Repeat
    Lecture Slides
    1. KR's Ch3a.ppt
    2. KR's Ch3b.ppt
    Handout
  4. Middleware Layer: Distributed Systems

    Readings
    Tanenbaum & van Steen Chapter 1, Sections 2.1.3
    Couloris, et al. Section 4.3
    Topics
    1. Definition of distributed systems
    2. Interoperability
    3. Concept of Middleware
    4. Remote procedure calls
    5. Distributed methods and objects
    6. Named and provate entities
    7. External data formats
    8. Java RMI
    9. CORBA
      1. Object model
      2. Facilities
      3. Services
      4. Repositories
      5. Interface Definition Language
      6. Dynamic and static invocation
    Lecture Slides
    1. distrSys.ppt
    2. JavaRMI.ppt
    3. CORBA.ppt
    Handout
  5. Security

    Readings
    Kurose & Ross Ch. 7
    Topics
    1. What is security?
    2. Principles of Crypography
      1. Symmetic key cryptography
      2. Public key cryptography
    3. Authentication
    4. Integrity
    5. Key distribution, central authorities, and trust
    6. Examples of network security at various layers
      1. PGP and secure e-mail
      2. WWW security using SSL
      3. IPsec
    Lecture Slides
    1. KR's Ch7.ppt
  6. Conclusion


[Crs | Ann | Mats | Res]


http://www.cs.dal.ca/~jamie/course/CS/3171/Course/sched.html
Version:
04 August 2002
CS 3171 Prof.:
J. Blustein <jamie@cs.dal.ca>

This webpage uses valid XHTML 1.0